Home
Schedule
Conference Info
Sponsorship Information
IBM Watson AI Day
Registration
Press Registration
Speakers
Sessions
Sponsors
Exhibitors
JETRO × Six Prefectures of Japan Pavilion Exhibitors
Media Sponsors
  Topics
  Call For Papers
  Hotel Info
  Past Events
Untitled Document
2017 West
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

Bronze










Untitled Document
2017 West
Keynote Sponsor


Untitled Document
2017 West Exhibitors
























@ThingsExpo











Untitled Document
2017 West JETRO ×
Six Prefectures
of Japan
Pavilion Exhibitors



















Untitled Document
2017 West Media Sponsors














Untitled Document
2017 East
Premium Sponsors
Diamond



Platinum
@DevOpsSummit

@DevOpsSummit

Silver
@DevOpsSummit


Bronze










Untitled Document
2017 East Exhibitors
@DevOpsSummit




































Untitled Document
2017 East Media Sponsors
















Untitled Document
2016 West
Premium Sponsors
Platinum Plus



Silver
@ThingsExpo

Bronze







Untitled Document
2016 Welcome Reception Sponsor

Untitled Document
2016 West Exhibitors










@DevOps Summit






@DevOps Summit

@WebRTC Summit












@WebRTC Summit









@DevOps Summit

Untitled Document
2016 West Media Sponsors











Untitled Document
2016 East Gold Sponsors

@ThingsExpo

Untitled Document
2016 East Silver Sponsors


@DevOps Summit

Untitled Document
2016 East Bronze Sponsors

Cloud Expo







Cloud Expo

Untitled Document
2016 East Vendor Presentation Sponsors

@DevOps Summit

Untitled Document
2016 East Exhibitors

@DevOps Summit





@ThingsExpo



@DevOps Summit

@ThingsExpo


@DevOps Summit









@DevOps Summit







@DevOps Summit










Untitled Document
2016 East Media Sponsors










Untitled Document
2015 West Gold Sponsor

Untitled Document
2015 West Silver Sponsor


Untitled Document
2015 West Bronze Sponsors

Cloud Expo |@ThingsExpo

Cloud Expo | DevOps Summit


@ThingsExpo





@DevOps Summit

@ThingsExpo


@ThingsExpo

Untitled Document
2015 West Exhibitors












@DevOps Summit





@DevOps Summit












@DevOps Summit

@DevOps Summit




@ThingsExpo


@DevOps Summit


Untitled Document
2015 West Session Sponsor

Untitled Document
2015 West E-Bulletin Sponsor

DevOps Summit

Untitled Document
2015 West
Association Sponsors

Untitled Document
2015 West
Media Sponsor

Untitled Document
2015 East Gold Sponsor


WebRTC Summit

DevOps Summit

Untitled Document
2015 East Silver Sponsor

DevOps Summit

WebRTC Summit


Untitled Document
2015 East Bronze Sponsor

DevOps Summit

Cloud Expo | DevOps Summit
@ThingsExpo

DevOps Summit

DevOps Summit

Untitled Document
2015 East Delegate Bag Sponsor


Untitled Document
2015 East Exhibitors


DevOps Summit


@ThingsExpo



DevOps Summit







Cloud Expo | @ThingsExpo

@ThingsExpo
@ThingsExpo
DevOps Summit

DevOps Summit
@ThingsExpo
DevOps Summit
DevOps Summit
DevOps Summit
DevOps Summit
DevOps Summit



@ThingsExpo

Untitled Document
2015 East
Media Sponsor

Facebook vs. Data Portability | @CloudExpo #Cloud #BigData #Storage
A defiant act of civil disobedience against Facebook by Power Ventures led to an Eight-Year court battle

Facebook vs. Data Portability: Who Owns an Individual's Data? Supreme Court Asked to Decide

From 2006 to 2011, Power Ventures operated a groundbreaking online communications, personal data management, and social networking aggregator hosted at the website www.power.com. Power offered registered users the capacity to access multiple online social networks (e.g., LinkedIn, Twitter), messaging services (e.g., Microsoft messenger-MSN), and email accounts (e.g., Google mail) through a single, integrated online interface consisting of a digital dashboard and browser. This online interface also featured popular add-in applications like a unified address book and mailbox integrating all of a user's contacts, emails, social network messages, and instant messages in one place. The interface additionally enabled Power users to move files between different accounts with a click-and-drag function, like a user moves folders on an AppleOS or Microsoft Windows desktop.

