Register Here
Delegates
Sponsorship
  Call For Papers
  Hotel Info
Speakers
Schedule
Sponsors
Exhibitors
  Sessions
  Videos
  Power Panels
  Presentations
Untitled Document
2018 Platinum Sponsor

2018 Gold Sponsor

2018 Keynote Sponsor

2018 Tech Sponsor

2018 Pavilion Sponsor

2018 Partners

2018 Exhibitors

Untitled Document
2018 Media Sponsors








Untitled Document
2017 West
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

Bronze










Untitled Document
2017 West
Keynote Sponsor


Untitled Document
2017 West Exhibitors
























@ThingsExpo











Untitled Document
2017 West JETRO ×
Six Prefectures
of Japan
Pavilion Exhibitors



















Untitled Document
2017 West Media Sponsors














Untitled Document
2017 East
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

@DevOpsSummit

Silver
@DevOpsSummit


Bronze










Untitled Document
2017 East Exhibitors
@DevOpsSummit




































Untitled Document
2017 East Media Sponsors
















Untitled Document
   
  Think Big – Now Think Even Bigger
  Join Us at Internet of Things at Cloud Expo, November 11-13,
at the Javits Center!


The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.

All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.

With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend Internet of Things at Cloud Expo in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!

Delegates to Internet of Things at Cloud Expo will be able to attend eight separate, information-packed tracks:

  • Enterprise Cloud
  • Digital Transformation
  • The API Enterprise | Mobility & Security
  • DevOps | Containers & Microservices
  • Cognitive Computing | AI, ML, DL
  • Big Data | Analytics
  • IoT | IIoT | Smart Cities
  • Hot Topics | FinTech | WebRTC

There are 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content.


We'll see you in New York!



Day 3 Keynote at @ThingsExpo | Chris Matthieu, CTO of Octoblu
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu's platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
  Themes & Topics to Be Discussed

Consumer IoT
• Wearables
• Smart Appliances
• Smart Cars
• Smartphones 2.0
• Automation
• Smart Travel
• Personal Fitness
• Health Care
• Personalized Marketing
• Customized Shopping
• Personal Finance
• The Digital Divide
• Mobile Cash & Markets
• Games & The IoT
• The Future of Education
• Virtual Reality

Enterprise IoT
• The Business Case for
x IoT
• Smart Grids
• Smart Cities
• Smart Transportation
• The Smart Home
• M2M
• Authentication/Security
• Wiring the IoT
• The Internet of
x Everything
• Digital Transformation
x of Enterprise IT
• Agriculture
• Transportation
• Manufacturing
• Local & State
x Government
• Federal Government

IoT Developers | WebRTC Summit
• Eclipse Foundation
• Cloud Foundry
• Linux Containers
• Node-Red
• Open Source Hardware
• Ajax and the IoT
• Leveraging SOA
• Multi-Cloud IoT
• Evolving Standards
• WebSockets
• Security & Privacy
x Protocols
• GPS & Proximity
x Services
• Bluetooth/RFID/etc
• XMPP
• Nest Labs



The Top Keynotes, the Best Sessions, a Rock Star Faculty and the Most Qualified Delegates of ANY Internet of Things Event!


The future of computing lies in these things. As computing takes a much more active role in our lives it will at the same time become much more invisible. Internet of Things Expo will address the challenges in getting from where we are today to this future.
 
The high-energy event is a must-attend for senior technologists from CEOs on down – including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.




@ThingsExpo Power Panel | The World's Many IoTs: Which Are the Most Important?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, panelists discussed what things are the most important, which will have the most profound effect on the world, and what should we expect to see over the next couple of years.
Benefits of Attending the Three-Day Technical Program
  LEARNexactly why Internet of Things is relevant today from an economic, business and technology standpoint.
  HEAR first-hand from industry experts the common issues and requirements for creating a platform for the Internet of Things.
  SEE what new tools and approaches the Internet of Things requires.
  DISCOVER how to drive a distributed approach to the Internet of Things, where applications move to the data.
  FIND OUThow the vast volumes of new data produced by the Internet of Things provides a valuable new source of business insight through advanced analytical techniques.
  MASTER how the ongoing development of smart cities, cars, and houses will enhance connectivity infrastructure.
Lunch Power Panel | Microservices & IoT- Moderated by Jason Bloomberg
In this Power Panel at @DevOpsSummit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, Evangelist for F5 Networks; and Troy Topnik, ActiveState's Technical Product Manager; and Otis Gospodnetic, founder of Sematext; peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem filling in your buzzword bingo cards.


