6th annual Cloud Slam 2014 Cloud Computing Conference, San Francisco CA, June 4, 2014. Cloud Computing Events 2014 - security http://cloudslam.org/taxonomy/term/109 en Panel: Cloud Security and Compliance for the Enterprise http://cloudslam.org/cloudcomputingconference/panel-cloud-security-and-compliance-enterprise <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>There is still much speculation around the security and privacy implications of applications in the cloud. With speculation comes fear, and with fear come misinformation and myths. This panel session will address many of these myths and uncertainties about apps in the cloud. It will provide guidance for how businesses can evaluate cloud vendors from a security and privacy perspective, and will offer a glimpse into best practices to protects the data and the privacy of your users.<br /> Core topics to be addressed:<br /> - Centralized cloud governance model;<br /> - Achieving service availability with higher security at a lower cost level;<br /> - How security is built-in in cloud services;<br /> - Enabling data integrity, privacy and security for integrations;<br /> - Adopting cloud standards<br /> - Security and protection of IP and sensitive data in the cloud;<br /> - Enforcing data constraints on residency and privacy;<br /> - Making data available in reliable and secure way;<br /> - Getting high performance, while preserving security<br /> - Using big data to mitigate advanced persistent threats;<br /> - Solutions for cross firewall collaboration.</p> <h2 class="pane-title">Speakers:</h2> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/Jacob-West.png" width="172" height="234" alt="" /></div> <p><b>Jacob West</b> is chief technology officer for Enterprise Security Products (ESP) at HP. In this role, West helps to architect the security roadmap for the ESP portfolio and leads HP Security Research (HPSR), which drives innovation with research publications, threat briefings, and actionable security intelligence.<br /> Prior to this role, West served as chief technology officer for Fortify products and leader of Software Security Research within HP ESP. West has spent more than a decade developing, delivering, and monetizing innovative security solutions, beginning with static analysis research at the University of California, Berkeley and as an early security researcher at Fortify prior to its acquisition by HP.<br /> A world-recognized expert on software security, West co-authored the book, “Secure Programming with Static Analysis” with colleague and Fortify founder, Brian Chess, in 2007. Today, the book remains the only comprehensive guide to how developers can use static analysis to avoid the most prevalent and dangerous vulnerabilities in code.<br /> West is co-author of the Building Security in Maturity Model and is a frequent speaker at industry events, including RSA Conference, Black Hat, Defcon and OWASP. A graduate of the University of California, Berkeley, West holds dual-degrees in Computer Science and French and resides in San Francisco, California.</p> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/eran-feigenbaum-headshot.png" width="172" height="215" alt="" /></div> <p><b>Eran Feigenbaum</b>, Director of Security, Google Apps<br /> As Director of Security for Google Enterprise, Eran defines and implements security strategy for Google Apps. Prior to joining Google in 2007, </p> <p>Eran was the U.S. Chief Information Security Officer for PricewaterhouseCoopers (PwC). </p> <p>Earlier, Eran spent several years designing and implementing high-performance cryptosystems for electronic commerce solutions for Fortune 1000 clients and government agencies. </p> <p>He holds a bachelor’s degree in electrical and computer engineering from the University of California at Irvine, and an MBA from Pepperdine University. </p> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/erictan2.png" width="172" height="116" alt="" /></div> <p><b>Eric Tan</b>, PwC Director, Assurance Technology Center of Excellence, Silicon Valley Eric is an assurance director based out of PwC's Silicon Valley Technology Center of Excellence. He has significant experience successfully helping technology compliance organizations manage risk and compliance over their technology projects and information governance, risk and compliance solutions. Eric is a lead director within PwC's Cloud Assurance practice. His responsibilities includes assisting companies with compliance, security and privacy issues related to cloud services and performing attestation services to cloud service providers. He is a key contributor to the firm's strategy, point of view and thought leadership on cloud computing. Eric's experience includes developing IT strategic plans, leading large-scale system implementation assessments, performing risk and security diagnostics; and implementation of compliance and control solutions. His experience specific to cloud computing includes developing internal controls for a cloud ERP company, leading a Salesforce.com CRM assessment, conducting cloud vendor assessments and helping a financial services firm determine their Infrastructure as a Service (IaaS ) strategy. Google, eBay, LinkedIn, Tibco, Akamai, Novell, Genzyme, Biogen, Thermo Fisher Scientific are among the many clients he has served. He is a regular speaker at ISACA events and served as a keynote speaker and panelist on various conferences including the recent He is a regular keynote speaker and panelist at topical events and conferences, including the recent 2013 Global Institute of Internal Audit Conference, 2012 Edison Electric Institute Conference, Cloud Connect 2011 and UP 2011 Cloud Computing Conference in Silicon Valley.