Home
Conference Info
Sponsorship Information
Speakers
Sessions
Schedule
Exhibitors
Media Sponsors
Registration
Press Registration
  Topics
  Call For Papers
  Past Events
Untitled Document
2018 East Exhibitors






Untitled Document
2018 East Media Sponsors








Untitled Document
2017 West
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

Bronze










Untitled Document
2017 West
Keynote Sponsor


Untitled Document
2017 West Exhibitors
























@ThingsExpo











Untitled Document
2017 West JETRO ×
Six Prefectures
of Japan
Pavilion Exhibitors



















Untitled Document
2017 West Media Sponsors














Untitled Document
2017 East
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

@DevOpsSummit

Silver
@DevOpsSummit


Bronze










Untitled Document
2017 East Exhibitors
@DevOpsSummit




































Untitled Document
2017 East Media Sponsors
















Untitled Document
   
  Think Big – Now Think Even Bigger
  Join Us at Internet of Things at Cloud Expo, November 11-13,
at the Javits Center!


The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.

All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.

With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend Internet of Things at Cloud Expo in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!

Delegates to Internet of Things at Cloud Expo will be able to attend eight separate, information-packed tracks:

  • Enterprise Cloud
  • Digital Transformation
  • The API Enterprise | Mobility & Security
  • DevOps | Containers & Microservices
  • Cognitive Computing | AI, ML, DL
  • Big Data | Analytics
  • IoT | IIoT | Smart Cities
  • Hot Topics | FinTech | WebRTC

There are 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content.


We'll see you in New York!



Day 3 Keynote at @ThingsExpo | Chris Matthieu, CTO of Octoblu
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu's platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
  Themes & Topics to Be Discussed

Consumer IoT
• Wearables
• Smart Appliances
• Smart Cars
• Smartphones 2.0
• Automation
• Smart Travel
• Personal Fitness
• Health Care
• Personalized Marketing
• Customized Shopping
• Personal Finance
• The Digital Divide
• Mobile Cash & Markets
• Games & The IoT
• The Future of Education
• Virtual Reality

Enterprise IoT
• The Business Case for
x IoT
• Smart Grids
• Smart Cities
• Smart Transportation
• The Smart Home
• M2M
• Authentication/Security
• Wiring the IoT
• The Internet of
x Everything
• Digital Transformation
x of Enterprise IT
• Agriculture
• Transportation
• Manufacturing
• Local & State
x Government
• Federal Government

IoT Developers | WebRTC Summit
• Eclipse Foundation
• Cloud Foundry
• Linux Containers
• Node-Red
• Open Source Hardware
• Ajax and the IoT
• Leveraging SOA
• Multi-Cloud IoT
• Evolving Standards
• WebSockets
• Security & Privacy
x Protocols
• GPS & Proximity
x Services
• Bluetooth/RFID/etc
• XMPP
• Nest Labs



The Top Keynotes, the Best Sessions, a Rock Star Faculty and the Most Qualified Delegates of ANY Internet of Things Event!


The future of computing lies in these things. As computing takes a much more active role in our lives it will at the same time become much more invisible. Internet of Things Expo will address the challenges in getting from where we are today to this future.
 
The high-energy event is a must-attend for senior technologists from CEOs on down – including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.




@ThingsExpo Power Panel | The World's Many IoTs: Which Are the Most Important?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, panelists discussed what things are the most important, which will have the most profound effect on the world, and what should we expect to see over the next couple of years.
Benefits of Attending the Three-Day Technical Program
  LEARNexactly why Internet of Things is relevant today from an economic, business and technology standpoint.
  HEAR first-hand from industry experts the common issues and requirements for creating a platform for the Internet of Things.
  SEE what new tools and approaches the Internet of Things requires.
  DISCOVER how to drive a distributed approach to the Internet of Things, where applications move to the data.
  FIND OUThow the vast volumes of new data produced by the Internet of Things provides a valuable new source of business insight through advanced analytical techniques.
  MASTER how the ongoing development of smart cities, cars, and houses will enhance connectivity infrastructure.
Lunch Power Panel | Microservices & IoT- Moderated by Jason Bloomberg
In this Power Panel at @DevOpsSummit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, Evangelist for F5 Networks; and Troy Topnik, ActiveState's Technical Product Manager; and Otis Gospodnetic, founder of Sematext; peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem filling in your buzzword bingo cards.


Brad Templeton on "The Gmail Saga" - Google vs Privacy?
Brad Templeton on "The Gmail Saga" - Google vs Privacy?

Much has been written about the new Google GMail trial, which is an e-mail service that offers a gigabyte of archiving, Google search of your mail archives and a nice interface. It's free, because while you read your mail, Google ads will be displayed based on keywords found in the mail you are reading (just as the Google Adsense program shows ads like the ones you see on the right based on words found in this document.)

GMail created a surprising storm for a product that hasn't yet been released. A coalition of privacy groups asked Google to hold back on releasing it. A California state senator proposed a law to ban the advertising function. Editorials and blog entries left and right have condemned it and praised it.

I come to this problem from two sides. One, I'm a fan of Google, and have been friends with Google's management since they started the company. I've also consulted for Google on other matters and make surprising revenue from their Adsense program on my web site.

I'm also a privacy advocate and Chairman of the Electronic Frontier Foundation, well regarded as one of the top civil rights advocates in cyberspace. The EFF has issued some statements of privacy concern over GMail, though we declined joining the coalition against it. (I'm writing this as my own essay, though with some advice from the EFF team.) I've also had a chance to talk at length with Google President Larry Page about some of the issues.

