Register Here
  Call For Papers
  Hotel Info
  Power Panels
Untitled Document
2018 Platinum Sponsor

2018 Gold Sponsor

2018 Keynote Sponsor

2018 Tech Sponsor

2018 Pavilion Sponsor

2018 Partners

2018 Exhibitors

Untitled Document
2018 Media Sponsors

Untitled Document
2017 West
Premium Sponsors



Untitled Document
2017 West
Keynote Sponsor

Untitled Document
2017 West Exhibitors


Untitled Document
2017 West JETRO ×
Six Prefectures
of Japan
Pavilion Exhibitors

Untitled Document
2017 West Media Sponsors

Untitled Document
2017 East
Premium Sponsors





Untitled Document
2017 East Exhibitors

Untitled Document
2017 East Media Sponsors

Untitled Document
  Think Big – Now Think Even Bigger
  Join Us at Internet of Things at Cloud Expo, November 11-13,
at the Javits Center!

The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.

All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.

With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend Internet of Things at Cloud Expo in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!

Delegates to Internet of Things at Cloud Expo will be able to attend eight separate, information-packed tracks:

  • Enterprise Cloud
  • Digital Transformation
  • The API Enterprise | Mobility & Security
  • DevOps | Containers & Microservices
  • Cognitive Computing | AI, ML, DL
  • Big Data | Analytics
  • IoT | IIoT | Smart Cities
  • Hot Topics | FinTech | WebRTC

There are 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content.

We'll see you in New York!

Day 3 Keynote at @ThingsExpo | Chris Matthieu, CTO of Octoblu
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu's platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
  Themes & Topics to Be Discussed

Consumer IoT
• Wearables
• Smart Appliances
• Smart Cars
• Smartphones 2.0
• Automation
• Smart Travel
• Personal Fitness
• Health Care
• Personalized Marketing
• Customized Shopping
• Personal Finance
• The Digital Divide
• Mobile Cash & Markets
• Games & The IoT
• The Future of Education
• Virtual Reality

Enterprise IoT
• The Business Case for
x IoT
• Smart Grids
• Smart Cities
• Smart Transportation
• The Smart Home
• M2M
• Authentication/Security
• Wiring the IoT
• The Internet of
x Everything
• Digital Transformation
x of Enterprise IT
• Agriculture
• Transportation
• Manufacturing
• Local & State
x Government
• Federal Government

IoT Developers | WebRTC Summit
• Eclipse Foundation
• Cloud Foundry
• Linux Containers
• Node-Red
• Open Source Hardware
• Ajax and the IoT
• Leveraging SOA
• Multi-Cloud IoT
• Evolving Standards
• WebSockets
• Security & Privacy
x Protocols
• GPS & Proximity
x Services
• Bluetooth/RFID/etc
• Nest Labs

The Top Keynotes, the Best Sessions, a Rock Star Faculty and the Most Qualified Delegates of ANY Internet of Things Event!

The future of computing lies in these things. As computing takes a much more active role in our lives it will at the same time become much more invisible. Internet of Things Expo will address the challenges in getting from where we are today to this future.
The high-energy event is a must-attend for senior technologists from CEOs on down – including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.

@ThingsExpo Power Panel | The World's Many IoTs: Which Are the Most Important?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, panelists discussed what things are the most important, which will have the most profound effect on the world, and what should we expect to see over the next couple of years.
Benefits of Attending the Three-Day Technical Program
  LEARNexactly why Internet of Things is relevant today from an economic, business and technology standpoint.
  HEAR first-hand from industry experts the common issues and requirements for creating a platform for the Internet of Things.
  SEE what new tools and approaches the Internet of Things requires.
  DISCOVER how to drive a distributed approach to the Internet of Things, where applications move to the data.
  FIND OUThow the vast volumes of new data produced by the Internet of Things provides a valuable new source of business insight through advanced analytical techniques.
  MASTER how the ongoing development of smart cities, cars, and houses will enhance connectivity infrastructure.
Lunch Power Panel | Microservices & IoT- Moderated by Jason Bloomberg
In this Power Panel at @DevOpsSummit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, Evangelist for F5 Networks; and Troy Topnik, ActiveState's Technical Product Manager; and Otis Gospodnetic, founder of Sematext; peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem filling in your buzzword bingo cards.

Healthcare IT Security
A Productivity, Privacy and Profit Initiative

A dangerous but likely sight in almost any hospital care unit is an unattended computer workstation, accessible by any passerby. If by chance the computer is locked, simply flip over the keyboard and you’ll often find the generic logon ID and password posted on the bottom; a failsafe for all caregivers in the care unit wanting to log on.

Perhaps this situation was acceptable when computers were uncommon and therefore intimidating or unfamiliar to a novice, when hospitals were less friendly and less accessible to visitors and when most patients’ sensitive health information was kept on paper records.

