Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Virtualization, cloud computing to dominate Interop

Jon Brodkin, Network World | April 18, 2011
Interop Las Vegas will focus on virtualization, cloud computing, the impact of social technologies and smartphones on work, and much more.

2 p.m. On-demand SLAs: cloud terms of service

The status of service-level agreements is one of the major sticking points preventing some enterprises from adopting cloud computing. While traditional computing products are location-specific, cloud networks can exist anywhere, making it difficult to ensure compliance and analyze risk. This session will provide an overview of U.S. and European laws, highlighting aspects of cloud computing that regulators might target.  

Speaker - Nolan Goldberg, Attorney, Proskauer LLPSpeaker – David Snead, Attorney + Counselor, W. David Snead, P.C.

3:15 p.m. The real next generation network

The "next generation" of networks will be driven by dramatic shifts related to virtualization and cloud computing, and it's time to ask whether we should keep building networks the way we always have. Drawing on the latest information from researchers and lessons learned from leading cloud computing vendors, this panel will examine new approaches to designing networks that can build a "truly dynamic, virtualized data center."

Moderator - Jim Metzler, Vice President, Ashton Metzler & AssociatesPanelist - Martin Casado, Co-Founder and CTO, Nicira NetworksPanelist - Nick McKeown, Professor of Computer Science and Electrical Engineering, Stanford UniversityPanelist - Igor Gashinsky, Network Architect, YahooPanelist - Manish Muthal, Director, Strategic Planning, Networking Components Division, LSI

3:30 p.m. Dissecting the three major threat vectors – insiders, industrialized, and advanced persistent threats

Virus and malware attacks are coming at the enterprise from all angles, from the rudimentary to the highly complex. Using research from McAfee Labs and the experiences of real customers, McAfee will "paint a clear picture of today's threat landscape" to illustrate the differences "between insiders, industrialized hackers, and advanced persistent threats." Session attendees will learn about attacker motives, attack vectors, and the countermeasures enterprises can take that don't rely on a specific vendor or product.  

Speaker - Brian Contos, Director Global Security Strategy, McAfee

Thursday, May 12

9 a.m. Off the hook: Advances in wireless LAN technologies

Wireless LAN is constantly evolving with new standards, specifications and technologies. This session will explain important developments, discuss implications for enterprise network planning and operations, and offer a glimpse into "the farther-term future of the wireless LAN."

Moderator - Fanny Mlinarsky, President, OctoScope

10:15 a.m. Social networks and security – can you have both?

It's getting more and more difficult for businesses to block employees from accessing social networks. They're not only popular, but they provide important business benefits, yet also "unheard-of security risks." This session will detail the security and privacy troubles posed by social networks while showing how enterprises can use them effectively without putting security and data at risk.

 

Previous Page  1  2  3  4  5  Next Page 

Sign up for Computerworld eNewsletters.