Here's a summary of some of my conclusions

  1. While there has been over-reaction to GMail, there are some real issues here to be worried about.
  2. Other webmail providers are doing, or will be doing the same things, meaning these issues apply to all of them, including MSN, Yahoo and others.
  3. One key risk is that because GMail gets your consent to be more than an e-mail delivery service -- offering searching, storage and shopping -- your mail there may not get the legal protection the ECPA gives you on E-mail.
  4. The storage of e-mail on 3rd party servers for more than 180 days almost certainly causes the loss of those privileges.
  5. This in turn creates a danger that we may redefine whether e-mail has the "reasonable expectation of privacy" needed for 4th amendment protection.
  6. Correlation of search and mail has real risks.
  7. Google and others should architect to encrypt your mail.
  8. Even the irrational fears over the spooky aspect of advertising being associated with e-mail creates problems that must be addressed.

Page and the others in Google were taken aback by the negative reaction to their pre-launch. GMail is a very nice product, with great promise. They've done a lot of work on building a superior web e-mail interface. Their surprise at the tempest is not inappropriate. Many of the issues raised here are subtle and known only to full-time privacy lawyers. In addition, many of the debated features in GMail are already present to some degree in competing products like MSN Hotmail, Yahoo Mail and AOL. And indeed, some of the reaction has been silly and a bit paranoid, and some of that has gotten a lot of the attention.

But there are also some deep issues here, worth discussing with not just Google but all the other webmail providers.

The thing many people reacted to the most was the idea of displaying ads keyed to words in your mail. We think of our mail as fairly private, and we do a lot of private stuff in e-mail. Google's ad-linking is all done by computer, they promise not to have human beings look at the mail (almost all the time). If only a computer "knows" your deepest secrets, is there a concern? I certainly let my own personal computer contain all sorts of private information, ranging from my finances to private e-mails with my family.

Even so, people have a reaction to a 3rd party computer doing scans like this. If you were offered a service that saved you money by having your paper mail opened by robots for scanning, which then inserted new junk mail in your box based on what it found, you might get a bit creeped out. Go further and consider a service that gave you free phone calls if it could have speech-recognizing computers listen in and barge in with product offers related to your conversation? It's easy to imagine an unpleasant situation where you get invited to a gay wedding in Vancouver, and find with it in your mailbox brochures for gifts, Vancouver hotels and a free copy of Out magazine. People have extended that fear into the e-mail realm.

Of course, webmail is an optional service. Those afraid of these sceneria can simply not use it, and that's an entirely reasonable answer. But it ignores an aspect of the privacy fears we have. In the modern era where computers threaten privacy, we are as afraid of outside computers knowing all about our lives as much as we are outside people. Even though we might trust the people running the computers today, or the human health insurance clerk who learns we have cancer, we are uncomfortable with both of those things. We are not quite as uncomfortable about the computer knowing, but it's hard to ignore the fear that, in spite of the best of intentions, information on external computers (and even our own computers) sometimes makes it out into the world.

People's fears here are sometimes irrational, but still real. And irrational fears often affect privacy and freedom, even when they are irrational. Consider the amusing Wall Street Journal story some time ago headlined, "Help, my Tivo thinks I'm gay!" (The Tivo suggests shows to you based on what you have watched before. Tivo says that this does not leave the box associated with your identity, though they do collect data on all Tivo use, stripping off the identity along the way.) People became annoyed at or scared by their video recorders.

Google is not ignorant of this issue, of course. They plan to work hard to not do something so bold as sexual ads on your salacious e-mails with your husband. They know that even irrational freaking-out generates a real consumer issue.

And it's not to be ignored that well-targetted advertising is itself a useful thing. If you take as a given that you're going to accept ads to subsidize an activity, few wish to have their time wasted by ads that are irrelevant. In addition, well-aimed advertising costs advertisers more because it is more effective -- which means you can get the ad subsidy you are seeking with fewer ads. Clearly many users find themselves buying products from these ads, products they might not have known about without them, so good ads can be a service unto themselves.

I'll talk about the result of some of the irrational fears in a moment, but first let's look at some of the real fears.

Our lives move online and outside

GMail is a big step in a concerning direction. If it's a success, millions of people will move a great deal of the record of their lives not just online, but online and stored with a 3rd party. This isn't the first time this will happen, but for millions it will be the biggest such jump. Particularly if one's searches and social network can be correlated with this information. My e-mail contains the story of my life, and what's not in there is often recorded in my searches.

As we move these things online and outside, we build some of the apparatus for a surveillance society. As usual, we don't plan to do so, and the people building it would oppose it being used that way. But they build it nonetheless. We make it so that having that surveillance becomes a "logical" step -- changing a law or a policy, or in some cases just pushing a button, rather than a physical step -- going into somebody's house to grab their papers.

When our papers are at home, mass surveillance of them simply doesn't scale. It's too expensive. Online, it scales well. Our networked computers at home are not very secure, of course -- probably less secure than Google's against unauthorized intruders. But they must be broken into a million times -- though possibly by one giant virus -- and those outside machines must be compromised (by the law or by system crackers) only once.

Webmail is, as noted, only a part of this trend. No surprise, since there are many technical advantages to centralization, especially when it comes to software maintenance. Installing, running and upgrading software on your home computer is hard. A remote computer is professional maintained, and almost surely a lot faster too. It can be reached from anywhere. In many cases, where you want to roam all around and access your data, or have servers receive data for you while your home computer is off, it's the only way to do things well. I won't pretend that such centralization is not quite useful, or imagine it is something we can stop from happening.

Many have written, correctly, that we have already seen this trend in Hotmail, AOL, Yahoo, Turbotax Online, Instant Messengers, Salesforce.com and all other "Application Service Providers" (ASPs.) That the trend has already started doesn't make it less disturbing.

GMail however, with the offer of a free gigabyte, makes a big jump in this trend. Free Hotmail users tended to keep only a bit of their mail online, deleting the rest. Hotmail forced them to. GMail (and soon other webmail offerings) will openly encourage the opposite.