</p> <div class="views-field views-field-field-headshot"> <img typeof="foaf:Image" src="http://d.reelstor.com/Pe6qrwl9mhBdgs6KEVzMAMc144corLl5/DavidLinthicum.png" width="172" height="137" alt="" /></div> <p><b>David Linthicum</b>, Research Analyst, Gigaom Research<br /> David (Dave) S. Linthicum is an internationally recognized industry expert and thought leader, and the author and coauthor of 13 books on computing, including the best-selling “Enterprise Application Integration” (Addison Wesley). Dave keynotes at many leading technology conferences on cloud computing, SOA, Enterprise Application Integration, and enterprise architecture, and has appeared on a number of TV and radio shows as a computing expert. Dave’s latest book is “Cloud Computing and SOA Convergence in Your Enterprise, a Step-by-Step Approach.”Dave is an internationally recognized industry expert and thought leader, and the author and coauthor of 13 books on computing, including the best-selling “Enterprise Application Integration” (Addison Wesley). Dave keynotes at many leading technology conferences on cloud computing, SOA, Enterprise Application Integration, and enterprise architecture, and has appeared on a number of TV and radio shows as a computing expert. Dave’s latest book is “Cloud Computing and SOA Convergence in Your Enterprise, a Step-by-Step Approach.” </p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/4" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud</a></div><div class="field-item odd"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item even"><a href="/taxonomy/term/229" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Compliance</a></div><div class="field-item odd"><a href="/tags/enterprise-cloud" typeof="skos:Concept" property="rdfs:label skos:prefLabel">enterprise cloud</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">(Moderator) Eric</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Tan</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">Director </div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">PwC LLP</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">*</div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">*</div></div></div><div class="field field-name-field-room field-type-list-text field-label-hidden"><div class="field-items"><div class="field-item even">Emerald Ballroom</div></div></div><div class="field field-name-field-timeslot field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2014-06-04T13:50:00-07:00">Wednesday, June 4, 2014 - 13:50</span></div></div></div> Wed, 21 May 2014 23:18:29 +0000 815 at http://cloudslam.org What cloud is your data in? http://cloudslam.org/cloudcomputingconference/what-cloud-your-data <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>New global research conducted in January 2013 measured where end users are seeing challenges with IT, the usability of solutions, and security. Results show more than half of 674 respondents are compelled by slow or overly restrictive IT, or solutions or security that lack usability, to use workarounds either every day or sometimes. Such workarounds are out of compliance with policy and bring additional privacy and security risk. Many types of workarounds, such as apps on personal devices, texting, or social media, drive sensitive data into clouds other than those where the sensitive data is supposed to be. This in turn can drive confidentiality, integrity and trans-border data flow risks. Join this session to hear about this research, how end user behavior with personal, corporate or thin client mobile devices can drive sensitive data into other clouds and add risk. Explore practical strategies and best practices to effectively mitigate these risks and secure data in the collective cloud.