Jo Peterson presents "How to vet cloud service provider" in this speaker series hosted by ScaleMatrix. Jo is frequently requested for unique insight into business technology trends that are shaping enterprise strategies.

At the intersection of business and technology, Jo presents Keynotes on: Trends in Cloud Computing, Trends in Enterprise IoT, Cloud Roadmapping, Cloud Enablement Best Practices

1. Procuring the Cloud and Clearing the Fog

Category:  Procurement, Cloud Roadmapping

Summary: With so many services rapidly moving to the cloud, buyers need a Cloud survival guide—a step by step process that teaches them how to identify and address cloud specific risks. The keynote identifies potential Cloud-contracting problems and sets forth a process to help the IT sourcing professional and his/her internal clients (users, IT, project managers, business managers, executive sponsors, and so forth) prepare and conduct effective negotiations to enable the customer to get better deals and better contracts for Cloud Services

Best Audience:  This seminar is a must-attend learning event for anyone implementing, planning or considering adopting a cloud computing solution, including:

  • IT Professionals
  • Business Managers
  • Procurement and Sourcing Professionals

Key Takeaways:

  • Prepare yourself to acquire Cloud Services
  • Analyze/evaluate Cloud Services options
  • Mitigate Cloud Service risks

2. Fog Computing—The Powerhouse of IoT for 2018

Category: Cloud Roadmapping, IoT

Summary: According to IDC, the number of devices connected to the internet was 13 billion in 2015. By 2020, this number will swell to over 30 billion. Traditional computing devices like smartphones, watches, and tablets will be less than a third of the total, while spending on IoT solutions will grow from almost $700 billion in 2016 to nearly $1.9 trillion in 2021.

For devices in local networks, the cloud can simply be too slow.

The speed at which technology evolves these days is amazing. Although we are still in the middle of the cloud revolution, suddenly a new networking paradigm has appeared: fog computing. And it seems to be a key component of another popular trend, The Internet of Things (IoT), or as we prefer to call it, the Internet of Everything.

Enter Fog Computing, the space in between cloud and on premise computing. It is this middle ground that will power IoT in 2018.

Best Audience: IT professionals, IT Procurement

Key Takeaways:

  • Learn the 5 Business Advantages of Deploying a Fog Solution for IoT
  • Understand the top 5 Technical Reasons why IoT needs Fog Computing
  • Explore key domains—Smart Lighting, Smart Energy, Smart Agriculture and Smart Transportation where Fog Computing is making an impact

3. Third Party Cloud Management Tools to the Rescue

Category: Cloud Management, Procurement

Summary: Cloud customers are increasingly turning to third-party tools or add-on functions to meet specific cloud-management requirements. Many businesses want to realize the power of AWS and Azure without having to incur the challenge and expense of managing it themselves. There are businesses that lack the technical expertise and capacity to operate cloud infrastructure, tools and applications while others, who have the ability to manage, still prefer to maintain focus on their focus on their core business instead. Some other enterprises are on a multi phased journey to the cloud, requiring transition and management services that can adapt to an evolving set of needs. Lastly there are other firms who are solely concerned with the financial aspect of cloud management.

Best Audience: IT Professionals, Procurement Professionals, Financial Staff

Key Takeaways:

  • Learn the 4 Technical Benefits associated with these tools-- Migration, Architecture, Security and Operations
  • Explore the 3 Business Benefits—Cost Savings, Predictable Monthly Costs, Ability to Provide Charge Back/Show Back to LOBs

4. CyberCloud—A Defense in Depth Approach to Your Cloud Footprint

Category: Cloud, Security

Summary:  In this session a “defense in depth” approach which combines information security, best practices and layered technology will be reviewed. Defense in Depth is designed to protect information confidentiality, integrity, and availability. The strategy is multilayered, with defenses at all the touch points in the flow of data, providing complete and comprehensive privacy, transparency, and audit controls.

Best Audience: IT Professionals, IT Security Professionals

Key Takeaways:

  1. Learn the 5 Critical Layers to a Defense in Depth Approach
  2. Review Network Defense Options in a Cloud Computing Environment
  3. Explore the Components of a Cloud Security Reference Model


2018 Calendar of Speaking Engagements

June 17-20—LiveWorx Boston

May 14-17  IoT World Santa Clara 

April 17-20Channel Partners Expo Las Vegas

March 19-21IBM Think Conference Las Vegas

March 13—Data Center World San Antonio: Women in the Data Center (9:10AM to 10:10AM)

February 27—Container World Santa Clara (1:50 PM –2:30 PM) Panel: Cloud Native/Cloud Immigrant: Modernizing the Enterprise

2017 Calendar of Speaking Engagements

October 23-25, 2017— IoT Summit

October 23, 2017Cloud Security Summit--How the Cloud and IoT Are Disrupting Identity & Access Management

September 26, 2017Channel Partners Evolution: Selling Application and “as-a-Service” Clouds | Make Money Moving up the Stack

September 26, 2017SDxE: Evolve or Die:  Moving from Legacy IT to a True Software Defined Infrastructure

May 23, 2017LiveWorx: Navigating the Cloud Tipping Point

May 17, 2017IoT World: (moderator/panel) The Power of women as IoT adopters and Influencers

April 11, 2017 Channel Partners

Feb 26, 2017Container World

Nov 2, 2016IoTEmerge: (session speaker) Your IT Digital Transformation Takes Drive

Book Jo as your speaker