Google is a good company with honest people, headquartered in a fairly free country with protection of rights that is among the best in the world. But that's not always so. I wonder, for example, about what it means to the people of China that we have built our instant messaging infrastructure and some of our E-mail infrastructure entirely with centralized servers and no encryption? Their government can and does routinely listen to internet traffic. When we build our systems, how often do we think of what it will mean when they become popular in China, or Saudi Arabia? Or what it means when they are sold to other companies whose policies are not so benevolent.

There are ways to buck this trend. Below, I'll be recommending that Google and its competitors work to encrypt your data when they store it for you.

ECPA

The Electronic Communications Privacy Act started out in the 80s as a blessing. It declared that e-mail was a private means of communication, and that we might hope for the same level of privacy in it as we have in phone calls and letters. Among other things, it means that police need a wiretap warrant to read your e-mails, and that your e-mail company's employees can't disclose your e-mails to others.

But the world has changed and the ECPA has not changed with it. E-mail in transit is protected, but those in law enforcement advocate that once mail is processed and stored, it is no longer the same private letter, but simply a database service.

GMail's big selling point is that they don't simply deliver your mail. They store it for you, and they index it so you can search it. (Of particular importance, you authorize them to scan your mail for these purposes, and that authorization is the act that risks stripping you of your rights.) All the other webmail companies who don't already do this will, I'm sure, quickly have offerings to compete with GMail. As noted, not only do they search it, but they scan on viewing to provide ads that match the content, making it not just a database but a shopping service. Should you click on those ads, the merchants will know you were reading a page, search or e-mail related to their ads.

Unfortunately, a database and shopping service doesn't look as much like an e-mail delivery service as it should according to the legal definitions in the ECPA. Thus, while Google promises not to peek into your e-mails or hand them to others, the danger is that this is now solely their contractual promise. With an e-mail delivery service covered by the ECPA, the law, not just Google's terms of service governs when your mail can be handed over.

Google also has some work to do on their privacy policy, because it does allow them to look at or release your e-mail in circumstances where they would be forbidden to do so if it were ECPA protected, such as a law enforcement "request." But even if it bound them as tightly as the law does, it still contains the ubiquitous clause letting them change the policy at will, without your consent -- so it's really not a strong restriction at all. The policy should state at a minimum that changes to it which would reduce the privacy of your mail can only take place with your explicit and informed consent at the time of the change.

A lot of privacy policies should say that, of course. They don't, because doing this in general is a logistic nightmare. However, with work, one can fine-tune such policies to dictate what can be changed and what can't, to do at least as well as what the law requires of e-mail delivery companies, if not better. This is not easy, it's hard. But it's worth doing.

When you use network services, you need a contract, and that contract will be written primarily to protect the interests of the service provider. When you run software on your PC, you may agree to terms when you install software, but as far as your own data is concerned there is usually no question of contract at all. The data is on your PC, and there don't have to be rules governing what others can do with it.

Without the ECPA protection, your e-mail (now just a database) can be seized against Google's will with an ordinary subpoena (vastly less involved than a wiretap warrant) or in the discovery phase of a lawsuit. With warrants, and in some rare cases even without them, your mail can be grabbed without you being informed that this has been done. Worse, Google has retained the right to hand it over in the case of a "request" from law enforcement, rather than a court order.

Of course, these legal techniques can be applied to the data you store yourself. However, short of a secret warrant to break into your house and seize your computer, it can't be done without your knowledge and involvement. You have the chance to fight any attempt to grab your mail. You have the power to get a lawyer and appeal any order in front of a judge. You give up some of that power when you put your e-mail database in somebody else's hands. Google is a good company that wants to please its users, they don't want to be subject to all these subpoenae. But they won't fight as hard as you would.

It's also important to note that most of these webmail providers are global companies, with servers around the world. The ECPA is a U.S. law, only protecting mail in the USA. Some other nations have protections but they certainly all don't. Unless care is taken, your mail could end up stored in another country without legal protections you were hoping for.

Now, after scaring you like this, let me add that this is an entirely new situation, and the courts have not yet ruled whether the ECPA covers your mail in a searching/advertising database service. It's possible they might, but from the text of the law, quite possible they would not. Past history suggests it is highly likely the Department of Justice will take the position that the protection is lost.

The DoJ in fact believes that the moment after you open your mail is is just an archive and loses some protections, though at least the 9th circuit court has disagreed with that -- up to the 180 day rule at least.

To learn more about the ECPA and e-mail you will find a good analysis in this paper. It's way more complex than I describe here.

The 180 day rule

In the hoped-for event that your webmail archives are protected by the ECPA as what it calls an ECS, they lose some of that protection after 180 days. This is not news, but a product like GMail, which encourages long-term archving of e-mail with the web mail provider brings the question to the forefront. After 180 days your e-mail archives can now be fetched without a warrant, through a special ECPA court order or a subpoena. (In most cases, but not all, you will get notice of such seizures.)

Expectation of Privacy

In the USA, privacy from government intrusion is defended by the Fourth amendment, which requires a warrant be issued by a judge for many kinds of searches and seizures. Over the years, court precedents have required that warrant when you have a "reasonable expectation of privacy" over what's being searched. The definition of when and where you have this expectation of privacy has been in flux. Court decisions have sometimes sustained the expectation of privacy, but often eroded it.

The higest standard of privacy has been "the privacy of your own home." For example, the courts have ruled you to not have as much expectation of privacy in a car as you do in a home. Not as much on your open land as inside your house. Not as much in an RV as in a house. Your day-guests don't have the same privacy in your house as you do.

