Major Cloud Computing Events In 2013

Major Cloud Computing Events in 2013

Cloud Computing is a vibrant technical environment and 2013 is full of many conferences, workshops, exhibitions and learning programs dedicated to cloud technologies. Here are some of the most important events in 2013 you should keep a close eye on and consider attending:

Cloud Connect 2013April 2-5, Silicon Valley, California

Cloud Connect gathers application developers, senior IT professionals, infrastructure and service providers, and cloud computing innovators to share deep cloud insights. Hosted and led by the industry’s top experts, Cloud Connect delivers the latest business, technology and cloud regulatory insights.

Conference tracks I recommend:

  • Application Design & Architecture;

  • Cloud Economics & Strategy;

  • Infrastructure;

  • Performance & Availability;

  • Private & Hybrid Clouds;

  • Risk Management & Security;

Cloud & Big Data Conference & Expo / 3PX|TechCon – April 16-17, Bellevue, Washington

Cloud&Big Data Conference&Expo brings together business leaders and technology experts to explore the “third platform” (Social, Mobile & Mobility, Big Data & Analytics and Cloud Services) and its opportunities to streamline operations, mitigate risk, enhance security and increase profits.

Conference topics I find most interesting:

  • Software for Application Defined Networking: Secure Network Virtualization for M2M and Cloud Computing;

  • How In-Memory Computing Can Boost Cloud Performance for Big Data;

  • Enabling Widespread Enterprise Cloud Adoption;

  • How to Simplify Application On-boarding and Optimize Price-performance on the Cloud

  • Cloud-Based BI and Big Data Analytics for Strategic Business Advantage

  • The Distributed and Decentralized Cloud

Virtualization & Cloud Computing Summit 2013 May 30 – Jun 6, Anaheim, California

The summit gathers security managers and analysts, auditors, compliance analysts who want to discuss and understand the risks of virtualization and cloud computing models and scenarios.

Topics from the agenda that I recommend:

  • Extending Your Private Cloud into Public Clouds

  • Emerging Architectures, Emerging Threats

  • Tools You Can Use: The Virtualization and Cloud Toolkit

CloudCon Expo & ConferenceMay 14-15, San Francisco, California

The event brings IT professionals and decision makers together, to discuss best practices and strategies for Cloud Deployment. It aims to help them understand how cloud technologies implementation can bring benefits such as reliability, adaptability and cost reduction.

Interesting topics on the event agenda:

  • Challenges of Cloud Computing in Highly Scalable and Secure enterprises

  • PaaS on Software Defined Data Centers (SDDC)

  • Cloud Storage & Backup Platforms

The 12th International Cloud Expo – June 10-13, New York

The event brings together decision makers in SMBs and enterprises to discover  the latest innovations in Cloud Computing that can help them minimize cost, improve scalability and maximize performance. I don’t have the full details yet, but the Call for Papers is open until March, 17th.

By Rick Blaisdell

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

CloudTweaks Comics
Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

The DDoS Attack That Shook The World

The DDoS Attack That Shook The World

DDoS Attack: Update 2 6 days after the DDoS attack that rocked the internet to its core, Dyn have released detailed analysis of the attack and further details have emerged. The attack has been confirmed to have been the largest of its kind in history, and the Mirai botnet has been cited as the official cause.…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…


Sponsored Partners

Competing Cloud Security Demands Call For Credentialed Professionals
The Benefits of Cloud-Based Phone Systems
Hybrid IT Matures Just In Time To Tackle Complex Challenges
Confused By The Cloud? A New eBook Reveals All…
Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond
Internet Performance Management In Today’s Volatile Online Environment
Collaboration Clouds: The Logical Next Step To Cloud Computing
Unscrambling An Egg: How CIOs Can Enable Business Through Unstructured Data
Collaborative Economy – Customer Appreciation Day
Going Virtual? Keep One Eye On The Hardware And The Other On Habits
Skin Based Technology – The Intelligent Tattoo
Collaborative Economy – The Death Of “Death By Meeting”