Register Here
Delegates
Sponsorship
  Call For Papers
Speakers
Schedule
Sponsors
Exhibitors
  Sessions
  Videos
  Power Panels
  Presentations
Untitled Document
2018 Platinum Sponsor

2018 Gold Sponsor

2018 Tech Sponsor

2018 Partners

2018 Exhibitors


Untitled Document
2018 Media Sponsors








Untitled Document
2017 West
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

Bronze










Untitled Document
2017 West
Keynote Sponsor


Untitled Document
2017 West Exhibitors
























@ThingsExpo











Untitled Document
2017 West JETRO ×
Six Prefectures
of Japan
Pavilion Exhibitors



















Untitled Document
2017 West Media Sponsors














Untitled Document
2017 East
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

@DevOpsSummit

Silver
@DevOpsSummit


Bronze










Untitled Document
2017 East Exhibitors
@DevOpsSummit




































Untitled Document
2017 East Media Sponsors
















Untitled Document
   
  Think Big – Now Think Even Bigger
  Join Us at Internet of Things at Cloud Expo, November 11-13,
at the Javits Center!


The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.

All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.

With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend Internet of Things at Cloud Expo in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!

Delegates to Internet of Things at Cloud Expo will be able to attend eight separate, information-packed tracks:

  • Enterprise Cloud
  • Digital Transformation
  • The API Enterprise | Mobility & Security
  • DevOps | Containers & Microservices
  • Cognitive Computing | AI, ML, DL
  • Big Data | Analytics
  • IoT | IIoT | Smart Cities
  • Hot Topics | FinTech | WebRTC

There are 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content.


We'll see you in New York!



Day 3 Keynote at @ThingsExpo | Chris Matthieu, CTO of Octoblu
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu's platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
  Themes & Topics to Be Discussed

Consumer IoT
• Wearables
• Smart Appliances
• Smart Cars
• Smartphones 2.0
• Automation
• Smart Travel
• Personal Fitness
• Health Care
• Personalized Marketing
• Customized Shopping
• Personal Finance
• The Digital Divide
• Mobile Cash & Markets
• Games & The IoT
• The Future of Education
• Virtual Reality

Enterprise IoT
• The Business Case for
x IoT
• Smart Grids
• Smart Cities
• Smart Transportation
• The Smart Home
• M2M
• Authentication/Security
• Wiring the IoT
• The Internet of
x Everything
• Digital Transformation
x of Enterprise IT
• Agriculture
• Transportation
• Manufacturing
• Local & State
x Government
• Federal Government

IoT Developers | WebRTC Summit
• Eclipse Foundation
• Cloud Foundry
• Linux Containers
• Node-Red
• Open Source Hardware
• Ajax and the IoT
• Leveraging SOA
• Multi-Cloud IoT
• Evolving Standards
• WebSockets
• Security & Privacy
x Protocols
• GPS & Proximity
x Services
• Bluetooth/RFID/etc
• XMPP
• Nest Labs



The Top Keynotes, the Best Sessions, a Rock Star Faculty and the Most Qualified Delegates of ANY Internet of Things Event!


The future of computing lies in these things. As computing takes a much more active role in our lives it will at the same time become much more invisible. Internet of Things Expo will address the challenges in getting from where we are today to this future.
 
The high-energy event is a must-attend for senior technologists from CEOs on down – including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.




@ThingsExpo Power Panel | The World's Many IoTs: Which Are the Most Important?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, panelists discussed what things are the most important, which will have the most profound effect on the world, and what should we expect to see over the next couple of years.
Benefits of Attending the Three-Day Technical Program
  LEARNexactly why Internet of Things is relevant today from an economic, business and technology standpoint.
  HEAR first-hand from industry experts the common issues and requirements for creating a platform for the Internet of Things.
  SEE what new tools and approaches the Internet of Things requires.
  DISCOVER how to drive a distributed approach to the Internet of Things, where applications move to the data.
  FIND OUThow the vast volumes of new data produced by the Internet of Things provides a valuable new source of business insight through advanced analytical techniques.
  MASTER how the ongoing development of smart cities, cars, and houses will enhance connectivity infrastructure.
Lunch Power Panel | Microservices & IoT- Moderated by Jason Bloomberg
In this Power Panel at @DevOpsSummit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, Evangelist for F5 Networks; and Troy Topnik, ActiveState's Technical Product Manager; and Otis Gospodnetic, founder of Sematext; peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem filling in your buzzword bingo cards.


Healthcare IT Security
A Productivity, Privacy and Profit Initiative

A dangerous but likely sight in almost any hospital care unit is an unattended computer workstation, accessible by any passerby. If by chance the computer is locked, simply flip over the keyboard and you’ll often find the generic logon ID and password posted on the bottom; a failsafe for all caregivers in the care unit wanting to log on.