When technology changes privacy, there is always a battle over this expectation. The police want to reduce it so they can do more without warrants. The public wants to keep their privacy. Recently police made a number of arrests over the years by using infrared scanners to look for signals coming from inside a home. The court eventually told them no: That even though the IR was emitted from the house for view by "anybody" with the right equipment, what went on inside was still private. Often we lose privacy, as a man who lived in his motorhome discovered when the police were able to search it like a car because he was parked in a parking lot rather than an RV park.

Others have learned that what they say in front of baby monitors is not private, even though it is said inside their homes, because it is transmitted "in the clear" outside your home. (Cell phone calls, also often sent that way, have statutory protection of your privacy.)

E-mail privacy is in crisis because most e-mail is sent without encryption. That means that almost all e-mails are like postcards. Anybody with access to the wires (or airwaves) they travel over can read them. Because of this, arguments are being made that you should have no more expectation of privacy in an e-mail than you have in a postcard, or worse, a postcard you hand to a 3rd party to carry. This question will remain in the balance for some time.

GMail and its competitors may tip this balance, particularly if the e-mail managed by the webmail companies loses its ECPA protection status, the risk of which is described above. I send my e-mails from my own private machine, and that part is private. But I send them anywhere, including to webmail users where they are stored in a 3rd party database for searching. Of course, that database has password-controlled access and I would like to hope it's private, but there are those who will argue it's a step below the privacy expectation one has for one's own home computer. With a home computer, somebody has to break into your home or the computer to read the mail. On a 3rd party server, they can do that, but they might also see it due to a change of policy.

Sadly, we can also expect arguments that e-mails read from a database over an open wireless network might be akin to the cordless phone or baby monitor situation.

One can hope such arguments will not win. But what is true that the more e-mail that is sent unencrypted, the more it is stored in private but external databases, the greater the arguments will be that you no longer really can expect that your mail is secure and private from being seen by parties other than yourself and the recipients. If the courts ever become convinced this is true, e-mail could lose the protections it currently has, designed to parallel the protections of paper mail and phone calls.

My hope would be that Google's design should not reduce that expectation of privacy. But all e-mail vendors should work hard to ensure they don't even raise the risk, let alone pitch us over the edge. What a terrible thing if we were to lose the cherished expecatation of privacy we want in our letters in the name of convenience. The ECPA is just an ordinary law protecting e-mail privacy, not as strong as a constitutional protection.

Search correlation

You've probably noticed that a lot of your web searches contain private information. I often type into Google things like the names of prescription drugs I have been given, to find out more about them. I use search engines to research the stocks I buy and look up my friends, or see what people are saying about my family. Very private stuff.

Largely we treat our searching as anonymous, though in fact it's not nearly so anonymous as we might like. All the major search engines use a cookie that allows the to correlate together all the searches we do. If like me, you have broadband, your computer's numeric internet address is also fixed -- either permanently like mine, or effectively permanently as it is for all those who don't turn their computer off or who have a network gateway box.

All of the companies providing e-mail and search together create a troubling risk that the private matters in our e-mail can be combined with the things we search for. It's no surprise that this potential is there. Search companies are all eager to find ways to improve the relevancy of their search results in order to please their users. It's what we want them to do. Learning things about you is one obvious technique to do that.

Again this is part of a trend toward creating a giant dossier of all your private information in a central place. Because users will demand more accurate search, this trend won't be stopped. However, companies can be encouraged to anonymize data they collect, making it hard or impossible to link back to the real person

Google has said they are not correlating search and e-mail (or their social network prototype called Orkut.) That's good, but for business and user interface reasons they are not likely to say this will always be true. The browser cookie system allows the e-mail and search systems to share information about your identity unless you go to extreme lengths to delete your cookies or use cookie-washing software. Even then, unless you are a dial-up user, your IP address is almost as good as the cookie, perhaps better. Of course, once you have a common login for e-mail and enhanced search services your activities will be fully linked, as they can be on Yahoo today. You can only wash this through the extreme step of using a web anonymizer which bounces your requests among cooperating servers that hide your address.

Global Search

The war on terrorism has rewritten the rules on what's possible in civil rights. Consider the idea that the government might come with a warrant or new law to an e-mail provider and say, "Search all your customer's e-mail to see if anybody was talking about planes and the World Trade Center before 8am on Sept 11."

Under traditional 4th amendment rules, such a broad fishing expedition would be unthinkable. But some people are finding it more thinkable. Some might even think it's a good idea, and proclaim they don't mind if this were done to their own mail.

Without large webmail archives, the idea wasn't even possible. Now it could be.

What can Google Do

Google is proud of its reputation as a good corporate citizen that tries to keep its users interests at heart. It has done this even against the wishes of its customers (the advertisers) by putting restrictions on ads that other sites wouldn't place. This has actually been a good business decision, but Google espouses a philosophy of not doing any "evil" while building their business. It's a good philosophy.

Encryption

The most obvious step Google could take would be to encrypt a user's e-mail, searching index and other associated data, so it can only be accessed using the user's password, and of course that password should not be stored when an e-mail session is over.

If need be, the mail can be held temporarily unencrypted before delivery to the user (because then it has ECPA protection) and thus indexed and tied to ads. Then it can be encrypted. Both the index and the mail contents must be encrypted so that they can't be read without your password. Police could get a wiretap warrant to watch you type in your password, so this is not as private as doing fully encrypted mail to your home PC, but as noted the warrant process defends your rights much more than the subpoena or contractual system does.

An overseas escrow system would allow recovery of your password if you lose it, and in the inevitable event of your death.

GMail could also encourage the use of encryption in sending mail, both by doing SMTP-over-TLS (a standard technique for encrypting mail as it moves from server to server) wherever possible for your incoming and outgoing mail, and also supporting standard e-mail encryption formats like S/MIME and PGP, as well as new opportunistic encryption systems. This would be a giant step forward.

