This session will look at the use cases developed by the US National Institute of Standards and Technology (NIST) in collaboration with the public to drive interoperability, portability and security of cloud computing. A panel of key representatives from NIST as well as several industry standards organizations, including the DMTF, SNIA and the Cloud Security Alliance will discuss their work as it pertains to these use cases. The discussion will cover portable workloads and standardized interfaces for cloud computing. The goal of cloud standards is to improve cloud consumer agility and define a set of architectural semantics that unify the interoperable management of workloads and resources between enterprises of all sizes and cloud computing infrastructures.
Lee Badger, Computer Scientist, NIST
Mark Johnson, Co-Chair, DMTF Cloud Management Working Group
Mark Carlson, Vice Chair, SNIA Cloud Storage Initiative
Becky Swain, Risk & Compliance Mgmt, Corporate Security Programs Organization (CSPO), Cisco
Winston Bumpus, President, DMTF
RecordedMar 2 201155 mins
Your place is confirmed, we'll send you email reminders
As the adoption of virtualized clouds changes the landscape of our data centers, many organizations are beginning to take a fresh look at the way they approach networking.
In this webinar we will address some of the challenges that face networking teams today as they interact with the new virtual world, such as:
- There’s more to networking than just hooking things up
- Where Network Services Reside
- Ownership of Services
- Advanced Cloud Networking : Where is my Layer-2?
- How does this play into orchestration and automation
- A Pragmatic Approach to Cloud
- The Next Generation Network Engineer
Scott Miller, National Technical Solutions Architect, World Wide Technology, Inc.
According to industry researchers nearly 75 percent of the organizations who have deployed a virtual desktop environment have stalled their deployment before completion leaving frustrated employees in departments ranging from IT, to the business units, to the executive suite. It isn’t a lack of good intentions causing these deployments to fail, but rather a lack of understanding of the holistic approach needed to successfully deploy a virtual desktop environment. Join WWT’s Dave Kinsman, National Technical Solutions Architect, as he discusses the 5 Pillars to VDI success.
Join Jason Campagna as he discusses various product and solution announcements made during the VMworld keynotes this week, and how WWT is working with VMware to provide a comprehensive software-defined datacenter approach with our Cloud-in-a-Box methodology. Jason is WWT’s Cloud Practice Director, working with a team of top tier solutions architects in the largest enterprise, service provider, and federal marketplaces. Jason has been a long term member of the Citrix and VMware Partner Technical Advisory Boards, and an author of several whitepapers for organizations such as VMware and Microsoft including the original Stateless VMware whitepaper design.
Jeff Stiles, Federal Partner Account Manager for WWT
At this year’s Geek Day, Cisco is sponsoring 6 technical labs: VXI, UCS, Security Gateway/Secure Mobility, Prime for Enterprise, WAAS and Cisco’s Intelligent Automation for Cloud (CIAC). Please come by to discuss these solutions with the Cisco team.
There is a fundamental shift taking place in the way technology resources are delivered and supported. Virtualization and consolidation have forever changed the face of computing and server utilization by promising resource efficiency and reducing the hardware footprint. Meanwhile, technology-as-a-service and cloud based delivery models are emerging as the computing trend of the future, where users pay service providers only for exactly the amount of technology they use in a pay-as-you-go utility model, instead of buying and managing sprawling environments of software, hardware, and support services.
6fusion is an innovative Utility Metered Cloud company that has emerged in this new era of utility computing with a refreshing vision for the future, cutting-edge technologies and a unique commercial business model.
Jacob West - Director of Software Security Research, HP
Mobile devices and the risk posed by vulnerabilities in the software that runs them are proliferating. This talk scrutinizes challenges faced in securing mobile apps and contrasts them with legacy software security initiatives. We discuss how outsourcing confounds security efforts, how the mobile app lifecycle can make risk a hot potato, and a variety of other challenges organizations face as users demand ever increasing mobile capabilities.
Phil Fischer, APC by Schneider Electric Data Center Business Development Manager
Bridging the gap of virtualization and physical infrastructure - integrating APC by Schneider Electric's Data Center Infrastructure Management with Microsoft & VMware
This interactive presentation introduces the virtual integration between APC by Schneider Electric's data center infrastructure management solution StruxureWare Central, and systems for managing virtualized environments. StruxureWare Central allows end to end data center infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems. In he latest release of StrxureWare Central, virtual machine management and physical infrastructure management are now talking to each other so as to maximize the benefit of virtualization by answering the questions:
Which VMs are on a host server with compromised physical health?
Where should I move a VM, or add a new one?
What is the best "healthy" host server?
How do I find this place?
How do my VMs migrate?
When a physical event occurs, who/what will move the VMs?
Is this an automated or a manual process?
Effect on business process?
In a physical event, what business process(es) could be
WWT's pragmatic approach toward IT Transformation that not only considers the technology involved but the people and processes that must be considered as well to enable your organization to continue to evolve toward cloud.
Scott Miller, Director of Cloud and Virtualization, World Wide Technology, Inc.
One size doesn't fit all. Scott Miller helps organizations understand how to determine where they are today in cloud adoption and how far they should go to achieve the most beneficial attributes of a cloud for their organization.
Scott Webb, National Technical Solutions Architect
How can an organization migrate from 25 years of desktop and application management habits to the more optimized virtual environment available today? Scott Webb talks about why organizations should think about a broader vision of "VDI" that can encompass application, user, and desktop virtualization.
