Jo Peterson presents "How to vet cloud service provider" in this speaker series hosted by ScaleMatrix. Jo is frequently requested for unique insight into business technology trends that are shaping enterprise strategies.
At the intersection of business and technology, Jo presents Keynotes on: Trends in Cloud Computing, Trends in Enterprise IoT, Cloud Roadmapping, Cloud Enablement Best Practices
1. Procuring the Cloud and Clearing the Fog
Category: Procurement, Cloud Roadmapping
Summary: With so many services rapidly moving to the cloud, buyers need a Cloud survival guide—a step by step process that teaches them how to identify and address cloud specific risks. The keynote identifies potential Cloud-contracting problems and sets forth a process to help the IT sourcing professional and his/her internal clients (users, IT, project managers, business managers, executive sponsors, and so forth) prepare and conduct effective negotiations to enable the customer to get better deals and better contracts for Cloud Services
Best Audience: This seminar is a must-attend learning event for anyone implementing, planning or considering adopting a cloud computing solution, including:
- IT Professionals
- Business Managers
- Procurement and Sourcing Professionals
- Prepare yourself to acquire Cloud Services
- Analyze/evaluate Cloud Services options
- Mitigate Cloud Service risks
2. Fog Computing—The Powerhouse of IoT for 2018
Category: Cloud Roadmapping, IoT
Summary: According to IDC, the number of devices connected to the internet was 13 billion in 2015. By 2020, this number will swell to over 30 billion. Traditional computing devices like smartphones, watches, and tablets will be less than a third of the total, while spending on IoT solutions will grow from almost $700 billion in 2016 to nearly $1.9 trillion in 2021.
For devices in local networks, the cloud can simply be too slow.
The speed at which technology evolves these days is amazing. Although we are still in the middle of the cloud revolution, suddenly a new networking paradigm has appeared: fog computing. And it seems to be a key component of another popular trend, The Internet of Things (IoT), or as we prefer to call it, the Internet of Everything.
Enter Fog Computing, the space in between cloud and on premise computing. It is this middle ground that will power IoT in 2018.
Best Audience: IT professionals, IT Procurement
- Learn the 5 Business Advantages of Deploying a Fog Solution for IoT
- Understand the top 5 Technical Reasons why IoT needs Fog Computing
- Explore key domains—Smart Lighting, Smart Energy, Smart Agriculture and Smart Transportation where Fog Computing is making an impact
3. Third Party Cloud Management Tools to the Rescue
Category: Cloud Management, Procurement
Summary: Cloud customers are increasingly turning to third-party tools or add-on functions to meet specific cloud-management requirements. Many businesses want to realize the power of AWS and Azure without having to incur the challenge and expense of managing it themselves. There are businesses that lack the technical expertise and capacity to operate cloud infrastructure, tools and applications while others, who have the ability to manage, still prefer to maintain focus on their focus on their core business instead. Some other enterprises are on a multi phased journey to the cloud, requiring transition and management services that can adapt to an evolving set of needs. Lastly there are other firms who are solely concerned with the financial aspect of cloud management.
Best Audience: IT Professionals, Procurement Professionals, Financial Staff
- Learn the 4 Technical Benefits associated with these tools-- Migration, Architecture, Security and Operations
- Explore the 3 Business Benefits—Cost Savings, Predictable Monthly Costs, Ability to Provide Charge Back/Show Back to LOBs
4. CyberCloud—A Defense in Depth Approach to Your Cloud Footprint
Category: Cloud, Security
Summary: In this session a “defense in depth” approach which combines information security, best practices and layered technology will be reviewed. Defense in Depth is designed to protect information confidentiality, integrity, and availability. The strategy is multilayered, with defenses at all the touch points in the flow of data, providing complete and comprehensive privacy, transparency, and audit controls.
Best Audience: IT Professionals, IT Security Professionals
- Learn the 5 Critical Layers to a Defense in Depth Approach
- Review Network Defense Options in a Cloud Computing Environment
- Explore the Components of a Cloud Security Reference Model
2018 Calendar of Speaking Engagements
June 17-20—LiveWorx Boston
May 14-17— IoT World Santa Clara
April 17-20—Channel Partners Expo Las Vegas
March 19-21—IBM Think Conference Las Vegas
March 13—Data Center World San Antonio: Women in the Data Center (9:10AM to 10:10AM)
February 27—Container World Santa Clara (1:50 PM –2:30 PM) Panel: Cloud Native/Cloud Immigrant: Modernizing the Enterprise
2017 Calendar of Speaking Engagements
October 23-25, 2017— IoT Summit
May 23, 2017—LiveWorx: Navigating the Cloud Tipping Point
April 11, 2017— Channel Partners
Feb 26, 2017— Container World