Resist correlation with search

This should be resisted as long as possible. If business needs -- which means pleasing the customer -- demand it, ways should be developed so that it's hard to tie the correlated data back to a particular user. If need be, it might even be better to have an explicit login (with password) so that the correlation data is also encrypted and only available when the user is logged on. Though frankly, I use Google search hundreds of times a day -- I'm always logged on.

Think about whether you can make such correlation opt-in, requiring the user's agreement. You might be able to create more accurate search doing this, but if customers want that, is it too hard to add the step of getting them to knowingly agree to it?

Lobby to strengthen the ECPA

Google, Microsoft, AOL, Yahoo and others should join with us in pointing out that the ECPA is now outdated, and not providing enough legal protection for all the new technological innovations in e-mail delivery. Fight in court cases where the DoJ and others try to expand their powers to grab user e-mail.

All these companies could also push for similar and stronger protections in the other nations where they do business.

Continue to refine policies and educate the public

Much of what Google is doing with GMail is innovative and worthwhile. It would be ridiculous to see it banned, as Senator Figueroa would suggest. It's not a lot different in kind from all the other well established webmail services -- but this doesn't mean those services didn't also have issues. There is not at this time, for example, a reason to be afraid of GMail and not afraid of premium Yahoo mail. Within months, the competitors will also release products with large archives and other features to keep up with Google.

So Google needs to refine their policies and contracts. Any policy that can be changed to protect user privacy that does no business harm to the company's plans should be changed. Even ones which do impede possible business plans should be evaluated and some of them done.

What users can do

The hard truth is if you are concerned about your privacy, 3rd-party hosted web based e-mail may not be right for you. There are tools that will let you search the e-mail on your PC.

You can also be more careful about how cookies are used to track you on the web. Most browsers can help you control this. I recommend the absolutely free Mozilla browser which lets you easily turn on and off what cookies go to what sites. Google is a good site that lets you use it without cookies; not all sites are so kind.

The problem with privacy is that nobody cares about their privacy until after it's been violated. Only when Bill Gates discovered that his e-mail could be searched for a message about cutting off "Netscape's Air Supply" did he realize the danger in logging it. Many people only realize the danger in their records when they enter a lawsuit, or a custody battle. They all thought it would never happen to them.

If you are concerned there are a variety of resources, including tools for anonymous web surfing, fancy cookie-management and more.

Most importantly, tell companies that you care about your privacy. Because others, not yet finding it violated, are not giving this message even though they do care if they think about it.

On the appearance of surveillance

To close, let me add one other rule about privacy. It is not only important to have your privacy. It is important that you believe you have your privacy. If you even suspect that you are being watched, it changes your behaviour and you become less free as an individual.

Are you the same person at your mother's house for holiday dinner as you were your first year on your own at university? How much you think you are being watched affects your freedom. How much a society thinks it is being watched affects the freedom of the society.

The fear that computerized scanning of our e-mails (to display ads or filter out spam) will result in actual harm is largely baseless. But even irrational fears affect our freedom, and this should be considered in software design.

 

[Reprinted by kind permission of Brad Templeton from his home page.]

 

Published Apr. 23, 2004— Reads 72,485 — Feedback 13
Copyright © 2004 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
About Brad Templeton
Brad Templeton founded and ran ClariNet Communications Corp., the first Internet-based content company, then sold it to Newsedge Corporation in 1997. ClariNet publishes an online electronic newspaper delivered for live reading on subscribers' machines. He has been active in the computer network community since 1979, participated in the building and growth of USENET from its earliest days and in 1987 he founded and edited rec.humor.funny, the world's most widely read computerized conference on that network. He has been a software company founder, and is the author of a dozen packaged microcomputer software products. He is chairman of the board of the Electronic Frontier Foundation, the leading civil rights advocacy group for cyberspace. He also sits on the advisory boards for a few Internet startups. Currently he is building a new startup to reinvent the phone call.

Add Your Feedback

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

Someone have an invitation of Gmail? please :)
Thanks for all.

>>> dipujol@tinet.org

Thank you, Google! I'm a proud user of GMail. Like Jliendo said, why would I pay 3o dollar to upgrade my account when I can have 1GB for free? Keep the internet free!

Browser-side Javascript public key encyption
http://www.oreillynet.com/cs/user/view/cs_msg/38392
( expanded from an earlier post of mine on 13th April
http://slashdot.org/comments.pl?sid=103799&cid=8842527
)
QUOTE
It is possible to use browser side javascript to encrypt and decrypt content, including the use of RSA public key encyption. See RSA Algorithm Javascript Page.
http://oregonstate.edu/dept/honors/makmur/
( For efficiency, public key encyption methords generally decodes a randomly generated key for the single key encyption which encypts the plaintext )

It should be possible to use public key encryption with inspected outgoing and incoming email gateways to ensure email content privacy.

Client side Javascript is used to generate the public and private keys. Single key encryption using a "privacy password" is used to encrypt the private key to store it server side.

-Incoming SMTP Email
| Incoming Gateway encrypts plaintext email with user's public key
- Encrypted Email
| Gmail Web based email server
- Encrypted Email
| User's Web Brower fetches the private key from the server
| User enters "privacy password"
| browser javascript decypts the private key.
| browser javascript uses private key to decode and display encrypted Email
- Decrypted Email only at user browser side
| User Reads and enters reply into text window
| More Javascript encrypts outgoing content using outgoing gateway's public key
- Encrypted Email
| Outgoing Email gateway decrypts outgoing Email
- Decrypted Email

As long as the Incoming and Outgoing email servers remain seperate,subject to inspection and undergo regular auditing, then the email stored on Gmail will remain unreadable to Google.

Users should be able choose a default encyption policy and mark individual messages as private or public.

