.

EVENTS

   
Zenith Live 2018 - Zscaler Cloud Summit
ZENITH LIVE 2018 - ZSCALER CLOUD SUMMIT
June 25-27, 2018
Zenith Live 2018, the Zscaler Cloud Summit, is the inaugural conference for Zscaler customers, prospects and partners. The three-day conference will bring together cloud technology visionaries, business leaders, network and security experts, and practitioners in a symposium focused on the possibilit...

OWASP AppSec Europe
OWASP APPSEC EUROPE
July 02-06, 2018
Welcome to OWASP Annual AppSec EU Security Conference, the premier application security conference for European developers and security experts. AppSec EU provides attendees with insight into leading speakers for application security and cyber security, training sessions on various applications, net...

IEEE CLOUD 2018
IEEE CLOUD 2018
July 02-07, 2018
The IEEE International Conference on Cloud Computing (CLOUD) has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of cloud computing, identify emerging research topics, and define the fut...

The 3rd IoT Global Innovation Forum
THE 3RD IOT GLOBAL INNOVATION FORUM
July 10-11, 2018
The 3rd IoT Global Innovation Forum, July 10-11, 2018 at the World Trade Center in Portland, Oregon features two days of focused networking and information sharing at the IoT cutting edge. This third edition brings together leading innovators, business executives and industry professionals to examin...

OpenText Enterprise World 2018
OPENTEXT ENTERPRISE WORLD 2018
July 10-12, 2018
Why attend Enterprise World:  Enterprise World 2018 is our annual event for OpenText customers. Where we bring together our best and brightest people in a setting where our customers can explore, learn, meet peers, and drive even greater value from their digital strategies. Attendees have the o...

Computing Conference 2018
COMPUTING CONFERENCE 2018
July 10-12, 2018
Computing Conference (formerly called Science and Information (SAI) Conference) is a research conference held in London, UK since 2013. The conference series has featured keynote talks, special sessions, poster presentation, tutorials, workshops, and contributed papers each year.

ITx 2018
ITX 2018
July 11-13, 2018
ITx is a collaboration of thirteen tech-focused conferences and bodies and focuses on innovation, technology and education. ITx brings IT professionals, decision-makers, leaders and academics together under one roof. This is a conference like no other: where industry, academia and government come to...

Big Data Innovation Summit
BIG DATA INNOVATION SUMMIT
July 17-18, 2018
As organizations evolve and embrace technological advances, data becomes a key currency on which they can hope to gain an advantage over competitors and push business success. The agenda will explore all topics and themes on how we can better embrace data and push it to the limits. Topic Areas Cover...

OSCON (Open Source Convention)
OSCON (OPEN SOURCE CONVENTION)
July 18-19, 2018
Now in its 20th year, OSCON (Open Source Convention) is an annual event that brings together engineers, developers, and business leaders to transform the practice of software development and revolutionize the next wave of innovation. Focusing on real-world practices and how you can successfully impl...

Black Hat USA 2018
BLACK HAT USA 2018
August 04-07, 2018
Now in its 21st year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days of technical Trainings (August 4 – 7) followed by the two-day main conference (August...

27th USENIX Security Symposium
27TH USENIX SECURITY SYMPOSIUM
August 15-17, 2018
The 27th USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Please join us in Baltimore for the 27th USENIX Security Symposium. USE...

World Congress & Expo on Healthcare IT
WORLD CONGRESS & EXPO ON HEALTHCARE IT
August 21-22, 2018
This Healthcare IT Conference is based on the theme “Innovative Technologies to Enhance the Current Healthcare Systems”.  Healthcare IT & Expo 2018, Paris welcomes proposals and ideas from both Industry & Academia to be presented at this interactive platform. Healthcare IT s...

International Summit on Telecommunications, Cloud Computing and Wireless Technology
INTERNATIONAL SUMMIT ON TELECOMMUNICATIONS, CLOUD COMPUTING AND WIRELESS TECHNOLOGY
August 22-23, 2018
International Summit on Telecommunications, Cloud computing and Wireless Technology is organizing an outstanding Scientific Exhibition/Program and anticipates the world's leading specialists involved in Telecommunications, Cloud computing and Wireless Technology . Your organization will benefit ...

9th Annual International Conference on ICT: Big Data, Cloud and Security
9TH ANNUAL INTERNATIONAL CONFERENCE ON ICT: BIG DATA, CLOUD AND SECURITY
August 27-28, 2018
The Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2018) serves as a platform for industry professionals, academics, researchers, scientists, consultants and policy makers to interact and discuss various issues in big data, cloud computing and IT security.

CLOUDSEC 2018
CLOUDSEC 2018
September 04-04, 2018
CLOUDSEC is back and the rise of AI, and its challenge to human intelligence, is the theme of the day. Will machines out-smart their creators? For those in the IT sector this event is not to be missed! With record attendance at last year’s event, and this year shaping up to be even bigger and ...