You had over 20 million users at your peak. How did Power.com work and why was it so valuable for users?

Steven Vachani, CEO of Power Ventures: Power offered its users the capacity to access multiple online social networks (e.g., LinkedIn, Twitter), messaging services (e.g., Microsoft messenger-MSN), and email accounts (e.g., Google mail) through a single, integrated online interface consisting of a digital dashboard and browser. This online interface also featured popular add-in applications like a unified address book and mailbox integrating all of a user's contacts, emails, social network messages, and instant messages in one place. The interface also allowed Power users to move files between different accounts with a click-and-drag function, like a user moves folders on a Mac or Microsoft Windows desktop.

How did your Data Portability functionality work for users?

Vachani: We offered our users both portability and the ability to have all their data (contacts, photos, files, messages) synchronized across their different sites. Our data synchronization and portability features were particularly popular among our users. Imagine you wanted move or copy a thousand photos and photo descriptions from Facebook to another social network or to a cloud storage account such as Dropbox. Just to move one photo, it would take several steps to click, download, and save each photo on your device, and several more steps to recreate each folder. Just as you use a moving company in the real world to transport your possessions from one home to another, Power worked as a ‘digital mover.' It allowed users to move, synchronize, or copy all of their online data freely between accounts with a simple drag-and-drop functionality. Power was a new type of operating system for the Internet, in the same way that Windows is an operating system for your desktop.

You just petitioned the US Supreme Court to decide on an 8-year-long battle between you and Facebook on the issue of data portability. What is the petition about?

Vachani: Our petition asks the Supreme Court to clarify once and for all who truly owns an individual's data and property on the Internet. More importantly, we are asking the court to definitively clarify if a social network, cloud storage provider, or other website has the right to obstruct you, or any third party you authorize to assist you in moving your personal data to another site or to a personal computer.

You are arguing that the 9th Circuit's decision sets a dangerous precedent which obstructs data portability and gives any social network, cloud storage provider, or other website the ability to lock a user out of their online data or possessions. Can you explain this?

Vachani: Let me give a more familiar example to make my point. Imagine if the 9th Circuit Court had said that your landlord was legally authorized to restrict you from using boxes, movers, and a moving truck to help you pack, ship, and transport your personal belongings outside of your current home to a new home. This would force you against your will to either not move at all or to abandon your personal possessions. This is exactly what the 9th Circuit ruled in regards to an individual's rights to freely move their online data and property. Now, any social network ( i.e. Facebook or LinkedIn) or cloud storage site (i.e. Dropbox, Microsoft, Google, or Apple) can lock your data inside their site and make it very difficult for you to move your digital property. If you or your digital mover (i.e. Power.com)  try to help you move your data, and Facebook doesn't want you to do this any more, you could both face criminal penalties.

Facebook claims that you violated the CFAA, a federal anti-hacking law and the 9th circuit decision partly supports Facebook's claim. How did 9th Circuit justify this decision?

Vachani: After the popularity of the movie "War Games" in the early 1980's, it became a catalyst for the creation of a severe anti-hacking law with federal criminal penalties specifically targeted at combating hacking what the CFAA calls a ‘protected computer.' The CFAA defines a ‘protected computer' very specifically as a computer used by the US government or US financial institutions and they also include computers used to facilitate interstate or international commerce or communication for the government. The penalties for CFAA violations could range from 5 to 20+ years in prison.

The CFAA was created back in the early 1980's at a time when nobody could have foreseen the Internet as we know it today with billions of users using social media, instant messaging, and personal cloud storage sites. In the early 1990's, creative prosecutors started to broaden the scope of the CFAA to everything well beyond the direct hacking of government ‘protected' computers for which the law was originally intended. Over the last twenty years, the CFAA went down a slippery slope where now even private companies can use the CFAA to intimidate and scare their competitors or even individual users from doing anything they don't like. This includes relatively innocuous actions such as not allowing you to give your password to your mom, your friend or a third party or authorizing a third party digital moving service to assist a user to move their own data to a new place.