Mail between Gmail individual users could actually be more secure than outside email, as the sender could encypt the message directly using the recipients public key.
UNQUOTE
From the same thread ...
If it is successful. could you avoid replying to Gmail users?
QUOTE
o At work around 20% of legitmate non-spam emails , mostly inquiries, are from Hotmail or other webmail services. If Gmail is going to as successful as Hotmail, it's going to become more difficult to avoid replying to legitmate emails from it's users.

Google could also use a number of mechanisims to get email recipiants to connect to the Gmail service though the browser, including keeping email attachments server side inserting an URI in the email. Hotmail, or any other web email provides could do the same, even using the spammer trick of webbug images emmbedded in the HTML'ed email. Significant profilable information can be gathered from the email headers alone.

There is a potential network effect on the erosion of privacy, made more prominent with users moving to a few very large service providers.

Privacy advocates have a legitmate concern over the issues surrounding the profiling and privacy of email. While Google remains under its current management, I am personally less concerned. However just as in January 1998 Hotmail was purchased by another company, Microsoft, Google could be sold to another company with even less moral scruples.
UNQUOTE

I don't know and could be completely wrong about it, but this campaign of privacy concerns about the way Gmail is going to scan our mails and how evil its is, seems to me more like a kind of Yahoo! and MSN and who knows who other else fighting for their survival...why would I pay 20 o 30 something dollar a year to upgrade my Inbox to 25/30MB when I can have 1GB for free?

And by the way, isn't Yahoo! or MSN already scanning every single of our mails in search of antivirus and antispam? No privacy concerns here? Am I missing something here?

IO take my hat off to Mr Templeton for his resounding climax: this is the nub of the issue after all...

To close, let me add one other rule about privacy. It is not only important to have your privacy. It is important that you believe you have your privacy. If you even suspect that you are being watched, it changes your behaviour and you become less free as an individual.

I have an early gmail account, and have used it a little.

The most serious concern is the privacy policy itself.

http://gmail.google.com/gmail/help/privacy.html

Specifically:

As a standard email protocol, when you send an email from your Gmail account, Gmail includes your email address and user name in the header of the email. Beyond this, we do not disclose your personally identifying information to third parties unless we believe we are required to do so by law or have a good faith belief that such access, preservation or disclosure is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or governmental request, (b) enforce the Gmail Terms of Use, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues (including, without limitation, the filtering of spam), (d) respond to user support requests, or (e) protect the rights, property or safety of Google, its users and the public.

"governmental request" means pretty much they'll turn over any information withouut a subpoena. I suppose for a free service, you get what you pay for.

How about this as a workaround for Gmail and privacy?

1. use a browser/email plugin that can automatically encrypt your email before sending it.

2. use a browser/email decrypter plugin to unencrypt your mail when you read it.

PGP as a form of encryption is commonly available.

Theoretically possible but I am not sure how practical it is.

This way all the webmail programs do not know what is being transmitted/stored.

How about other applications that can use the 1GB of storage from gmail?

e.g. online filesystem - files stored as attachments to emails to yourself.

What else?

Other people's comments on Gmail:

Anyone seen http://jogin.com/weblog/archives/2004/04/15/juice
">here? Lots of good material:

Perhaps the most prominent feature of Gmail is the fact that conversations are grouped into, well, conversations, as opposed the familiar lengthy list of free floating messages from different people, concerning different things, it's a concise list of conversations.

Reading an e-mail conversation like you would normally read a flat forum actually makes a lot of sense, especially since Gmail let's you expand and collapse individual messages without even reloading the page. Some forums I've seen, like the one over at Kuro5hin, also allow you to dynamically expand and collapse individual messages, but it's not as friction free as the experience with Gmail, with which there are no bugs, no hickups, it's very fast and it's completely transparent.

It also makes it very easy to check up on what has been said earlier in the conversation; instead of having to find and open a different e-mail, in a new window at that, you just scroll up and track through the messages in chronological order. It's far, far, easier to find a given message you're looking for, buried somewhere in a conversation, since you don't have to open each message individually, but instead scan over each of them effortlessly.

When a conversation becomes lengthy, like over six or so messages in total, the list is collapsed even further, but is of course readily available at the click of a button, without the page reloading.

Grouping individual messages into conversations like this, while only a superficial change at first glance, will probably change the way people use e-mail. That does sound like a bit of a cliché, doesn't it? Perhaps it's just me, it could very well be, but I've already noticed that I perceive and think of e-mail conversations differently using Gmail, than otherwise. When using other e-mail clients, both web based and native ones, conversations aren't grouped with each other, but rather scattered and interspersed with other conversations, they're not really like conversations at all, but more like separate, detached messages.

I'm not sure if this change of perspective has only had this drastic effect on me, but having e-mails grouped into conversations has kind of had an encouraging effect on me. Since e-mail conversations don't get interspersed with others in Gmail, since they don't get scattered all over the place, they don't seem to want to die. Not in and of themselves, at least. I would say, I think, this will make people more likely to keep an e-mail conversation alive, as time goes by and other unrelated e-mails comes in, because the conversation is still there, it doesn't get dissipated. I'm pretty sure that it will have that effect on me, it has had a little bit of that effect on me already, but perhaps it's just me.

for me there are two classes of people those who have a gmail account and those who dont... sadly i dont. any body want to share their username password. ???? ;)

I've had a number of jobs in which I was partly responsible for keeping the email running. On a number of occasions, I had the fun of helping a user with a failed message that was obviously very personal and not job related. I always took the approach of making it clear that I wasn't concerned with the contents of their message, I was just fixing a failure in the email system. I tried to get across the idea that, yes, I can read any message that goes through the system, and so can anyone else with a position of responsibility. I tried to get them to understand that the software at every stage does have to read and understand at least a part of any email message (the headers), and there's no technical reason that the software can't be made to examine anythingg in a message. Also, email is stored temporarily on any number of machines while in transit, and isn't always deleted. The user's message was one that wasn't deleted, because there was a problem with it, and other messages could be saved, too.