Perhaps this situation was acceptable when computers were uncommon and therefore intimidating or unfamiliar to a novice, when hospitals were less friendly and less accessible to visitors and when most patients’ sensitive health information was kept on paper records.

The world has changed. Millions of health records across multiple applications are digitally accessed by caregivers. The provisioning of this access by IT professionals is imperative. What is equally important, yet has been overlooked for so many years, is the assurance that the appropriate people are viewing the sensitive data. With the evolution of IT in healthcare and the trend towards electronic medical records, the need for healthcare organizations to invest in the policies, practices, people, and technology needed to safeguard their computer systems within their “four walls” must now move to the forefront.
   
With increasingly sophisticated computer systems, it’s no longer appropriate for computer users to share electronic identities, and in so doing be the “same person” in the electronic world. The problem is, as the “same person,” caregivers can all do the same things, such as order the same medications even when policy generally restricts which medications caregivers in various roles can order. Another problem arises when for audit purposes systems look like they have only one user, making it impossible to know who actually did what, should the need ever arise (say in a litigation).

The key to effectively addressing these issues is in achieving the necessary protections without impeding care delivery. Better yet, the goal should be to achieve the necessary protections while actually facilitating care.

The idea of instituting security controls that facilitate the delivery of care may sound like a contradiction, when in fact it’s the only practical solution. The reason is that the people who will be subject to these controls are among the smartest and highly trained on the planet – nurses and physicians. As a matter of necessity, they are quite adept at bending processes and practices to minimize and even avoid institutional inefficiencies. Provide a computer system that requires each nurse or physician to log on and then wait a frustratingly long 30 seconds or more to gain access to their applications and the result is someone will log on once and never log off. The next caregiver who uses that computer will have instant access because they don’t log on but rather use the logon of the previous user. This next caregiver doesn’t log off either, and so the workaround perpetuates. While the caregivers have successfully avoided the annoyance of logging on, in an electronic sense, they are all the same person as the caregiver who originally logged on. This is not an example of people misbehaving. Rather, it’s an example of people with a critical mission finding ways to “work the system” to support their urgent needs.

Recognizing the need for security solutions has grown in recent years, but most healthcare organizations view such solutions as low-level, perhaps even commodity-like, infrastructure. Executive managers assume that they have no role in driving the selection of these solutions since they are often put off by the security jargon and seemingly arcane security-related considerations. The erroneous assumption is that security technology is solely the purview of the front-line technical staff.

However, the organizations that have successfully deployed effective security solutions all have one thing in common: they understood that their security solution was a business imperative that was going to impact the daily lives of every caregiver. Make a poor selection and the impact is painfully unproductive. Make an appropriate selection and the impact is good security, increased caregiver productivity, and myriad cost savings.

Senior managers in these organizations recognized the business case for good security. These managers led the selection process rather than simply delegating to a front-line technical team. The managers assessed and then selected their security solution as if they were choosing a clinical application. This meant that caregivers were involved in the selection process, and serious consideration was given to how the solution would fit with caregivers’ workflow. And, perhaps most importantly, these organizations worked closely with their caregivers to teach them how to make fast and effective use of the new security apparatus as it was being deployed.

The characteristics of a thoughtful security solution that will be embraced by caregivers may differ greatly from the solution IT professionals would endorse. For caregivers, it’s important that the system be easy to learn and intuitive to understand as well as provide easy access, such as just one identifier and one password. Increased productivity through time savings, as long as care is not compromised in the process, is a top concern for nurses and physicians. A solution mustn’t hinder operations in any way. Access to all key clinical applications must be granted and must function in the same way at every workstation throughout all facilities.

Although caregivers and IT staff would make reliability an essential characteristic, IT professionals must look at the system from a view greater than just one caregiver’s experience. The solution must be easy to administer on a daily basis as well as adoptive to new applications to the network of workstations. Finally, auditing is important and reports on security-related activities within the system must be easily generated.

With the acceptance of a security solution comes acceptance and conformance to established security policies by caregivers and IT professionals alike. Benefits include fast and effective use of computer workstations, resulting in time savings and the ability of doctors to assist more patients. For example, studies have shown that a good security solution can save as much as 30 minutes per physician per day by eliminating time spent trying to log on and off of multiple applications. Not only would caregivers have more time with their patients but the patients would benefit by feeling secure, knowing that their records can’t be seen by unauthorized personnel. User provisioning is also taken care of, security breaches avoided, and an audit trail established. An organization’s attractiveness to nurses and physicians would also increase due to simpler and more accessible IT solutions.