</p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/tags/healthcare-it" typeof="skos:Concept" property="rdfs:label skos:prefLabel">healthcare it</a></div><div class="field-item odd"><a href="/taxonomy/term/4" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud</a></div><div class="field-item even"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item odd"><a href="/taxonomy/term/229" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Compliance</a></div><div class="field-item even"><a href="/tags/hipaa" typeof="skos:Concept" property="rdfs:label skos:prefLabel">HIPAA</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">David</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Houlding</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">Healthcare Privacy &amp; Security Lead</div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">Intel Healthcare IT</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">David Houlding is the Healthcare Privacy &amp; Security Lead at Intel, with more than 20 years of experience in healthcare, enterprise architecture and privacy &amp; security. David is responsible for tracking healthcare trends, privacy &amp; security risks they drive, and best practices for managing risks globally. As the former Lead Architect for the Intel Health Guide System, and prior to that the Chief Architect of Perot Systems Healthcare Payer Systems, David has extensive experience in healthcare (provider and payer) and privacy &amp; security. With several patents granted by the USPTO, David has a proven track record for innovation. David is a CISSP (Certified Information Systems Security Professional), a CIPP (Certified Information Privacy Professional), and has a Master of Applied Science in Data Compression and Digital Signal Processing from Simon Fraser University, British Columbia, Canada. David has presented keynotes and sessions, and participated in panel discussions at numerous major industry conferences including HIMSS, mHealth Summit, Strata Rx, HealthTech NextGeneration, InfoSec, NIST HIPAA Security Conference, iHT2 Health IT Summit, NIST Security Automation Conference, Enterprise Architecture Practitioners Conferences, Innovation Insights, and several other conferences. He has published and contributed to numerous articles in major trade journals including Healthcare Technology Online and Dr. Dobb’s Journal. David has also made contributions to book publications including XML Unleashed, and has been interviewed for newspaper and other articles.</div></div></div><div class="field field-name-field-company-logo field-type-image field-label-above"><div class="field-label">Speaker&#039;s Company Logo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_70/public/intel_4c_180x136.png?itok=_-tn8j13" width="72" height="72" alt="" /></div></div></div><div class="field field-name-field-headshot field-type-image field-label-above"><div class="field-label">Speaker&#039;s Headshot Photo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_180/public/P1%20-%2010%20percent.jpg?itok=vNRVjfLd" width="172" height="172" alt="" /></div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">n/a</div></div></div><div class="field field-name-field-room field-type-list-text field-label-hidden"><div class="field-items"><div class="field-item even">Oregon Room</div></div></div><div class="field field-name-field-timeslot field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2013-06-18T10:10:00-07:00">Tuesday, June 18, 2013 - 10:10</span></div></div></div> Tue, 09 Apr 2013 15:56:16 +0000 admin 511 at http://cloudslam.org Fast Tracking Your Cloud Risk Strategy http://cloudslam.org/cloudcomputingconference/fast-tracking-your-cloud-risk-strategy <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Will your Cloud fail the next audit? Do you have a handle on your risk strategy for the Cloud? Is this level of maturity only suited for Enterprises with large budgets? Can smaller organizations effectively manage risk as they consume Cloud services? They can!<br /> Asset Classification, Questionnaires, and Risk Assessment; these tools are essential to manage Cloud Computing related risk. This session will outline how to build a scalable Cloud risk strategy based on ISO 27001, CSA Guidance and 3rd party attestations. This talk will set the tone and enable delegates to come home and fast track a Cloud Risk Strategy in their environment. </p> <p>Cloud Security is only valuable if you have a robust process to identify risk. Managing risk for consuming Cloud is often overlooked. Many organizations feel that only the largest Enterprises can afford to understand and assess the potential or future risks. Instead of security, they focus on the perceived outcome of utilizing the Cloud, the supposed silver lining and use cases. </p> <p>In this session, we will describe how to fast track a Cloud Risk Strategy. We will discuss how MARS built an effective toolkit based on trusted industry tools: ISO 27001, Cloud Security Alliance Guidance, and 3rd party attestations.</p> <p>We will bring to true-to-life examples and case studies how this was done at a $34B enterprise and can scale to your environment. We will explain how CSA and ISO 27001 set the tone for our Cloud risk assessment strategy. We will rationalize how these were complemented by external attestations such as SOC1/2/3, penetration, vulnerability tests. We will expand on area of concerns for organizations of all sizes: SMB to Enterprise.