One of the other ideas I've tried to get across is that, although users might find me trustworthy, they (and I) have no idea who else may be looking at their email or saving copies. This could happen anywhere along the network path. Not that this should be a problem. They shouldn't get all paranoid over it. But it's something that they should understand.

If folks don't understand all this, they have a fundamental misunderstanding of how email has always worked. Gmail is no different, reallly. Privacy in email is an illusion, unless you've encrypted the contents.

Even if Google keeps e-mail forever (1 year)... if all they are going to use it for are targetted text ads, who the hell cares?

Tim's piece on 'The Fuss About GMail' which is also good on this issue. Great contribution, Brad!!


Presentation Slides
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
HyperConvergence came to market with the objective of being simple, flexible and to help drive down operating expenses. It reduced the footprint by bundling the compute/storage/network into one box. This brought a new set of challenges as the HyperConverged vendors are very focused on their own proprietary building blocks. If you want to scale in a certain way, let's say you identified a need for more storage and want to add a device that is not sold by the HyperConverged vendor, forget about it...
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, addressed this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of the ...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
In his session at 21st Cloud Expo, James Henry, Co-CEO/CTO of Calgary Scientific Inc., introduced you to the challenges, solutions and benefits of training AI systems to solve visual problems with an emphasis on improving AIs with continuous training in the field. He explored applications in several industries and discussed technologies that allow the deployment of advanced visualization solutions to the cloud.
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution. In his session at @ThingsExpo, Akvelon expert and IoT industry leader Sergey Grebnov provided an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especially great option for projects that require multiple and frequent contributions to be integrated. But… securing CICD best practices is an emerging, essential, yet little understood practice for DevOps teams and their Cloud Service Providers. The only way to get CICD to work in a highly secure environment takes collaboration, patience and persistence. Building CICD in the cloud requires rigorous ar...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, added the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor analytic...
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
What's the role of an IT self-service portal when you get to continuous delivery and Infrastructure as Code? This general session showed how to create the continuous delivery culture and eight accelerators for leading the change. Don Demcsak is a DevOps and Cloud Native Modernization Principal for Dell EMC based out of New Jersey. He is a former, long time, Microsoft Most Valuable Professional, specializing in building and architecting Application Delivery Pipelines for hybrid legacy, and cloud ...
The “Digital Era” is forcing us to engage with new methods to build, operate and maintain applications. This transformation also implies an evolution to more and more intelligent applications to better engage with the customers, while creating significant market differentiators. In both cases, the cloud has become a key enabler to embrace this digital revolution. So, moving to the cloud is no longer the question; the new questions are HOW and WHEN. To make this equation even more complex, most ...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, discussed key challenges and solutions to powering a ride sharing and/or multimodal model in the age ...
CIOs and those charged with running IT Operations are challenged to deliver secure, audited, and reliable compute environments for the applications and data for the business. Behind the scenes these tasks are often accomplished by following onerous time-consuming processes and often the management of these environments and processes will be outsourced to multiple IT service providers. In addition, the division of work is often siloed into traditional "towers" that are not well integrated for cro...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software. They hope to capture value from emerging technologies such as IoT, SDN, and AI. Ultimately, irrespective of the vertical, it is about deriving value from independent software applications participating in an ecosystem as one comprehensive solution. In his session at @ThingsExpo, Kausik Sridhar, founder and CTO of Pulzze Systems, discussed how given the magnitude of today's application ...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
The past few years have brought a sea change in the way applications are architected, developed, and consumed—increasing both the complexity of testing and the business impact of software failures. How can software testing professionals keep pace with modern application delivery, given the trends that impact both architectures (cloud, microservices, and APIs) and processes (DevOps, agile, and continuous delivery)? This is where continuous testing comes in. D
Between the mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at @DevOpsSummit at 19th Cloud Expo, Charles Kendrick, CTO at Isomorphic Software, presented a revolutionary model enabled by new technologies. Learn how business and develop...
@ThingsExpo Stories
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Archi...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Michael Maximilien, better known as max or Dr. Max, is a computer scientist with IBM. At IBM Research Triangle Park, he was a principal engineer for the worldwide industry point-of-sale standard: JavaPOS. At IBM Research, some highlights include pioneering research on semantic Web services, mashups, and cloud computing, and platform-as-a-service. He joined the IBM Cloud Labs in 2014 and works closely with Pivotal Inc., to help make the Cloud Found the best PaaS.
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...



2016 | 2015 | 2014 | 2013 | 2012

Register and Save!
Save $1,505
on your “Golden Pass”!
before June 30, 2018!
Call 201.802.3020


New York Call for Papers Open
Submit
submit your speaking proposal
for the upcoming Cloud Expo in
New York City!
[November 11 - 13, 2018]


Cloud Expo 2018 East
Sponsorship Opportunities
Please Call
201.802.3021
events@sys-con.com
Sponsorship opportunities are now open for Cloud Expo 2018 New York, Novemeber 11-13, 2018, at the Roosevelt in New York City. For sponsorship, exhibit opportunities and show prospectus, please contact events@sys-con.com.



Testimonials
This week I had the pleasure of delivering the opening keynote at Cloud Expo New York. It was amazing to be back in the great city of New York with thousands of cloud enthusiasts eager to learn about the next step on their journey to embracing a cloud-first worldl."
@SteveMar_Msft
General Manager of Window Azure
 
How does Cloud Expo do it every year? Another INCREDIBLE show - our heads are spinning - so fun and informative."
@SOASoftwareInc
 
Thank you @ThingsExpo for such a great event. All of the people we met over the past three days makes us confident IoT has a bright future."
Yasser Khan
CEO of @Cnnct2me
 
One of the best conferences we have attended in a while. Great job, Cloud Expo team! Keep it going."