Computer-based systems and applications are part of the fabric of every hospital and in one form or another — from diagnostic cardiology to physician order entry — IT solutions have been used to assist with care delivery processes for more than 40 years. Who uses these systems, and for what purposes, has become as important an issue as who works in your hospital. The need to identify people so you know who they are and can control their access has grown beyond the analog world to include the digital one. Today, the need for hospital administrators to recognize, monitor, and control access in the digital world is as crucial to a hospital’s practices as knowing who holds the scalpel in the operating room. The wired world of healthcare continues to evolve as more systems are developed and deployed. Healthcare executives now need to view IT security and privacy with as much seriousness and intent as any clinical IT solutions.

About Robert Seliger
Robert Seliger is widely recognized as a visionary at the forefront of converging technical, market, and clinical trends in health care. His guidance and foresight has resulted in the creation of Sentillion, an identity and access management company providing solutions specifically for the health care industry. Presently chair of the HIMSS Steering Committee for Integration and Interoperability and co-chair for Health Level Seven (HL7) CCOW Committee, Robert also served as the co-chair for the Andover Working Group. He received a master's degree from the Massachusetts Institute of Technology and a Bachelor's degree from Cornell University.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

We have been using generic accounts as long as I can remember. Life became more difficult when HIPAA required us to automatically lock systems. Systems were left locked and admins were constantly being called to unlock them.

To get around the issue of shared accounts we have begun using a product called "Unlock Administrator" http://www.e-motional.com/ULAdmin.htm. Once the system is logged into using a generic username and password it is locked in the standard Windows fashion and the system is set to lock when the screensaver is activated as well.

This program allows you to select which users are able to unlock the system using their own Windows domain credentials. A log of when the system is locked and when and by whom it is unlocked is kept in a protected file as well as a Windows Event. Users don't have read or write access to this file. This way we have complete knowledge of who used the account and when. Everyone uses their own password and no password needs to be shared.

This is also useful at nursing stations that are often left locked (as per HIPAA requirements) but abandoned. With this program any selected user (not necessarily an admin) can unlock the system.

Hope someone else finds this useful as well.

A dangerous but likely sight in almost any hospital care unit is an unattended computer workstation, accessible by any passerby. If by chance the computer is locked, simply flip over the keyboard and you?ll often find the generic logon ID and password posted on the bottom; a failsafe for all caregivers in the care unit wanting to log on.

A dangerous but likely sight in almost any hospital care unit is an unattended computer workstation, accessible by any passerby. If by chance the computer is locked, simply flip over the keyboard and you?ll often find the generic logon ID and password posted on the bottom; a failsafe for all caregivers in the care unit wanting to log on.


Presentation Slides
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build thei...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously...
IoT & Smart Cities Stories
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...



2016 | 2015 | 2014 | 2013 | 2012
Testimonials
This week I had the pleasure of delivering the opening keynote at Cloud Expo New York. It was amazing to be back in the great city of New York with thousands of cloud enthusiasts eager to learn about the next step on their journey to embracing a cloud-first worldl."
@SteveMar_Msft
 
How does Cloud Expo do it every year? Another INCREDIBLE show - our heads are spinning - so fun and informative."
@SOASoftwareInc
 
Thank you @ThingsExpo for such a great event. All of the people we met over the past three days makes us confident IoT has a bright future."
@Cnnct2me
 
One of the best conferences we have attended in a while. Great job, Cloud Expo team! Keep it going."

@Flexential


Who Should Attend?
Senior Technologists including CIOs, CTOs & Vps of Technology, Chief Systems Engineers, IT Directors and Managers, Network and Storage Managers, Enterprise Architects, Communications and Networking Specialists, Directors of Infrastructure.

Business Executives including CEOs, CMOs, & CIOs , Presidents & SVPs, Directors of Business Development , Directors of IT Operations, Product and Purchasing Managers, IT Managers.

Join Us as a Media Partner - Together We Can Enable the Digital Transformation!
SYS-CON Media has a flourishing Media Partner program in which mutually beneficial promotion and benefits are arranged between our own leading Enterprise IT portals and events and those of our partners.

If you would like to participate, please provide us with details of your website/s and event/s or your organization and please include basic audience demographics as well as relevant metrics such as ave. page views per month.

To get involved, email events@sys-con.com.

@ThingsExpo Blogs
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or personal computing needs.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to advisory roles at startups. He has worked extensively on monetization, SAAS, IoT, ecosystems, partne...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments that frequently get lost in the hype. The panel will discuss their perspective on what they see as th...
Digital Transformation Blogs
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or personal computing needs.
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authentication, but for them authorization is out of scope. When you need to control "who can do what" in your ...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by researching target group and involving users in the designing process.
CloudEXPO.TV
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been des...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the...