Are Your Mobile Devices Working For Your Business?
An employee who is not very knowledgeable about Windows Mobile can easily change the important device settings

In recent times, mobile devices have become quite powerful and feature rich and are getting attention from consumers and businesses alike. Faster processors, larger RAM and flash memories along with multiple communication technologies have made mobile devices suitable to deploy and run business applications. Such advancements are helping businesses embrace mobility to improve their processes thereby increasing revenues and efficiency, while lowering operational costs. Mobile device is an important component of any mobile solution. There are wide-varieties of mobile devices to choose from. Most commonly used enterprise mobile devices are based on Windows Mobile operating system from Microsoft and it has become a preferred platform used by companies around the world.

Problem

Windows Mobile is a feature packed and versatile operating system. There is a lot an enterprise can exploit out of this platform. But most of the enterprises don't need all of the available features. Giving a powerful mobile device to mobile workforce can sometimes actually become a serious concern as workers might use the device for personal use rather than for the business. Besides, companies spend lots of money and effort in developing and deploying business applications. They want to ensure that the workers use the solution to its full potential in favor of the business. Following are some of the challenges that should be addressed to maximize the benefits of a solution that involve mobile devices

  • Entertainment on the job

    All Windows Mobile devices contain built-in applications like browsers, games, phone etc. all of which can easily distract a mobile worker. A game of Solitaire can waste crucial working hours. Personal phone calls and SMS can eat away the worker's productivity and will surely cost money to the company. Any audit policy for such usage again costs resources and money. All of this is certainly not favorable to the businesses.

  • Maintenance Problems

    An employee who is not very knowledgeable about Windows Mobile can easily change the important device settings (e.g. Network, system files etc.). Such intentional or unintentional manipulation of device settings can cause the business critical application to fail. Imagine a user turning off the WiFi on the device, while the application is transferring critical data to the server. Results can be costly in terms of money and time. Too much manipulation can "corrupt" the device, which has to be returned to the IT department, again causing loss of productivity and wastage of IT resources. While the device is with IT, the mobile worker might be sitting idle, waiting for the device to be returned to him/her. Loss! Loss! Loss!

  • Installation of Third-party applications

    There are thousands of third-party applications (for personal and gaming purposes) available on the Internet these days. These applications can be easily installed on a Windows Mobile device. Installations of unauthorized third-party applications for personal use not only wastes the mobile worker's time but also can also disrupt the device operation if the third-party application malfunctions or consumes too much of system resources (CPU and Memory). Besides, those applications can contain malware and viruses, which might pose a security risk to the organization. These viruses are as disruptive and fast spreading similar to the ones prevalent on the desktop PC environment.

  • Physical Data Security

    Business applications are designed to work online or offline. If connectivity is not available the application goes back to offline mode. This makes it possible for mobile worker to continue working, until the connectivity is achieved again. In offline mode the application stores the data locally. If the data is sensitive, it is mostly encrypted. This saves the data from misuse incase the device is lost or stolen. But once a device is stolen the thief can connect the device with a PC via ActiveSync and copy the data files out. Desktop-based hacking tools can be used to decipher/decrypt the data. There should be way to block the user from copying the data from a device.

Solutions

Locking down general purpose Windows Mobile devices into kiosk mode can solve the above problems. By locking down the devices, the enterprise can restrict the user to launch and use only "approved" applications and functionality. e.g., a company can provision the mobile devices so that the workers cannot install third-party applications on their own. Another example would be to enable Data Only connection over the phone network, while blocking the voice calls.

There are two alternative methods to lock down mobile devices:

Method 1: Building Custom Kiosk devices

This approach requires an enterprise to build custom kiosk devices that do just what enterprise needs. Windows CE operating system is most commonly used to develop custom devices. This solution has the following advantages and disadvantages:

Advantages

  • Since requirements are tied to the hardware, the enterprise can precisely control features of the device.

Disadvantages

  • It is very costly to develop a hardware device from scratch. This might not be possible at all for small and medium sized companies as it requires huge upfront investments.
  • It does not make business sense to build your own hardware if the required volumes are low, say if only a few hundred devices are needed
  • Custom device will need custom application development. Number of software developers for a custom platform will be very low if any.
  • Once custom hardware is designed and built, it is very costly to modify or upgrade it. This is a very common problem with this approach.

Method 2: Lockdown mobile devices with tools like SureLock Studio

SureLock Studio gives enterprises the power to easily lock down off-the-shelf or ruggedized Windows Mobile devices. An administrator can lock down the devices with kiosk configuration generated by SureLock Studio. A kiosk configuration contains which features and applications are "approved" for mobile worker's use. These configurations are generated in the form of CAB files that makes it very easy to deploy them on large number of devices. Kiosk CAB installation works in the same way as any other application CAB. Over the air (OTA) deployment can happen seamlessly and quickly without any user intervention.

