Bootcamp

Bootcamp

Date

Tuesday 26 | Wednesday 27 | Thursday 28

Location

Circus Celebration

Welcome to Bootcamp

Introducing a new format for CloudFest 2019: our Bootcamp series! Get hands-on with the latest Cloud tools and techniques, taught by the top-flight professionals who know them best. Don’t worry—nobody will yell at you or make you do push-ups… unless you want them to. These technically-minded sessions are designed to get you up to speed very quickly, while making new connections along the way.

Tuesday 26

Site Reliability Engineering: Meet The Biggest Elephant In The Room

By Plesk

9:30 AM - 11:30 AM

Twenty years ago hosting was simple: configure Apache, create system users, maybe install a control panel, and you’re basically good to go. The complexity of hosting has increased dramatically over the years, leading to new challenges — in particular, when it comes to satisfying the growing needs of your clients. Consider this: modern websites are extremely complex, so expecting developers to double as DevOps engineers isn’t realistic. Web devs want to focus on making these complex sites, and things like infrastructure management, monitoring, and security are not their primary area of expertise. However, these things are still needed, and your customers expect you, the hoster, to handle these things (believe us, we’ve talked to them).

Let’s learn why web developers do not want to — and should not — handle the environment and infrastructure for their projects. Discover the tools that can help you do stuff that nobody wants to do, but everybody wants to have, protecting you and your clients from making the same mistakes over and over.

Register Now!

Transformation to Azure Service Provider

By Microsoft

12:00 PM - 1:00 PM

A managed services provider (MSP) delivers a set of services to clients, addressing their needs by uncovering opportunities that provide long-term value with ongoing services—and potentially IP. Additionally, adopting managed services is an efficient way to stay up-to-date on technology; get access to necessary skills; and address a range of issues related to cost, quality of service, and risk.

This is a long-term investment, and for CIOs represents a paradigm shift, because DevOps has completely changed the way applications are developed and maintained. Device and data proliferation means customers want to—and can— do so much more with their IT assets, with the cloud providing the computing resources to do so. A Microsoft Azure MSP helps customers transition to (and embrace) these new technologies by guiding them in all aspects of their cloud journey. From consulting to migrations to operations management, Azure MSPs show customers all the benefits that come with making the move to the cloud.

Register Now!

New HPE technologies and AI-driven solutions for service providers

By HPE

2:30 PM - 4:30 PM

Learn from HPE technologists about our latest innovations to enable service providers to embrace the AI-driven world and Hybrid IT:

  • HPE Nimble Storage Arrays combine a flash-efficient architecture with HPE InfoSight predictive analytics.
  • HPE Cloud Volumes is a mature Storage-as-a-Service offering providing block storage to applications running on both AWS and Microsoft Azure.
  • With HPE Composable Cloud for ProLiant DL, service providers can scale infrastructure in real-time using template-driven automation.
  • Recent HPE acquisition, BlueData, is a leading provider of software that transforms how to deploy AI and big data analytics with a multitenant as-a-service platform.
Register Now!

AMD EPYC SEV - Memory Encryption For Cloud Security

By AMD

5:00 PM - 6:00 PM

Who has access to your data? Despite industry progress, public cloud security remains a significant challenge. Most software security techniques can be readily bypassed by insiders with root privilege or physical access. Highly motivated hackers search diligently for bugs that can be exploited into virtual machine escapes and local privilege escalations. Anybody with a connection to your host server is a potential threat. Learn how AMD EPYC™ uses dedicated hardware to encrypt both the host and virtual machine memory and provide a secure Root-of-Trust for system and guest boot. Includes a live memory scrape attack on both standard and encrypted virtual machines.

Register Now!

Wednesday 27

Dell Technologies Capital – Discover How Dell Technologies Support Innovation and Startup Time to Market

By Dell EMC

09:30 AM - 11:30 AM

Dell Technologies has innovation at its core. Our purpose is driving breakthrough thinking and develop new ways of approaching technologies to transform our customers. With this mindset, Dell Technologies supports startups in putting to market innovative solutions & services. During this bootcamp, we want to foster innovation thinking, displaying how we can help you and your businesses to thrive.

  • Dell Technologies innovation & startups vision, building on unique new innovations to bring to life new technologies. Then, we embed those technologies into our unique portfolio of solutions and services, helping our ecosystem to differentiate in the market, and our customers to be ahead of the pack. We bring consistency to our customer transformation.
  • Lightbits Labs, one of our portfolio startup supported by Dell Technologies Capital, will give a deep insight in their concept. You will finally discover a simple and scalable storage solution that capitalizes on the opportunity created by combining newly-available and affordable Flash technology with high-performance standard networks.
  • Followed by a panel discussion completed by a Q&A session with:
    o Stephen Lernihan (moderator)
    o Muli Ben-Yehuda, Lightbits Labs CTO
    o Patricia Florissi, Dell Tech CTO
    o Jurgen Domnik, Dell Tech EMEA Director of Sales Strategy for Global Alliances
    o Jeff Wittich, Intel Cloud Director
    o Johann Strauss, Dell Tech Technology Alliances Director
Register Now!

How to build and grow AI practices

By Microsoft

12:00 PM - 1:00 PM

To understand the multiple opportunities, it is helpful to understand the high-level process for delivering AI solutions, since the two are related. The high-level process is as follows:

  1. Envision AI: Help your clients envision the possibility of AI and what it could bring to their organizations – helping them see a roadmap where AI increasingly becomes a part of their daily operations and the benefits this brings.
  2. Implement AI: Guide your customers in implementing the AI solution by integrating existing, pre-built AI APIs or developing custom AI solutions.
  3. Deploy AI: Help your customers get their AI solution into production. If your services stop at helping them build the solution, what will their internal teams do when something goes wrong? AI solutions can be complicated, and a customer may not have the internal team capable of supporting them. Providing support for AI solutions creates a great opportunity for recurring revenue.