</p> <p>We will discuss how one gets started by providing a checklist driven roadmap to fast-track a Cloud risk strategy. We will start with identifying assets and their overall value to your organization. We will jump into the deep-end on asset classification and explore the particular importance of understanding implementation models and mapping out your data-flow. We will identify how this feeds into a holistic questionnaire that will poke holes through vendor Cloud Security practices. We will educate our delegates on how to ask vendors difficult questions and elicit responses from vendors who don&#039;t want to divulge information.</p> <p>We will illustrate how to paint risk to the c-suite in an effective and compelling format. We will highlight practical recommendations for contractual negotiations, privacy, liability, exit-clauses and overall governance strategies to keep the sun shining through our Clouds. </p> <p>In summary, building a Cloud risk strategy isn’t just suited for the largest Enterprises. By leveraging a pragmatic and scalable framework built on industry standards, we have defined best practices and lessons learned that organizations can leverage to effectively manage risk in their Cloud journey.</p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/4" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud</a></div><div class="field-item odd"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item even"><a href="/taxonomy/term/432" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Risk</a></div><div class="field-item odd"><a href="/taxonomy/term/119" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Strategy</a></div><div class="field-item even"><a href="/taxonomy/term/229" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Compliance</a></div><div class="field-item odd"><a href="/tags/assessment" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Assessment</a></div><div class="field-item even"><a href="/taxonomy/term/150" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Governance</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">Nikita</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Reva</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">Senior Engineer, Global Information Security Engineering</div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">MARS Inc.</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">Nikita Reva brings over 8 years of experience in Network and Information Security. Currently he works for MARS Inc., a Consumer Packed Goods leader with a portfolio of Global Billion dollar brands like Snickers, M&amp;Ms, Pedigree Pet Food and Wrigley Gum. In his current role as Senior Engineer, Global Information Security Engineering, Nikita manages Global Information Security projects involving engineering technical security solutions to manage risk. Prior to MARS, Nikita focused on Auditing Information Security for Credit Unions and Banks. Nikita holds a Masters in Information Security from DePaul University and leading security certifications. Nikita is also an active board member of Cloud Security Alliance Chicago, ISACA Chicago and co-founded a monthly forum for Chicago’s Security professionals. Nikita has spoken at security conferences around the world.</div></div></div><div class="field field-name-field-company-logo field-type-image field-label-above"><div class="field-label">Speaker&#039;s Company Logo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_70/public/MARS%20.jpg?itok=Qff9oKKe" width="72" height="72" alt="" /></div></div></div><div class="field field-name-field-headshot field-type-image field-label-above"><div class="field-label">Speaker&#039;s Headshot Photo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_180/public/nikita_sq.per_.jpg?itok=Y4GtKjcl" width="172" height="172" alt="" /></div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">5445 North Sheridan Chicago, IL 60640</div></div></div><div class="field field-name-field-room field-type-list-text field-label-hidden"><div class="field-items"><div class="field-item even">Nevada Room</div></div></div><div class="field field-name-field-timeslot field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2013-06-18T15:05:00-07:00">Tuesday, June 18, 2013 - 15:05</span></div></div></div> Tue, 02 Apr 2013 21:38:40 +0000 revan 426 at http://cloudslam.org Sonian and Big Data http://cloudslam.org/cloudcomputingconference2012/sonian-and-big-data <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>How would you define "big data"? To Sonian, "big data" is a cloud-powered data repository designed to manage. But it took a long time to get to this point - "big data" has taken a significant journey over the past few years. We've seen it morph into various themes; a big career opportunity for data scientists; the system of record; how the cloud can be used to effectively solve the data problem; and many others. Regardless of the form "big data" takes, it seems as though there are endless possibilities to success.