The world has changed. Millions of health records across multiple applications are digitally accessed by caregivers. The provisioning of this access by IT professionals is imperative. What is equally important, yet has been overlooked for so many years, is the assurance that the appropriate people are viewing the sensitive data. With the evolution of IT in healthcare and the trend towards electronic medical records, the need for healthcare organizations to invest in the policies, practices, people, and technology needed to safeguard their computer systems within their “four walls” must now move to the forefront.
With increasingly sophisticated computer systems, it’s no longer appropriate for computer users to share electronic identities, and in so doing be the “same person” in the electronic world. The problem is, as the “same person,” caregivers can all do the same things, such as order the same medications even when policy generally restricts which medications caregivers in various roles can order. Another problem arises when for audit purposes systems look like they have only one user, making it impossible to know who actually did what, should the need ever arise (say in a litigation).

The key to effectively addressing these issues is in achieving the necessary protections without impeding care delivery. Better yet, the goal should be to achieve the necessary protections while actually facilitating care.

The idea of instituting security controls that facilitate the delivery of care may sound like a contradiction, when in fact it’s the only practical solution. The reason is that the people who will be subject to these controls are among the smartest and highly trained on the planet – nurses and physicians. As a matter of necessity, they are quite adept at bending processes and practices to minimize and even avoid institutional inefficiencies. Provide a computer system that requires each nurse or physician to log on and then wait a frustratingly long 30 seconds or more to gain access to their applications and the result is someone will log on once and never log off. The next caregiver who uses that computer will have instant access because they don’t log on but rather use the logon of the previous user. This next caregiver doesn’t log off either, and so the workaround perpetuates. While the caregivers have successfully avoided the annoyance of logging on, in an electronic sense, they are all the same person as the caregiver who originally logged on. This is not an example of people misbehaving. Rather, it’s an example of people with a critical mission finding ways to “work the system” to support their urgent needs.

Recognizing the need for security solutions has grown in recent years, but most healthcare organizations view such solutions as low-level, perhaps even commodity-like, infrastructure. Executive managers assume that they have no role in driving the selection of these solutions since they are often put off by the security jargon and seemingly arcane security-related considerations. The erroneous assumption is that security technology is solely the purview of the front-line technical staff.

However, the organizations that have successfully deployed effective security solutions all have one thing in common: they understood that their security solution was a business imperative that was going to impact the daily lives of every caregiver. Make a poor selection and the impact is painfully unproductive. Make an appropriate selection and the impact is good security, increased caregiver productivity, and myriad cost savings.

Senior managers in these organizations recognized the business case for good security. These managers led the selection process rather than simply delegating to a front-line technical team. The managers assessed and then selected their security solution as if they were choosing a clinical application. This meant that caregivers were involved in the selection process, and serious consideration was given to how the solution would fit with caregivers’ workflow. And, perhaps most importantly, these organizations worked closely with their caregivers to teach them how to make fast and effective use of the new security apparatus as it was being deployed.

The characteristics of a thoughtful security solution that will be embraced by caregivers may differ greatly from the solution IT professionals would endorse. For caregivers, it’s important that the system be easy to learn and intuitive to understand as well as provide easy access, such as just one identifier and one password. Increased productivity through time savings, as long as care is not compromised in the process, is a top concern for nurses and physicians. A solution mustn’t hinder operations in any way. Access to all key clinical applications must be granted and must function in the same way at every workstation throughout all facilities.

Although caregivers and IT staff would make reliability an essential characteristic, IT professionals must look at the system from a view greater than just one caregiver’s experience. The solution must be easy to administer on a daily basis as well as adoptive to new applications to the network of workstations. Finally, auditing is important and reports on security-related activities within the system must be easily generated.

With the acceptance of a security solution comes acceptance and conformance to established security policies by caregivers and IT professionals alike. Benefits include fast and effective use of computer workstations, resulting in time savings and the ability of doctors to assist more patients. For example, studies have shown that a good security solution can save as much as 30 minutes per physician per day by eliminating time spent trying to log on and off of multiple applications. Not only would caregivers have more time with their patients but the patients would benefit by feeling secure, knowing that their records can’t be seen by unauthorized personnel. User provisioning is also taken care of, security breaches avoided, and an audit trail established. An organization’s attractiveness to nurses and physicians would also increase due to simpler and more accessible IT solutions.

Computer-based systems and applications are part of the fabric of every hospital and in one form or another — from diagnostic cardiology to physician order entry — IT solutions have been used to assist with care delivery processes for more than 40 years. Who uses these systems, and for what purposes, has become as important an issue as who works in your hospital. The need to identify people so you know who they are and can control their access has grown beyond the analog world to include the digital one. Today, the need for hospital administrators to recognize, monitor, and control access in the digital world is as crucial to a hospital’s practices as knowing who holds the scalpel in the operating room. The wired world of healthcare continues to evolve as more systems are developed and deployed. Healthcare executives now need to view IT security and privacy with as much seriousness and intent as any clinical IT solutions.