@Peak_Ten


Who Should Attend?
Senior Technologists including CIOs, CTOs & Vps of Technology, Chief Systems Engineers, IT Directors and Managers, Network and Storage Managers, Enterprise Architects, Communications and Networking Specialists, Directors of Infrastructure.

Business Executives including CEOs, CMOs, & CIOs , Presidents & SVPs, Directors of Business Development , Directors of IT Operations, Product and Purchasing Managers, IT Managers.

Download Cloud Expo Show Guide
Cloud Expo Show Guide
Download PDF

Join Us as a Media Partner - Together We Can Rock the IT World!
SYS-CON Media has a flourishing Media Partner program in which mutually beneficial promotion and benefits are arranged between our own leading Enterprise IT portals and events and those of our partners.

If you would like to participate, please provide us with details of your website/s and event/s or your organization and please include basic audience demographics as well as relevant metrics such as ave. page views per month.

To get involved, email events@sys-con.com.

@ThingsExpo Blogs
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Ec...
We have been traveling a lot lately. Why? Here at Regalix, we help large global companies with their customer success and sales enablement initiatives, which include things like digital marketing, knowledge management, customer experiences, sales operations, customer service and support, rewards and loyalty programs, etc., all of which are critical to the business and are today being digitally transformed. While helping businesses transform themselves in these areas we have seen and learned a great deal. Let me share some of the lessons we have learned.Org Charts, Centralization and Customer E...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Architect for the Internet of Things and Intelligent Systems, described how to revolutionize your archite...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our ability to monitor behavior, gather even more customer data and potentially deliver outstanding experience...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on organizations of all sizes and in every line of business. Fintech is a constant battleground for th...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, ...
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8 in New York City, NY.
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infras...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
"We are still a relatively small software house and we are focusing on certain industries like FinTech, med tech, energy and utilities. We help our customers with their digital transformation," noted Piotr Stawinski, Founder and CEO of EARP Integration, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8 in New York City, NY.
@CloudExpo Blogs
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
Last year was another banner year for security breaches, sad but true. At times it felt like a week did not go by without the announcement of another large corporate security breach (that usually happened sometime in the past) and the personal information of millions of people was potentially at risk. One breach in particular stands out to me. The Equifax breach that occurred last September. Approximately 145 million individuals' personal information had potentially been acquired by the hackers.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Ec...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
The next BriefingsDirect IT business model innovation interview explores how pay-as-you-go models have emerged as a new way to align information technology (IT) needs with business imperatives. We’ll now learn how global aerospace and defense integrator Northrop Grumman has sought a revolution in business model transformation in how it acquires and manages IT. Here to help explore how cloud computing-like consumption models can be applied more broadly is Ron Foudray, Vice President, Business Development for Technology Services at Northrop Grumman. The interview is conducted by Dana Gardner, Pr...
We have been traveling a lot lately. Why? Here at Regalix, we help large global companies with their customer success and sales enablement initiatives, which include things like digital marketing, knowledge management, customer experiences, sales operations, customer service and support, rewards and loyalty programs, etc., all of which are critical to the business and are today being digitally transformed. While helping businesses transform themselves in these areas we have seen and learned a great deal. Let me share some of the lessons we have learned.Org Charts, Centralization and Customer E...
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. In this session, learn how today's business leaders are managing finance in the cloud and the essent...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Commvault, discussed how to cut costs, scale easily, and unleash insight with CommVault ...
With IBM, Google, and Microsoft pouring funding into the research of quantum computing, it's really starting to look like we are going to see the benefits in the next 5 - 10 years. Google may be just weeks from announcing they reached the quantum supremacy milestone and IBM may not be far behind either. Today, I wanted to share my thoughts on how quantum computing may affect cryptography as we know it. When we talk about the basic cryptography used for things like TLS when you access your bank's website, the premise behind securing your data is surprisingly simple. The certificate uses a pu...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on organizations of all sizes and in every line of business. Fintech is a constant battleground for th...
HyperConvergence came to market with the objective of being simple, flexible and to help drive down operating expenses. It reduced the footprint by bundling the compute/storage/network into one box. This brought a new set of challenges as the HyperConverged vendors are very focused on their own proprietary building blocks. If you want to scale in a certain way, let's say you identified a need for more storage and want to add a device that is not sold by the HyperConverged vendor, forget about it. This meant that up to now the HyperConverged vendors were in charge of the requirements.
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audiences.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, ...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors!
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8 in New York City, NY.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no idea how to get a proper answer.
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some form of XaaS – software, platform, and infras...
SYS-CON.TV
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th...
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa C...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"Opsani helps the enterprise adopt containers, help them move their infrastructure into this modern world of DevOps, accelerate the delivery of new features into production, and really get them going on the container path," explained Ross Schibler, CEO of Opsani, and Peter Nickolov, CTO of Opsani, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the S...
"ZeroStack is a startup in Silicon Valley. We're solving a very interesting problem around bringing public cloud convenience with private cloud control for enterprises and mid-size companies," explained Kamesh Pemmaraju, VP of Product Management at ZeroStack, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Evatronix provides design services to companies that need to integrate the IoT technology in their products but they don't necessarily have the expertise, knowledge and design team to do so," explained Adam Morawiec, VP of Business Development at Evatronix, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're developing a software that is based on the cloud environment and we are providing those services to corporations and the general public," explained Seungmin Kim, CEO/CTO of SM Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We focus on composable infrastructure. Composable infrastructure has been named by companies like Gartner as the evolution of the IT infrastructure where everything is now driven by software," explained Bruno Andrade, CEO and Founder of HTBase, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo at the Javits Center in New York City, NY.
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in ...