If users gave you their passwords and authorized you to access their accounts on their behalf and for their benefit, why does Facebook and the 9th Circuit consider this to be a violation of one of the government's most serious federal hacking laws?

Vachani: Facebook's CFAA claim, which the 9th Circuit adopted, was that Power accessed its website and servers- which they argue is also a "protected computer" under CFAA-and that it did so "without authorization" since Facebook had explicitly told them to desist.  In Facebook's view, the authorization to Power from the individual users to access their own Facebook data was irrelevant after Facebook had asked Power to stop assisting users to organize and move their own personal data.

The 9th Circuit has effectively ruled that a website owner has the unilateral right to prevent or obstruct a user from moving their data from one site to another location. As in my earlier analogy, this is the same as if the courts had legally authorized all landlords in the country to restrict you from using boxes, movers, and a moving truck to help you pack, ship, and transport your personal belongings outside of your current home to a new home.

How did the 9th Circuit justify this decision?

Vachani: The 9th Circuit Court analogized Power's conduct to a person given permission to access jewelry in a friend's safe deposit box who walks into the bank with a shotgun to whom the bank refuses entry. The analogy is inept and misleading, because Facebook's mission is not to secure the user's "property" (e.g., photos, friends' contact information) in an online vault, but rather to share it with friends and family and sometimes the public at large.  Furthermore, Power did not wield a figurative gun: its user-authorized entry into users' Facebook data was not even arguably coercive or dangerous, as evidenced by the fact that every other online service in Facebook's position (like Google and Microsoft) permitted Power to operate with millions of users in their site from 2006-2011 when Power ceased operations.  In fact, one of the same judges who ruled in favor of this decision, Judge Wardlaw, noted during the 9th Circuit oral argument that ‘physical property analogies are often unhelpful in the online context.'

How do you assess the situation?

Vachani: I believe this ultimately comes down to common sense and existing precedent for standard behavior for a user to access and move their data out of a web site. If Power was truly carrying a shotgun, there are actually very serious existing laws and commonly accepted precedents that would define this as dangerous behavior. In the case of Power, we were performing the exact same actions that every user themselves can and do every time they access Facebook. Like a mover who is contracted to move your personal property, we move this data more efficiently and professionally than a user could do manually. Facebook themselves admitted on the record that Power caused no damage and also didn't challenge our proof that there was not single documented complaint by any user of Power performing the services that the user's asked us to do. Had we been carrying a ‘shotgun' or disrupting the peace on Facebook, you can imagine that at least one user from our millions of users using our service might have filed a complaint. In this case, not a single one of our millions of users documented a complaint to Facebook or anyone else and Facebook was not able to produce any complaints or cite any damages.

According to the cease and desist letter Power received, Facebook, stated that you had violated their terms and conditions and had to leave. How could Power justify its actions?

Vachani: Initially when we received the cease and desist request, we were quite shocked that Facebook was asking us to cease assisting users to export their own data and property. This was even more shocking considering that Facebook and every other major social media web sites at the time were currently and had been for many years using this exact same technique of requesting user's password from their other accounts and then assisting users to export their address books and other data into Facebook. In fact, the import address book feature to assist users to bring their friends to Facebook was likely the single biggest contributor to Facebook's early acquisition of users.

We believed and made clear that the user's right to own, control, and move their data without obstruction is an inalienable right just as the right to freely port your mobile phone number and to freely move your possessions from your apartment. We also found Facebook's justification stating that we were in violation of Facebook's terms and conditions and that we were hackers under the CFAA's definition of hacking, to be very disturbing interpretations of government laws which could be harmful to future rights of Internet citizens. Therefore, In an act of civil disobedience for what we viewed as an unjust and flawed interpretation a user's rights and existing laws, we held our ground and engaged Facebook in meaningful dialogue on this very important matter. We invited Facebook to engage in meaningful discussions on this matter. After Facebook filed its lawsuit, we moved our dispute to the legal system, and now the Supreme Court, to resolve this important question once and for all.

Why is Data Portability so important to the future of the Internet?