Founded 7 years ago as a regional event offering hands-on functioning demos and breakouts on virtualization technology, this event has expanded to be a national show featuring collaboration, wireless, mobility, security, datacenter and virtualization technologies. All with fully functioning, hands-on demos. Attend to learn why this free event should be on your list of to-do's for 2012.
Join us to learn about Cisco’s CITEIS – Cisco IT Elastic Infrastructure Services – project. Find out firsthand how Cisco deployed an agile, cost effective, flexible and secure private cloud using Cisco Intelligent Automation, Cisco UCS, and VMware technologies. Gain insights from Cisco IT for the planning and development of your own private cloud.
Despite investing heavily in their security defenses many organizations are still finding their systems regularly compromised. The problem these organizations face is they are focusing too much on the defensive controls at their network perimeter in the false belief that this makes it difficult for their systems to be compromised. However, time and time again we see that once the perimeter controls fail attackers have easy access to the organization's sensitive assets.
This presentation will provide attendees with a practical guide on how to secure their corporate assets by implementing a multi-layered approach to security incorporating the key cornerstones of people, process and technology. With this multi-layered approach should one security layer fail the other layers can compensate and continue to secure key organizational assets.
Today's threat landscape and attacks are constantly evolving and it is essential that organizations ensure their security controls evolve to counter these threats. The attendee will be shown how to take a risk based approach to develop multiple security layers to deal with the current threat landscape and how to ensure each layer can compensate for another should there be a compromise.
Relying on one layer of security at the perimeter is no longer an option, developing adaptive security controls at various layers is essential to securing systems in today's environment.
Winston Bumpus, DMTF; Scott DesBles, Dell; Steffen Grarup, VMware; John Parchem, Microsoft; Shishir Pardikar, Citrix
This session will look at the needs of customers for interoperable virtualization management standards. Virtualization which is an important cloud computing enabling technology, is driving customer requirements for management standards to improve their agility while reducing their TCO. The goal of virtualization management standards is to improve IT consumer agility and define a set of architectural semantics that unify the interoperable management of workloads and resources between enterprises of all sizes and cloud computing infrastructures.
Chenxi Wang, Forrester; Anil Karmel, Los Alamos Nat'l Lab; Terrell Herzig, UA Medical Center
IT is forced with securing consumer-oriented devices which are accessing corporate email, networks, and 3rd party applications. This end-user panel will provide you with a look at how some of the top IT shops are dealing with this urgent issue and how you can leverage their best practices at your own organization. Moderator Chenxi Wang of Forrester will provide an overview of the trends she is seeing from both a practitioner and solution perspective, and will lead the end-user panel in a discussion of various strategies to successfully implement, manage, monitor and secure enterprise mobility. Attend live for the opportunity to ask your own questions, or feel free to tune in afterward on demand.
- Chenxi Wang, Ph.D., Vice President, Principal Analyst, Forrester Research (moderator)
- Anil Karmel, Solutions Architect, Los Alamos National Laboratory
- Terrell Herzig, Information Security Officer, University of Alabama Medical Center
Alan Priestly, Director, Cloud Marketing EMEA, Intel
Today, cloud access security requires more than a simplistic secure VPN tunnel or single sign on from tightly controlled corporate applications. Users are demanding access to the cloud from a wider range of clients and directly on the cloud platform itself. From a compliance standpoint it is a growing nightmare involving orphaned accounts, infected clients, and un-auditable silos of user activity data left outside enterprise control. In this session, Intel showcases key technologies that are being used in the market today to build a trusted client to cloud connection. On the client side, Intel will present ‘Identity Protection Technology’ that will deliver strong second factor authentication using OTP one time password technology directly from the PC chip. To secure data in flight and access to the cloud, Intel expressway solutions enable federated single sign-on and web services security. On the server side, TXT trusted execution technology enables the setting up of trusted compute pools and establishing hardware root of trust between data centers. Attend this session to learn more about Intel’s 2015 vision for how to build a federated, automated, and client aware cloud.
There’s a lot of buzz about the potential for virtual desktops, particularly as a way to efficiently manage users, operating systems, and applications in computer labs and call centers, where one type of desktop can often fit all. Yet, few organizations have full-scale deployments underway for knowledge workers due to challenges such as high storage costs, management complexity, and persistent personalization. In this webinar, Raechelle Clemmons, CIO at Menlo College, will discuss her Virtual Desktop Infrastructure (VDI) project and how her team is using the latest desktop virtualization technologies from VMware and Unidesk to give students greater access to lab applications, allow faculty and staff to have fully customizable desktops, reduce the operational expenses required for desktop patching/provisioning, and minimize the capital expenses required to implement VDI.
You’ll hear about:
• Menlo college’s VDI solution and supported use cases
• The importance of layering technologies required to support mixed use desktops and the range of applications users may require
• How local storage can be used to deliver sufficient IOPS at low cost
• Integration with other critical technologies to create a scalable, manageable, and cost-effective desktop computing environment for the college
• Anticipated return on investment and future of VDI
In conjunction with one of the nation's leading technical tradeshows, the Geek Day Virtualization Channel features compelling technology thought leadership on the industry's best-of-breed cloud and virtualization solutions providers.
US Government Driven Cloud Computing StandardsLee Badger, NIST; Mark Johnson, DMTF; Mark Carlson, SNIA; Becky Swain, CSPO Cisco; Winston Bumpus, DMTF[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]55 mins