Finally, as AI becomes more and more integrated into the daily activities of a partner’s customers, partners who offer AI services will be differentiated from those who do not. AI will not only create significant opportunities for partners, but also give them competitive advantages.

Register Now!

Control Your Bots – Using deep analytics to classify and manage web traffic sources.

By Myra Security

1:30 PM - 2:00 PM

On average, automated web clients (bots) generate more than 50 percent of all web traffic hitting popular web applications. While good bots play by the rules, bad and evil bots disguise themselves to cheat, steal, or create damage / unwanted server load. Learn about the dangers of bot traffic and how to detect and control it for an improved overall site performance.

Register Now!

AMD EPYC SEV - Memory Encryption For Cloud Security

By AMD

2:30 PM - 3:30 PM

Who has access to your data? Despite industry progress, public cloud security remains a significant challenge. Most software security techniques can be readily bypassed by insiders with root privilege or physical access. Highly motivated hackers search diligently for bugs that can be exploited into virtual machine escapes and local privilege escalations. Anybody with a connection to your host server is a potential threat. Learn how AMD EPYC™ uses dedicated hardware to encrypt both the host and virtual machine memory and provide a secure Root-of-Trust for system and guest boot. Includes a live memory scrape attack on both standard and encrypted virtual machines.

Register Now!

Fixing The Login - Onboard And Retain Customers At Ease!

By ID4Me

4:15 PM - 6:00 PM

Managing logins and digital identities across multiple sites and applications on the internet is a frustrating experience for users and site owners alike. It is just about time for a new, better approach to a Single Sign-On solution for the cloud and hosting industry. In this technical breakout session we will show you why we think current logins are broken, why we claim ID4me can be the solution to fix it and why you should care.

ID4me is an open, federated approach to Single Sign-On and Digital Identity, based on well established standards and a focused on authentication and helping conversion. We will show you its underlying principles, feature set and how it works on technical side including a live demo. There will be the latest news and updates shown as well as the most recent developments from the CloudFest hackathon. We will also have plenty of time for questions and open discussions, as we are actively looking for your feedback and contributions.

Register Now!

Thursday 28

Offering Storage and Data Protection as a Service in the Age of Hyperscalers - Part 1

By IBM Storage

09:30 AM - 10:30 AM

To safeguard and unlock the value of massive amounts of data, today’s organizations need modern approaches for storing, protecting, and managing physical, virtual and cloud-based workloads. While modernization is a top priority, cost matters, and utilizing new efficiencies for storage and data protection is an important part of the equation. IBM is an industry leader in both massive scale data repositories and modern data protection around the world. In this session we will cover how IBM’s technologies help cloud service providers and IT departments build valuable storage and data protection services that complement hyperscaler offerings.

Register Now!

Building an infrastructure ready for tomorrow’s customer

By IBM LinuxOne

10:30 AM - 11:30 AM

The battle among service providers for the next tier of data and applications has begun. Clients are increasingly demanding premium cloud offerings, at a low cost, and expect their providers to meet those needs with next-gen technology. Can your infrastructure fulfill the requests of tomorrow’s customer?

In this 1-hour, interactive workshop, you will gain firsthand insight on how you can quickly enable your business to deliver next-gen services, exceed client expectations, and win new business with the right infrastructure.

Register Now!

Supercharge Your Cloud: Open. Optimized. Ready to go.

By Boston Server & Storage Solutions & Asperitas

12:00 PM - 1:00 PM

Transitioning HPC to the cloud requires a different approach if you are to maximize the performance and fully utilize the new environment. Cloud workloads gives you the ability to think outside of schedules and batches and adopting a fresh approach is as important as the transitioning of the workloads. In this presentation I will discuss how vScaler helps support these approaches and simplifies the transition from existing HPC workload management to HPC in the Cloud as well as what makes an optimized cloud.

Register Now!

Acceleration Through Intelligence & Agility

By ScaleFlux & Boston Server & Storage Solutions

2:30 PM - 3:30 PM

Adding intelligence to Flash storage is a simple idea. Bringing compute to data saves expensive transfers to the CPU, while parallelizing compute across drives minimizes processing latency. Taking advantage of these concepts is a natural evolution of modern storage infrastructure, but we must carefully consider many complex design points to deliver a truly mass-market solution.

Computational Storage is ideally built on intelligence and agility. ScaleFlux Computational Storage enables deep optimization between applications and storage. In addition, programmable hardware allows new compute and storage functions to be directly integrated in-system. As a result, Computational Storage evolves in lock step with customer data-driven demands (empowering databases, analytics, fintech, CDNs, AI, ML and many more applications) and maximizes the benefits of Flash deployments.

Register Now!

Offering Storage and Data Protection as a Service in the Age of Hyperscalers - Part 2

By IBM Storage

4:00 PM - 6:00 PM

To safeguard and unlock the value of massive amounts of data, today’s organizations need modern approaches for storing, protecting, and managing physical, virtual and cloud-based workloads. While modernization is a top priority, cost matters, and utilizing new efficiencies for storage and data protection is an important part of the equation. IBM is an industry leader in both massive scale data repositories and modern data protection around the world. In this session we will cover how IBM’s technologies help cloud service providers and IT departments build valuable storage and data protection services that complement hyperscaler offerings.

Register Now!