Vachani: Data portability is among the most important digital issues of our time and the determination of who truly owns an individual's online presence will be crucial to the growth and economics of our digital culture. Today, our entire professional and personal life, including our hard drives and software/apps, are all stored in the cloud Users invest hours creating and organizing their entire life online in the cloud and on social network. Their photos, videos, messages, personal and work files, and pretty much everything else we do, daily to social networking and online cloud, but few really understand the nuances of terms and usage agreements.

The European Union has recently presented guidelines on the right to Data Portability confirming that users must have the right to transmit personal data from one data controller to another data controller ‘without hindrance.' Just as the EU has clearly identified the emerging importance of this issue, we are asking the Supreme Court to recognize the national and international importance of this issue affecting hundreds of millions of American Internet users and billions of global Internet users.

What has the support been like so far from human rights organizations and how do you expect for such support to help your case?

Vachani: We have the support of the Electronic Frontier Foundation (EFF) and the ACLU which weigh in favor of data ownership as an individual right. We expect that their support will help demonstrate that digital ownership is a human right. As society evolves and we become more reliant on technology, ownership and control of our digital identities will become increasingly vital to protect.

Supreme Court - Question presented.jpg

What do social networking sites like Facebook have to gain and lose in the stake for data portability? Why would they oppose a site like Power.com?

Vachani: Facebook argued that Power.com violated the CAN SPAM Act and the CFAA by accessing Facebook without authorization. Facebook did not want individual users to be able to move their data and online property around freely, or to be able to control their own photos, contacts, and messages from Facebook to other accounts. Facebook stood to lose some control over user data, which is why they opposed Power.com. The 9th Circuit eventually ruled that Power did indeed have authorization to access user data because it was given to Power by users themselves.

To be clear about this, like many other social networks that came and disappeared, Facebook might not even be around today if they had not used these unfair and anti-competitive tactics. The lack of data portability dramatically reduces innovation and investment by potential innovators to try to compete against Facebook. Had seamless unobstructed one click data portability been available just as seamless number portability is available with mobile phone company, there is a very good chance that Facebook would most likely not be the market leader that it is today and that the Internet and landscape of social media players would look very different today. Google spent a fortune trying to get traction on its Google Plus social network, but ultimately users were not willing to use a new social network when all their data and contacts were still locked inside Facebook. Power.com empowered users to own and control all their data in all places on their own terms rather than Facebook dictating and controlling the terms of how you want to use your own data and digital property.

What was the outcome of the 9th Circuit ruling?

Vachani: The 9th Circuit reversed prior claims by Facebook that Power violated the CAN SPAM Act and the CFAA by accessing Facebook without authorization, and ruled that Power did indeed have authorization to access user's data because it was given to Power by users themselves. At the same time, the court also ruled against Power stating that its initial authorization by users was then revoked after Facebook asked Power to leave.

Why is this fight so important to you and to Internet users?

Vachani: Today, the internet is at the foundation of every aspect of our lives. It is time for digital human rights to be treated with the same level of gravity as other human and civil rights violations. Users should have the same level of ownership and control of their digital data as they do their physical property.

About Power Ventures (formerly operating as Power.com)

From 2006 to 2011, Power Ventures operated a groundbreaking online communications, personal data management, and social networking aggregator hosted at the website www.power.com. Power offered registered users the capacity to access multiple online social networks (e.g., LinkedIn, Twitter), messaging services (e.g., Microsoft messenger-MSN), and email accounts (e.g., Google mail) through a single, integrated online interface consisting of a digital dashboard and browser. This online interface also featured popular add-in applications like a unified address book and mailbox integrating all of a user's contacts, emails, social network messages, and instant messages in one place. The interface additionally enabled Power users to move files between different accounts with a click-and-drag function, like a user moves folders on an AppleOS or Microsoft Windows desktop.

Founded by CEO and global serial entrepreneur, Steven Vachani in Rio de Janeiro, Brazil in 2006, Power Ventures was Brazil's first global technology startup to ever to receive funding from a Tier 1 Silicon Valley VC firm. Power built the Internet's first APP platform and CONNECT platforms in 2006 which were precursors to Facebook Connect and now widely used Apple and Google App platforms. Power attracted more than ten million dollars of investment as a startup from noted Silicon Valley venture capital firms like Draper Fisher Jurvetson (who also invested in Hotmail, Skype, and Tesla) and registered more than twenty million users at its peak.