About Robert Seliger
Robert Seliger is widely recognized as a visionary at the forefront of converging technical, market, and clinical trends in health care. His guidance and foresight has resulted in the creation of Sentillion, an identity and access management company providing solutions specifically for the health care industry. Presently chair of the HIMSS Steering Committee for Integration and Interoperability and co-chair for Health Level Seven (HL7) CCOW Committee, Robert also served as the co-chair for the Andover Working Group. He received a master's degree from the Massachusetts Institute of Technology and a Bachelor's degree from Cornell University.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

We have been using generic accounts as long as I can remember. Life became more difficult when HIPAA required us to automatically lock systems. Systems were left locked and admins were constantly being called to unlock them.

To get around the issue of shared accounts we have begun using a product called "Unlock Administrator" Once the system is logged into using a generic username and password it is locked in the standard Windows fashion and the system is set to lock when the screensaver is activated as well.

This program allows you to select which users are able to unlock the system using their own Windows domain credentials. A log of when the system is locked and when and by whom it is unlocked is kept in a protected file as well as a Windows Event. Users don't have read or write access to this file. This way we have complete knowledge of who used the account and when. Everyone uses their own password and no password needs to be shared.

This is also useful at nursing stations that are often left locked (as per HIPAA requirements) but abandoned. With this program any selected user (not necessarily an admin) can unlock the system.

Hope someone else finds this useful as well.

A dangerous but likely sight in almost any hospital care unit is an unattended computer workstation, accessible by any passerby. If by chance the computer is locked, simply flip over the keyboard and you?ll often find the generic logon ID and password posted on the bottom; a failsafe for all caregivers in the care unit wanting to log on.

A dangerous but likely sight in almost any hospital care unit is an unattended computer workstation, accessible by any passerby. If by chance the computer is locked, simply flip over the keyboard and you?ll often find the generic logon ID and password posted on the bottom; a failsafe for all caregivers in the care unit wanting to log on.

Presentation Slides
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp de...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile ...
IoT & Smart Cities Stories
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...

2016 | 2015 | 2014 | 2013 | 2012
This week I had the pleasure of delivering the opening keynote at Cloud Expo New York. It was amazing to be back in the great city of New York with thousands of cloud enthusiasts eager to learn about the next step on their journey to embracing a cloud-first worldl."
How does Cloud Expo do it every year? Another INCREDIBLE show - our heads are spinning - so fun and informative."
Thank you @ThingsExpo for such a great event. All of the people we met over the past three days makes us confident IoT has a bright future."
One of the best conferences we have attended in a while. Great job, Cloud Expo team! Keep it going."


Who Should Attend?
Senior Technologists including CIOs, CTOs & Vps of Technology, Chief Systems Engineers, IT Directors and Managers, Network and Storage Managers, Enterprise Architects, Communications and Networking Specialists, Directors of Infrastructure.

Business Executives including CEOs, CMOs, & CIOs , Presidents & SVPs, Directors of Business Development , Directors of IT Operations, Product and Purchasing Managers, IT Managers.

Join Us as a Media Partner - Together We Can Enable the Digital Transformation!
SYS-CON Media has a flourishing Media Partner program in which mutually beneficial promotion and benefits are arranged between our own leading Enterprise IT portals and events and those of our partners.

If you would like to participate, please provide us with details of your website/s and event/s or your organization and please include basic audience demographics as well as relevant metrics such as ave. page views per month.

To get involved, email

@ThingsExpo Blogs
[Opening Scene]: Billy Dean is pacing the office. He’s struggling to keep his delivery trucks at full capacity and on the road. Random breakdowns, unexpected employee absences, and unscheduled truck maintenance are impacting bookings, revenues and ultimately customer satisfaction. He keeps hearing from his business customers how they are leveraging data science to improve their business operations. Billy Dean starts to wonder if data science can help him. As he contemplates what data science can do for him, he slowly drifts off to sleep, and visions of Data Science starts dancing in his head…...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactures motherboard chipsets, network interface controllers and integrated circuits, flash memory, graph...
Digital Transformation Blogs
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching of virtual storage services to its enterprise market.
DXWorldEXPO LLC announced today that Nutanix has been named "Platinum Sponsor" of CloudEXPO | DevOpsSUMMIT | DXWorldEXPO New York, which will take place November 12-13, 2018 in New York City. Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix Enterprise Cloud Platform blends web-scale engineering and consumer-grade design to natively converge server, storage, virtualization and networking into a resilient, software-defined solution with rich machine intelligence.
Despite being the market leader, we recognized the need to transform and reinvent our business at Dynatrace, before someone else disrupted the market. Over the course of three years, we changed everything - our technology, our culture and our brand image. In this session we'll discuss how we navigated through our own innovator's dilemma, and share takeaways from our experience that you can apply to your own organization.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been des...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the...