NTT America Demos Cloud Computing Platform at Web 2.0 Expo

NTT America Demos Cloud Computing Platform at Web 2.0 Expo

NTT America will demonstrate its cloud computing platform at the Web 2.0 Expo San Francisco.

Attendees will get a chance to listen to NTT America‘s technical staff who will discuss the company’s hosting, cloud computing, security and colocation offerings. These offerings help businesses to tap the opportunities offered by the rapid growth of new technologies and Web content services.

During this event, CEO of Cloud Approach and cloud security specialist, Eric Greenberg, will give a talk entitled Crack the Code of Cloud Security and Unleash its Power on Tuesday, March 29 from 2:55 – 3:15 PDT in the Solutions Theater in the Expo Hall.

This talk aims to present new techniques for securing the cloud and unleashing its power drawn from extensive in-the-field experience deploying large-scale cloud infrastructure.

NTT America offers the critical infrastructure necessary to meet today’s enterprise hosting requirements. Popular for its ability to rapidly deploy and scale managed hosting servers, the company has built a new foundation of both public and enterprise private cloud computing platforms.

The company is encouraging attendees to stop by the NTT Communications booth #907 on the Expo floor at any point during the conference to learn more about the cloud, security and the Join the Cloud Conversation event NTT America is hosting on March 29th at the Intercontinental Hotel.

The Web 2.0 Expo is an annual multi-track event, which showcases the latest Web 2.0 business models, development paradigms, products, and is explicitly created to address the needs of technical, design, marketing, and business professionals building the next iteration of the Web.

NTT America was in the news recently for announcing that it has become a Diamond Sponsor of NewNOG. This sponsorship will enable the company to increase its presence in and participation with the North American Network Operators Group (NANOG) community.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…