About Xenia von Wedel
Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Silicon Valley and Paris, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Blockchain, Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Tip her if you like her articles: http://xeniar.tip.me

Presentation Slides
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build thei...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously...
CloudEXPO Stories
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments that frequently get lost in the hype. The panel will discuss their perspective on what they see as they key challenges and/or impediments to adoption, and how they see those issues could be resolved or mitigated.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like "How is my application doing" but no idea how to get a proper answer.
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!

Register and Save!
Save $405
on your “Golden Pass”!
before October 30, 2017!
Call 201.802.3020


Santa Clara Call For Papers Open
Submit
submit your speaking proposal
for the upcoming Big Data at Cloud Expo in
Santa Clara!
[Oct 31 - Nov 2, 2017]


Big Data 2017 West
Sponsorship Opportunities
Please Call
201.802.3021
events (at) sys-con.com
Sponsorship opportunities are now open for Big Data at Cloud Expo 2017 Santa Clara, Oct 31-Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, and Big Data at Cloud Expo 2018 New York, June 5-7, 2018, at the Javits Center in New York, NY. For sponsorship, exhibit opportunities and show prospectus, please contact Carmen Gonzalez, carmen (at) sys-con.com.



Big Data Expo Silicon Valley All-Star Speakers Include

MATTHIEU
Octoblu

MAHADEV
Cisco

MCCARTHY
Bsquare

FELICIANO
AMDG

PAUL
VenueNext

SMITH
Eviot

BEAMER
goTraverse

GETTENS
goTraverse

CHAMBLISS
ReadyTalk

HERBERTS
Cityzen Data

REITBAUER
Dynatrace

WILLIAM-
SON

Cloud
Computing

SCHMARZO
EMC

WOOD
VeloCloud

WALLGREN
Electric Cloud

VARAN-
NATH

GE

SRIDHARA-
BALAN

Pulzze

METRIC
Linux

MONTES
Iced

ARIOLA
Parasoft

HOLT
Daitan

CUNNING-
HAM

ReadyTalk

BEDRO-
SIAN

Cypress

NAMIE
Cisco

NAKA-
GAWA

Transparent
Cloud

SHIBATA
Transparent
Cloud

BOYD
Neo4j

WARD
DWE

MILLER
Covisint

EVAVOLD
Covisint

MEINER
Oracle

MEEHAN
Esri

WITECK
Citrix

LIANG
Rancher Labs

BUTLER
Tego

ROWE
IBM Cloud

SKILLERN
Intel

SMITH
Numerex
Big Data Expo New York All-Star Speakers Include

CLELAND
HGST

VASILIOU
Catchpoint

WALLGREN
Electric Cloud

HINCH-
CLIFFE

7Summits

DE SOUZA
Cisco

RANDALL
Gartner

ARMSTRONG