</p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/tags/cloud-computing-conference" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud computing conference</a></div><div class="field-item odd"><a href="/tags/cloud-business" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud business</a></div><div class="field-item even"><a href="/taxonomy/term/13" typeof="skos:Concept" property="rdfs:label skos:prefLabel">paas</a></div><div class="field-item odd"><a href="/taxonomy/term/14" typeof="skos:Concept" property="rdfs:label skos:prefLabel">IaaS</a></div><div class="field-item even"><a href="/taxonomy/term/236" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Hybrid</a></div><div class="field-item odd"><a href="/tags/cloud-showcase" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Cloud Showcase</a></div><div class="field-item even"><a href="/taxonomy/term/4" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud</a></div><div class="field-item odd"><a href="/taxonomy/term/59" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud computing</a></div><div class="field-item even"><a href="/tags/cloud-conference" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud conference</a></div><div class="field-item odd"><a href="/tags/silicon-valley" typeof="skos:Concept" property="rdfs:label skos:prefLabel">silicon valley</a></div><div class="field-item even"><a href="/tags/cloud-expo" typeof="skos:Concept" property="rdfs:label skos:prefLabel">cloud expo</a></div><div class="field-item odd"><a href="/taxonomy/term/450" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Cloud Adoption</a></div><div class="field-item even"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item odd"><a href="/taxonomy/term/15" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Saas</a></div><div class="field-item even"><a href="/tags/cloud-event" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Cloud Event</a></div><div class="field-item odd"><a href="/tags/bigdata" typeof="skos:Concept" property="rdfs:label skos:prefLabel">bigdata</a></div><div class="field-item even"><a href="/taxonomy/term/84" typeof="skos:Concept" property="rdfs:label skos:prefLabel">analytics</a></div><div class="field-item odd"><a href="/tags/archiving" typeof="skos:Concept" property="rdfs:label skos:prefLabel">archiving</a></div><div class="field-item even"><a href="/tags/bcdr" typeof="skos:Concept" property="rdfs:label skos:prefLabel">BCDR</a></div><div class="field-item odd"><a href="/taxonomy/term/313" typeof="skos:Concept" property="rdfs:label skos:prefLabel">Disaster Recovery</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">Greg</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Arnette</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">CTO &amp; Founder</div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">Sonian</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">Greg Arnette has more than 15 years of experience in messaging, collaboration, Internet and networking, having created messaging products and services starting with AlertWare and most recently IntelliReach, which was acquired by Infocrossing in 2006. Since 2006, Greg has been developing Web-based information management solutions leveraging open source technology with virtualization infrastructure. As Sonian’s CTO, Greg is responsible for the company’s product vision, technical innovation and engineering leadership. Greg has most recently spoken at MassTechnology Leadership Council’s “Find the Right Way to the Cloud,” discussing the keys to building a cloud-powered platform that is successful. He has also presented at the Cloud Control Conference and Exhibit, Canaccord Growth Conference, and Lotusphere.</div></div></div><div class="field field-name-field-headshot field-type-image field-label-above"><div class="field-label">Speaker&#039;s Headshot Photo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_180/public/greg.png?itok=b8jYdTLV" width="172" height="172" alt="" /></div></div></div><div class="field field-name-field-twitter field-type-text field-label-above"><div class="field-label">Speaker&#039;s Twitter profile:&nbsp;</div><div class="field-items"><div class="field-item even">@sonian</div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">n/a</div></div></div> Fri, 27 Apr 2012 21:04:50 +0000 admin 323 at http://cloudslam.org Chip Design and Cloud Computing: a Perfect Storm http://cloudslam.org/cloudcomputingconference2012/chip-design-and-cloud-computing-perfect-storm <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Chip design is at the core of consumer electronics: smart phones, tablets, computers, HDTV, networking, etc. It is a $300B market that has been following Moore’s Law for 40 years: double the transistors density every two years. </p> <p>This exponential complexity growth is reaching the limit of conventional computing frameworks. A single logical simulation of a chip exceeds 20 CPU years. Physical verification, which checks that a chip meets strict manufacturability rules, is reaching 100 CPU years. Many of these simulations are needed throughout a chip design cycle. </p> <p>Chip design depends on the EDA industry (Electronic Design Automation), which provides the software to design, test, manufacture, and verify VLSI circuits. EDA sells TBLs (Time Based Licenses), usually for durations of 1 to 3 years, at prices ranging from $5,000 to more than $300,000. Because of TBLs, it can be very expensive to exploit the parallelism of some tasks (e.g., simulation), since every node must acquire a license.