Following are the advantages of locking down Windows Mobile devices with SureLock Studio:

Advantages

  • Save costs: Enterprises can buy off-the-shelf (HTC/ASUS/iPaq etc) or Ruggedized Windows Mobile devices (Symbol/Motorola/Intermec) and deploy the enterprise business applications on them. SureLock will make sure that the worker is restricted to only use "approved" functionality of the device.
  • Choice of devices: Since all Windows Mobile devices are based on the same core operating system, companies have the choice to select a device model based on the specific features that the model may have. The business application will work on any device model with a little or no modifications.
  • In future enterprises can modify the kiosk configuration to allow or disallow new features or applications. For e.g. the company might decide later on to allow mobile workers to use the devices for making phone calls. A new SureLock kiosk configuration can be deployed with the phone feature enabled.

Disadvantages

  • Since SureLock does software lock down of the device, hard-resetting the device to factory defaults (clean boot) will cause the loss of kiosk settings. There are a couple of workarounds. Kiosk cab can be kept in the storage card along with an Autorun.exe. After a reboot, the kiosk configuration can be installed which will again lock down the device. Besides some ruggedized mobile device vendors (like Symbol/Motorola) have support for companies to build their own Writable ROM images. Kiosk configuration can be stored on in the ROM and can be installed automatically after a clean boot.

Conclusion

Using a tool like SureLock Studio makes the process of locking down Windows Mobile devices easy and painless. Enterprises can control the usage of their mobile devices and allow them to be used by the mobile workers only for the benefit of company.

About Onkar Singh
The author is the founder of 42Gears, developer of affordable Mobile Device Management tools.

Presentation Slides
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp de...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights a...
IoT & Smart Cities Stories
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...



2016 | 2015 | 2014 | 2013 | 2012
Testimonials
This week I had the pleasure of delivering the opening keynote at Cloud Expo New York. It was amazing to be back in the great city of New York with thousands of cloud enthusiasts eager to learn about the next step on their journey to embracing a cloud-first worldl."
@SteveMar_Msft
 
How does Cloud Expo do it every year? Another INCREDIBLE show - our heads are spinning - so fun and informative."
@SOASoftwareInc
 
Thank you @ThingsExpo for such a great event. All of the people we met over the past three days makes us confident IoT has a bright future."
@Cnnct2me
 
One of the best conferences we have attended in a while. Great job, Cloud Expo team! Keep it going."

@Flexential


Who Should Attend?
Senior Technologists including CIOs, CTOs & Vps of Technology, Chief Systems Engineers, IT Directors and Managers, Network and Storage Managers, Enterprise Architects, Communications and Networking Specialists, Directors of Infrastructure.

Business Executives including CEOs, CMOs, & CIOs , Presidents & SVPs, Directors of Business Development , Directors of IT Operations, Product and Purchasing Managers, IT Managers.

Join Us as a Media Partner - Together We Can Enable the Digital Transformation!
SYS-CON Media has a flourishing Media Partner program in which mutually beneficial promotion and benefits are arranged between our own leading Enterprise IT portals and events and those of our partners.

If you would like to participate, please provide us with details of your website/s and event/s or your organization and please include basic audience demographics as well as relevant metrics such as ave. page views per month.

To get involved, email events@sys-con.com.

@ThingsExpo Blogs
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
All in Mobile is a mobile app agency that helps enterprise companies and next generation startups build the future of digital. We offer mobile development and design for smartphones, tablets and wearables. Our projects cover the latest and most innovative technologies - voice assistants, AI, AR/VR and more. We excel at solutions for sports, fintech and retail industries.
NanoVMs is the only production ready unikernel infrastructure solution on the market today. Unikernels prevent server intrusions by isolating applications to one virtual machine with no users, no shells and no way to run other programs on them. Unikernels run faster and are lighter than even docker containers.
Digital Transformation Blogs
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching of virtual storage services to its enterprise market.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at Dice, he takes a metrics-driven approach to management. His experience in building and managing high ...
Despite being the market leader, we recognized the need to transform and reinvent our business at Dynatrace, before someone else disrupted the market. Over the course of three years, we changed everything - our technology, our culture and our brand image. In this session we'll discuss how we navigated through our own innovator's dilemma, and share takeaways from our experience that you can apply to your own organization.
CloudEXPO.TV
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been des...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the...