AppNeta

SMALLTREE
Cazena

MCCARTHY
Bsquare

DELOACH
Infobright

QUINT
Ontegrity

MALAUCHLAN
Buddy Platform

PALIOTTA
Vector

MITRA
Cognizant

KOCHER
Grey Heron

PAPDO
POULOS

Cloud9

HARLAN
Two Bulls

GOLO
SHUBIN

Bit6

PROIETTI
Location
Smart

MARTIN
nfrastructure

MOULINE
Everbridge

MARSH
Blue Pillar

PARKS
SecureRF

PEROTTI
Plantronics

HOFFMAN
EastBanc

WATSON
Trendalyze

BENSONOFF
Unigma

SHAN
CTS

MATTELA
Redpine

GILLEN
Spark
Coginition

SOLT
Netvibes

BERNARDO
GE Digital

ROMANSKY
TrustPoint

BEAMER
GoTransverse

LESTER
LogMeIn

PONO
-MAREVA

Google

SINGH
Sencha

CALKINS
Amadeus

KLEIN
Rachio

HOASIN
Aeris

SARKARIA
PHEMI

SPROULE
Metavine

SNELL
Intel

LEVINE
CytexOne

ALLEN
Freewave

MCCALLUM
Falconstor

HYEDT
Seamless

Big Data Expo Silicon Valley All-Star Speakers Include

SCHULZ
Luxoft

TAMBURINI
Autodesk

MCCARTHY
Bsquare

THURAI
SaneIoT

TURNER
Cloudian

ENDO
Intrepid

NAKAGAWA
Transparent

SHIBATA
Transparent

LEVANT-LEVI
testRTC

VARAN NATH
GE

COOPER
M2Mi

SENAY
Teletax

SKEEN
Vitria

KOCHER
Grey Heron

GREENE
PubNub

MAGUIRE
HP

MATTHIEU
Octoblu

STEINER-JOVIC
AweSense

LYNN
AgilData

HEDGES
Cloudata

DUFOUR
Webroot

ROBERTS
Platform

JONES
Deep

PFEIFFER
NICTA

NIELSEN
Redis

PAOLALANTORIO
DataArchon

KAHN
Solgenia

LOPEZ
Kurento

KIM
MapR

BROMHEAD
Instaclustr

LEVINE
CytexOne

BONIFAZI
Solgenia

GORBACHEV
Intelligent
Systems

THYKATTIL
Navisite

TRELOAR
Bebaio

SIVARAMA-
KRISHNAN

Red Hat
Cloud Expo New York All-Star Speakers Included

DE SOUZA
Cisco

POTTER
SafeLogic

ROBINSON
CompTIA

WARUSA
-WITHANA

WSO2 Inc

MEINER
Oracle

CHOU
Microsoft

HARRISON
Tufin

BRUNOZZI
VMware

KIM
MapR

KANE
Dyn

SICULAR
Basho

TURNER
Cloudian

KUMAR
Liaison

ADAMIAK
Liaison

KHAN
Solgenia

BONIFAZI
Solgenia

SUSSMAN
Coalfire

ISAACSON
RMS

LYNN
CodeFutures

HEABERLIN
Windstream

RAMA
MURTHY

Virtusa

BOSTOCK
IndependenceIT

DE MENO
CommVault

GRILLI
Adobe

WILLIAMS
Rancher Labs

CRISWELL
Alert Logic

COTY
Alert Logic

JACOBS
SingleHop

MARAVEI
Cisco

JACKSON
Softlayer

SINGH
IBM

HAZARD
Softlayer

GALLO
Softlayer

TAMASKAR
GENBAND

SUBRA
-MANIAN

Emcien

LEVESQUE
Windstream

IVANOV
StorPool

BLOOMBERG
Intellyx

BUDHANI
Soha

HATHAWAY
IBM Watson

TOLL
ProfitBricks

LANDRY
Microsoft

BEARFIELD
Blue Box

HERITAGE
Akana

PILUSO
SIASMSP

HOLT
IBM Cloudant

SHAN
CTS

PICCININNI
EMC

BRON-
GERSMA

Modulus

PAIGE
CenturyLink

SABHIKHI
Cognitive Scale

MILLS
Green House Data

KATZEN
CenturyLink

SLOPER
CenturyLink

SRINIVAS
EMC

TALREJA
Cisco

GORBACHEV
Systems Services Inc.