</p> <p>EDA also provides ready-to-use hardware functional blocks, called silicon IPs (Intellectual Properties), that are optimized for speed, area, or power consumption. As reflected by their name, silicon IPs must be protected from intruders looking for replicating their features. In general, chip makers are extremely sensitive to security, as innovative designs and features can make or break a company. </p> <p>Last but not least, it is estimated that 30 to 40% of all EDA software use happens via pirated licenses.</p> <p>Need for burst computing, rigid TBLs, extreme security needs for both vendors and customers, and a pervasive software piracy: we show how cloud computing is revolutionizing the chip design and EDA industries. We explain the move from computing farms and time-based software licenses, to elastic computing and per-pay-use business models. Although elastic computing is a benefit that nobody denies, the transition from TBL to pay-as-you-go poses complex problems in terms of software usage control and business models. Also the amount of data that needs to migrate in and out of the cloud can become a bottleneck. We show that a common cloud platform to deploy and use software for the lifetime of a project (usually several months) enables new benefits for the EDA vendors and their customers –monitoring, cost optimization, version control, flexible account, etc. We discuss the security aspects of the platform for both vendors and customers --software, IP, and design. We finally discuss the impact of this evolution on EDA software piracy. All these themes will be illustrated by real-life examples.</p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/389" typeof="skos:Concept" property="rdfs:label skos:prefLabel">burst computing</a></div><div class="field-item odd"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item even"><a href="/taxonomy/term/390" typeof="skos:Concept" property="rdfs:label skos:prefLabel">business model</a></div><div class="field-item odd"><a href="/taxonomy/term/391" typeof="skos:Concept" property="rdfs:label skos:prefLabel">piracy thwarting</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">Olivier</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Coudert</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">CTO</div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">SiCAD</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">I have been working 20+ years in software architecture and product development, including 8 years in start-ups. I built several products from scratch for the EDA industry. I have published 50+ technical papers, and I have been in numerous panel and tutorials. I am a prominent advocate for a radical move of the chip and EDA industry to public clouds, for scalability, business, and security reasons.</div></div></div><div class="field field-name-field-company-logo field-type-image field-label-above"><div class="field-label">Speaker&#039;s Company Logo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_70/public/SiCAD%20small.png?itok=s9Ueffev" width="72" height="72" alt="" /></div></div></div><div class="field field-name-field-headshot field-type-image field-label-above"><div class="field-label">Speaker&#039;s Headshot Photo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_180/public/olivierSICAD.png?itok=XEIUr_iT" width="172" height="172" alt="" /></div></div></div><div class="field field-name-field-li field-type-text field-label-above"><div class="field-label">Speaker&#039;s LinkedIn Profile:&nbsp;</div><div class="field-items"><div class="field-item even">http://www.linkedin.com/in/oliviercoudert</div></div></div><div class="field field-name-field-twitter field-type-text field-label-above"><div class="field-label">Speaker&#039;s Twitter profile:&nbsp;</div><div class="field-items"><div class="field-item even">@ocoudert</div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">SiCAD Inc. 19925 Stevens Creek Blvd., Suite 100 Cupertino, CA 95014 </div></div></div> Fri, 30 Mar 2012 13:43:27 +0000 241 at http://cloudslam.org Choosing the right cloud provider http://cloudslam.org/cloudcomputingconference2012/choosing-right-cloud-provider <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Choosing a cloud provider is critical. Making a bad choice can ruin a company and your career. Learn how to make sure you make the right choice. </p> <p>In this session we will cover<br /> 1. What to ask about the company that you will be partnering with<br /> 2. What to make sure is in the contract<br /> 3. All the technical questions around authentication, authorization and access<br /> 4. How to make sure you can administer the system after<br /> 5. How to make sure it integrates with what you have today and will have tomorrow<br /> 6. What to think about from a staffing perspective<br /> 7. What you need to know about API’s and integration</p> <p>In the end you will be able to confidently choose the right cloud provider for your company, whether it’s a software as a service play, infrastructure or platform as a service. </p> <p>Enterasys has nearly 80% of our core applications in the cloud. Attend this session and learn from a company that has been using the cloud since 2003. We’ve been there. We’ve done that.