Cloud Computing Canada: HP ‘Master The Cloud’ Event (Toronto) – Part 3

Cloud Computing Canada: HP ‘Master The Cloud’ Event (Toronto) – Part 3

Cloud Computing Canada: HP ‘Master The Cloud’ Event (Toronto) – Part 3

Continued from: Part 1Part 2

The HP “Mastering The Cloud” Event drew to a close around 4:30, after one last blast of hot dogs, pretzels and other salty refreshments.  As someone who has attended, bought space in , and spoken at trade shows, and as an independent blogger, I would rate this one to be quite successful in terms of affirming HP’s role as an authority and credible partner in cloud management and cloud security. A key ingredient in this assessment is what I call the 4:00 “bedraggle factor,” in which most people who have spent all day at a trade show emerge into the light looking bleary, dehydrated, over-informed and under-stimulated.  I did not see this at this cloud computing event. Instead I saw people talking, networking and exploring, up until the last minute.

Host/emcee Adam Growe was charming in a completely Canadian-non-offensive way. His only sideswipe was his video depiction of  Toronto as a city that calls in the army when the snow gets too deep, but, hey, the mayor of Toronto at the time was a businessman, and business people do what they have to do to get things done, and that’s what HP was promoting – getting things done in a free-market open environment, instead of stifling creativity with closed-door  proprietary systems. Besides, Mr. Growe  plays a cab driver on TV, and no one complains louder in this city when the streets get clogged than the cabbies. Maybe some method acting is in order. However, he was gracious enough to admit he really didn’t understand the technologies and terms he was incorporating into his act, and good for him – he represented every company owner in this country, who must face an onslaught of indecipherable terms, all aimed at delivering a case of the willies to the C-Suite about the safety and sanctity of their own data.

This is heavy stuff. It comes on the historical heels of mainframe/dumb terminal computing in the 1970’s and 80’s, networked computing in the 1990’s, and IP/Internet computing of the 2000’s, all claiming to be the salvation to a company’s woes.  Now, once again there is a new solution, in which mashable apps and Hybrid clouds promise a future of secure data and cost savings.

In Canada, this might be a tough sell. Not that there’s anything wrong with it (cloud computing, that is,) but because Canadian business owners are cautious – they often ask “how much might we lose” rather than “how much can we make”?  They want to see the proof. Our hosts from Onx.com with whom I and other journos met over sandwiches at lunch, said it best: “How do you convince Canadians? The market will convince them. “That’s fair, I guess, especially in a shaky economy.

HP did well to bring the POD onsite as I mentioned in a  previous blog).

They also did well to deploy a legion of enthusiastic techies, who were happy to explain the transformational process:

  • 1. Build
  • 2. Consume
  • 3. Transform existing apps 
  • 4. Manage and Secure

They stressed the nature of feedback from customers throughout the process, maintaining a “federated automated and client aware” ecosystem.

In short HP did a great job in displaying themselves as a multidimensional solutions provider, not just providing the hardware, but the thinkware – the attitude and strategy – that must accompany it. HP has been doing this since the 1930’s and their alliances with other industry giants such as Microsoft point towards a particular degree of might and versatility.

The roadshow next veers west, to Calgary and Vancouver. Adam Growe is hoping to pass as a cowboy in his Tilley hat, which I know from bitter experience, won’t work. He would do best to find a bolo tie and fast. But HP will make a lot of new friends especially when they show off just what their hybrid cloud delivery systems and modular transportable PODs are doing for the mining and oil & gas industry.

By Steve Prentice

Post Sponsored by HP 

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…