COLLISON
Apcera

PRABHU
OpenCrowd

LYNN
CodeFutures

SWARTZ
Ericsson

MOSHENKO
CoreOS

BERMINGHAM
SIOS

WILLIS
Stateless Networks

MURPHY
Gridstore

KHABE
Vicom

NIKOLOV
GetClouder

DIETZE
Windstream

DALRYMPLE
EnterpriseDB

MAZZUCCO
TierPoint

RIVERA
WHOA.com

HERITAGE
Akana

SEYMOUR
6fusion

GIANNETTO
Author

CARTER
IBM

ROGERS
Virtustream
Cloud Expo Silicon Valley All-Star Speakers

TESAR
Microsoft

MICKOS
HP

BHARGAVA
Intel

RILEY
Riverbed

DEVINE
IBM

ISAACSON
CodeFutures

LYNN
HP

HINKLE
Citrix

KHAN
Solgenia

SINGH
Bigdata

BEACH
SendGrid

BOSTOCK
IndependenceIT

DE SOUZA
Cisco

PATTATHIL
Harbinger

O'BRIEN
Aria Systems

BONIFAZI
Solgenia

BIANCO
Solgenia

PROCTOR
NuoDB

DUGGAL
EnterpriseWeb

TEGETHOFF
Appcore

BRUNOZZI
VMware

HICKENS
Parasoft

KLEBANOV
Cisco

PETERS
Esri

GOLDBERG
Vormetric

CUMBER-
LAND

Dimension

ROSENDAHL
Quantum

LOOMIS
Cloudant

BRUNO
StackIQ

HANNON
SoftLayer

JACKSON
SoftLayer

HOCH
Virtustream

KAPADIA
Seagate

PAQUIN
OnLive

TSAI
Innodisk

BARRALL
Connected Data

SHIAH
AgilePoint

SEGIL
Verizon

PODURI
Citrix

COWIE
Dyn

RITTEN-
HOUSE

Cisco

FALLOWS
Kaazing

THYKATTIL
TimeWarner

LEIDUCK
SAP

LYNN
HP

WAGSTAFF
BSQUARE

POLLACK
AOL

KAMARAJU
Vormetric

BARRY
Catbird

MENDEN-
HALL

SUPERNAP

SHAN
KEANE

PLESE
Verizon

BARNUM
Voxox

TURNER
Cloudian

CALDERON
Advanced Systems

AGARWAL
SOA Software

LEE
Quantum

OBEROI
Concurrent, Inc.

HATEM
Verizon

GALEY
Autodesk

CAUTHRON
NIMBOXX

BARSOUM
IBM

GORDON
1Plug

LEWIS
Verizon

YEO
OrionVM

NAKAGAWA
Transparent Cloud Computing

SHIBATA
Transparent Cloud Computing

NATH
GE

GOKCEN
GE

STOICA
Databricks

TANKEL
Pivotal Software


Testimonials
This week I had the pleasure of delivering the opening keynote at Cloud Expo New York. It was amazing to be back in the great city of New York with thousands of cloud enthusiasts eager to learn about the next step on their journey to embracing a cloud-first worldl."
@SteveMar_Msft
General Manager of Window Azure
 
How does Cloud Expo do it every year? Another INCREDIBLE show - our heads are spinning - so fun and informative."
@SOASoftwareInc
 
Thank you @ThingsExpo for such a great event. All of the people we met over the past three days makes us confident IoT has a bright future."
Yasser Khan
CEO of @Cnnct2me
 
One of the best conferences we have attended in a while. Great job, Cloud Expo team! Keep it going."

@Peak_Ten


Who Should Attend?
Senior Technologists including CIOs, CTOs & Vps of Technology, Chief Systems Engineers, IT Directors and Managers, Network and Storage Managers, Enterprise Architects, Communications and Networking Specialists, Directors of Infrastructure.

Business Executives including CEOs, CMOs, & CIOs , Presidents & SVPs, Directors of Business Development , Directors of IT Operations, Product and Purchasing Managers, IT Managers.

Download Cloud Expo Show Guide
Cloud Expo Show Guide
Download PDF

Join Us as a Media Partner - Together We Can Rock the IT World!
SYS-CON Media has a flourishing Media Partner program in which mutually beneficial promotion and benefits are arranged between our own leading Enterprise IT portals and events and those of our partners.

If you would like to participate, please provide us with details of your website/s and event/s or your organization and please include basic audience demographics as well as relevant metrics such as ave. page views per month.

To get involved, email Patricia Henderson at patricia@sys-con.com.

Digital Transformation Blogs
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments that frequently get lost in the hype. The panel will discuss their perspective on what they see as th...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from th...
Today’s AI cannot create an algorithm that satisfies a human’s intent in all but the simplest cases. What we do have is AI that can divine insights from patterns in large data sets. If we can boil down algorithms into such data sets, then we can make some headway. For example, if an AI-based application has access to a vast number of human-created workflows, then it can make a pretty good guess as to the next step in a workflow you might be working on at the moment. In other words, we now have autocomplete for algorithms – what we call ‘next best action.’ We may still have to give our so...