</p> </div></div></div><div class="field field-name-field-keywords field-type-taxonomy-term-reference field-label-above"><div class="field-label">Keywords:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/190" typeof="skos:Concept" property="rdfs:label skos:prefLabel">contracts</a></div><div class="field-item odd"><a href="/taxonomy/term/109" typeof="skos:Concept" property="rdfs:label skos:prefLabel">security</a></div><div class="field-item even"><a href="/taxonomy/term/191" typeof="skos:Concept" property="rdfs:label skos:prefLabel">decision</a></div><div class="field-item odd"><a href="/taxonomy/term/192" typeof="skos:Concept" property="rdfs:label skos:prefLabel">criteria</a></div><div class="field-item even"><a href="/taxonomy/term/193" typeof="skos:Concept" property="rdfs:label skos:prefLabel">business</a></div><div class="field-item odd"><a href="/taxonomy/term/131" typeof="skos:Concept" property="rdfs:label skos:prefLabel">integration</a></div><div class="field-item even"><a href="/taxonomy/term/112" typeof="skos:Concept" property="rdfs:label skos:prefLabel">authentication</a></div></div></div><div class="field field-name-field-spfname field-type-text field-label-above"><div class="field-label">Speaker First Name:&nbsp;</div><div class="field-items"><div class="field-item even">Rich</div></div></div><div class="field field-name-field-splname field-type-text field-label-above"><div class="field-label">Speaker Last Name:&nbsp;</div><div class="field-items"><div class="field-item even">Casselberry</div></div></div><div class="field field-name-field-jobtitle field-type-text field-label-above"><div class="field-label">Speaker Job Title:&nbsp;</div><div class="field-items"><div class="field-item even">Director of IT infrastructure</div></div></div><div class="field field-name-field-company field-type-text field-label-above"><div class="field-label">Speaker&#039;s Company Name/Affiliation:&nbsp;</div><div class="field-items"><div class="field-item even">Enterasys Networks</div></div></div><div class="field field-name-field-bio field-type-text-long field-label-above"><div class="field-label">Speaker Bio:&nbsp;</div><div class="field-items"><div class="field-item even">Rich Casselberry is director of IT Operations for Enterasys Networks in Andover, Mass. He is responsible for the company&#039;s IT infrastructure and ensuring that employees around the world have reliable, secure access to the IT resources they need to do their jobs. His organization also manages the company&#039;s telecom equipment and services, systems support, help desk services, and internal and external Web sites. Casselberry has held a number of key IT management positions for enterprises, consulting organizations and in the public sector in his career. He joined Enterasys in 2001 when the company emerged from the former Cabletron Systems of New Hampshire. He rose to his current position in 2004. He was with Cabletron from 1990 to 1995 and 1999 to 2001 in a variety of increasingly senior IT positions. From 1995 to 1997 Casselberry was IT manager for Current Technology, a consulting company based in New Hampshire. He served as the IT director for the town of Sanford, Maine, from 1997 to 1999. Casselberry was also a contributing author of the following books, published by Que: &quot;Running a Perfect Website with Apache,&quot; &quot;Webmaster&#039;s Expert Solutions,&quot; and &quot;Special Edition Using Intranet HTML.&quot; He was the lead author of &quot;Running a Perfect Intranet.&quot; In addition he has been published in various periodicals such as CIO.com and Infoworld.</div></div></div><div class="field field-name-field-headshot field-type-image field-label-above"><div class="field-label">Speaker&#039;s Headshot Photo:&nbsp;</div><div class="field-items"><div class="field-item even"><img typeof="foaf:Image" src="http://cloudslam.org/sites/default/files/styles/round_180/public/richcasselberry.png?itok=1c41uRGm" width="172" height="172" alt="" /></div></div></div><div class="field field-name-field-li field-type-text field-label-above"><div class="field-label">Speaker&#039;s LinkedIn Profile:&nbsp;</div><div class="field-items"><div class="field-item even">http://www.linkedin.com/in/richcasselberry</div></div></div><div class="field field-name-field-twitter field-type-text field-label-above"><div class="field-label">Speaker&#039;s Twitter profile:&nbsp;</div><div class="field-items"><div class="field-item even">richcasselberry</div></div></div><div class="field field-name-field-postal field-type-text-long field-label-above"><div class="field-label">Speaker&#039;s Postal Address:&nbsp;</div><div class="field-items"><div class="field-item even">50 Minuteman Rd Andover MA 01810</div></div></div> Mon, 26 Mar 2012 01:33:33 +0000 168 at http://cloudslam.org