Vice President Of Netflix Leads Prestigious Line-up – CDN World Forum

Vice President Of Netflix Leads Prestigious Line-up – CDN World Forum

Vice President Of Netflix Leads Prestigious Line-up – CDN World Forum

Netflix

The event, taking place at London’s National Hall Olympia from 26th-27th June 2013, will feature key topics such as strategy, application and interface. Ken Florance, VP content delivery, Netflix is the latest addition to the prominent line-up presenting at this year’s CDN World Forum – www.cdnconference.com.

As Vice President of Content Delivery, Ken Florance is responsible for delivery of more than a billion hours of TV shows and movies each month streaming to more than 30 million Netflix members in 40 countries.

Florance will be presenting a case study outlining the development and implementation of Netflix’s Content Delivery Network ‘Open Connect.’

He joins a distinguished speaker line-up at the event including:

  • Neil Walker, Head of IP Video Services, BskyB
  • Chris Drake, Senior Analyst, Informa
  • Sean Decker, Vice President & Head of EA Play4Free, Electronic Arts
  • Martin Ortiz, Project Manager, Telecom Argentina

The event is co-located with two additional symposiums; the Big Data World Congress (www.bigdatacongress.com) and the Cloud World Forum (www.cloudwf.com). The conferences offer the perfect opportunity to discuss the latest trends in Cloud Computing and the growing interest in managing Big Data.

The CDN World Forum takes place at National Hall Olympia on the 26th & 27th June 2013. Free passes for the event are available to those eligible, click here to apply for a pass now or contact naomi@keynoteworld.com or telephone +44 (0)845 519 1230 for further information
.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…