Jenkins World 2018
JENKINS WORLD 2018
September 16-19, 2018
Jenkins World is known as one of the top events worldwide for everything Jenkins, a Java-based open-source automation server. The conference focuses on all things relevant to Jenkins, including community, Cloudbees, ecosystem, and DevOps. By bringing together some of the leading global experts and p...

Cyber Security Exchange | Healthcare
CYBER SECURITY EXCHANGE | HEALTHCARE
September 23-25, 2018
The regular occurrence of security breaches has led healthcare enterprises to treat cyber security as a risk that needs to be actively managed, rather than just a technology issue. From medical data tracking on the go to bedside life support systems, medical innovations have changed healthcare deliv...

STARWEST Software Testing Conference
STARWEST SOFTWARE TESTING CONFERENCE
September 30-05, 2018
STARWEST is one of the longest-running, and most respected conferences on software testing and quality assurance. The event week features over 100 learning and networking opportunities and covers a wide variety of some of the most in-demand topics and innovations.

What is Business of Software?
WHAT IS BUSINESS OF SOFTWARE?
October 01-03, 2018
Exceptional people who want to be the best they can be in their chosen career. Entrepreneurs, established and emerging leaders, they come to learn from each other, not to party (though there will be plenty of social activity). So many events are about everyone being on ‘broadcast mode’, ...

Web Development & Architecture
WEB DEVELOPMENT & ARCHITECTURE
October 15-19, 2018
There are lots of interesting aspects in Web Development, for example is the architectural one, and, of course, DevOps, the collaboration between software developers and the IT operations team through the entire service lifecycle. The goal is to provide resilient and sustainable systems in a world o...

IT & DIGITAL LEADERS NORDICS
IT & DIGITAL LEADERS NORDICS
October 15-15, 2018
The IT & Digital Leaders Dialogue Nordics brings together 60 industry leading CIOs, CDOs, Directors of IT and Transformation from across the Nordic region, offering exclusive networking and benchmarking opportunities with both your peers, and industry experts.

The 8th International Conference on the Internet of Things
THE 8TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS
October 15-18, 2018
The 8th International Conference on the Internet of Things (IoT 2018) hosted by the Center for Spatial Studies at the University of California, Santa Barbara will take place from October 15–18, 2018 in Santa Barbara, California, USA. The rapid advancement and ubiquitous penetration of mobile n...

DevOps Enterprise Summit
DEVOPS ENTERPRISE SUMMIT
October 22-24, 2018
DevOps Enterprise Summit is a conference for the leaders of large, complex organizations implementing DevOps principles and practices. The event programming emphasizes both evolving technical and architectural practices and the methods needed to lead widespread change efforts in large organizations....

Percona Live Open Source Database Conference
PERCONA LIVE OPEN SOURCE DATABASE CONFERENCE
November 05-07, 2018
The conferences have a technical focus with an emphasis on the core topics of MySQL, MongoDB, PostgreSQL and other open source databases, including time series databases and RocksDB. Tackling subjects such as analytics, architecture and design, security, operations, scalability and performance, Perc...

SC 2018 : International Conference on High Performance Computing, Networking, Storage and Analysis
SC 2018 : INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS
November 11-16, 2018
The SC Conference operates a commodity network for attendees and an experimental network that showcases the most advanced and sophisticated technology currently available. During the conference, the SCinet experimental network delivers greater bandwidth than any other facility in the world and more ...

Enterprise Security & Risk Management Summit 2018
ENTERPRISE SECURITY & RISK MANAGEMENT SUMMIT 2018
November 21-21, 2018
Cyber security is fast becoming one of the most critical issues in the IT world. As an increasing number of businesses are going digital and with cyber criminals becoming far more prolific and dangerous, the need for steadfast cyber security solutions has never been so important.

SPOTLIGHT

More than any business, telecommunications firms have long been dealing with huge, diverse sets of data. Big Data. Data that is unstructured, unwieldy and disorganised, making it difficult to analyse and costly to manage. Your landscape is fiercely competitive and you instinctively know it's exa

JUN 25, 2018 | 10:00 PM
DEEP DIVE ON USER-CENTRIC APM, BIG DATA AND AI
Most application performance management (APM) vendors shy away from big data, believing that it’s too much data to gather, store, and process. As a result, they rely on incomplete data sets and fill in the gaps with algorithms. This legacy approach slows troubleshooting, especially in distribu...
JUN 26, 2018 | 2:00 p.m.
THE MOST COMPREHENSIVE ENDPOINT PROTECTION: INTERCEPT X
With 75% of malware unique to a single organization [SophosLabs] you need to detect never-seen-before threats now. Join us to discover how Sophos Intercept X leverages multiple advanced techniques, including deep learning, anti-ransomware and anti-exploit technology, to stop both known and unknown m...
JUL 03, 2018 | 7:00 AM
CLOUD STRATEGIES DONE RIGHT
Join Cloudability co-founder, J.R. Storment, and Edrans co-founder, Martin Bianco, as they offer best practices proven out by hundreds of customers that have helped them achieve efficiency and agility on the cloud while simultaneously building a culture of cost optimization across their organization...
JUL 09, 2018 | 10:00 AM
SOFTWARE DEFINED PERIMETER - IN DEPTH USE CASES
This session will include a biref overview of Software Defined Perimeters and will then proceed to dirll-down on specific use cases. In this session you will learn what are some of the most popular use cases for Software Defined Perimeters and who has used them.
JUL 10, 2018 | 8:30 AM
THE 5 BIGGEST DATA MYTHS IN TELCO: EXPOSED
More than any business, telecommunications firms have long been dealing with huge, diverse sets of data. Big Data. Data that is unstructured, unwieldy and disorganised, making it difficult to analyse and costly to manage. Your landscape is fiercely competitive and you instinctively know it's exa...
JUL 10, 2018 | 01:00 pm
NUMERICAL PROGRAMMING: UNDERSTANDING PYTHON, NUMPY & MATPLOTLIB
Numerical Programming helps solving engineering and data science problems effectively. The numerical programming based applications are used throughout science for effective numerical analysis and some of the application areas include scientific research. Programming blended with algorithm or numeri...
JUL 12, 2018 | 1:00 PM
THE FIVE PHASES OF ETHICAL HACKING
Identifying the potential threats is an essential component of a successful cyber defense. An ethical hacker must possess in-depth understanding of the hacking process and capabilities to understand the mindset of the malicious hacker that can compromise the organizational security infrastructure. T...
JUL 14, 2018 | 01:00 pm
ARCHITECTURE INSIGHTS FOR MICROSOFT AZURE
Azure is a cloud computing service offered by Microsoft that helps developing scalable, secure and performant cloud solutions. Azure has the capability to host virtual machines in addition to offer access to a range of applications hosted in the cloud without any extensive know-how of the developmen...
JUL 17, 2018 | 12:00 AM
EMBARK ON A CLOUD DATA WAREHOUSE JOURNEY WITH SNOWFLAKE AND INFORMATICA
In order to remain agile and competitive, data management pros are constantly working to inject more data, faster to support their company’s decision making processes. This is a universal requirement to support core data-driven digital transformation objectives like growing the business, impro...
JUL 18, 2018
CYBERSECURITY FRAMEWORKS AND THREATS FACING THE FINANCIAL SERVICES INDUSTRY
The financial services industry faces unique financial, operational and compliance challenges due to the increasing sophistication of cyber threats and technology vulnerabilities. Managing cybersecurity risks and getting your arms around disparate regulations is difficult, regardless of your organiz...
AUG 07, 2018 | 10:30 AM
AUTOMATION AND DISTRIBUTED COMPUTING
Innovation driven by cloud, NFV, IOT, video content and virtual reality is compelling the delivery of increasingly distributed computing options. These environments will need to support technical requirements such as latency, connectivity and power management while adhering to regulator factors such...
AUG 14, 2018 | 01:00 pm
HOW TO HUNT FOR SECURITY THREATS
Threat Hunting (TH) is the process to search and identify the security threats across the internet and networks that may be escaped by the automated systems. Threat Hunting used the manual or machine-assisted methodologies to hunt and identify the security incidents through the networks. Effective r...
BELIEVE IN ‘BUSINESS AS USUAL’ FROM A PERFECT ORACLE EBS UPGRADE OR PATCH
System changes are risky. They require a huge amount of effort from IT and users to get them right. And the stakes are never higher than with ERP. We will reveal the results of our EBS user survey, enabling you to learn from those that are familiar with the trickiest aspects of keeping the system cu...
DEFUSE THE USER ACCEPTANCE TESTING TICKING TIME BOMB
Software applications built, purchased or consumed in the cloud all have one thing in common, they need to be tested before going live and had at least one round of User Acceptance Testing. That means a combination of business analysts and subject matter experts must put their day-to-day work on hol...
AGILE TEST AUTOMATION – TRUTH, OXYMORON OR LIE?
It can be confusing for everyone in an agile team to understand when or what to test, when there isn’t a test phase or any formal documented requirements. Whatever your agile methodology, projects require a change in the way QA and development work together. The use of technology and automatio...
WHAT VULNERABILITY ASSESSMENT TOOLS MISS
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How can you ens...
DON’T GET CAUGHT WITH AN OUT OF SUPPORT MS SQL SERVER
This means that if you are still running SQL Server 2005 after April 12, 2016, you will no longer receive security updates. Now is the time to upgrade to SQL Server 2014 and Azure SQL Database to achieve breakthrough performance, maintain security and compliance, and optimize your data platform infr...
home.aspx