Red Hat Plans European Cloud Tour
Seven-city tour presents strategies and best practices for building open clouds.
Red Hat Inc. will host a seven-city tour of one-day, cloud-focused events throughout Europe. According to the announcement, the event series will cover strategies and best practices from Red Hat experts and partners on approaches for building open clouds. The Red Hat cloud tour aims to answer key questions surrounding cloud computing today, such as where to start, how to govern, and how to use cloud computing to accelerate business.
The cloud tour will also showcase Red Hat’s cloud offerings, including its virtualization, platform, and middleware technologies.
Scott Crenshaw, vice president and general manager, Cloud Business Unit at Red Hat, will present a keynote session, and speakers from across Red Hat will provide local insight and expertise. Attendees will also have the opportunity to participate in roundtable discussions and gain insight from existing Red Hat customers.
The dates and locations for the tour are as follows:
March 20, 2012 Helsinki, Finland
March 21, 2012 Stockholm, Sweden
March 22, 2012 Zürich, Switzerland
March 27, 2012 Rome, Italy
March 28, 2012 London, UK
April 3, 2012 Amsterdam, Netherlands
April 4, 2012 Paris, France
To find out more, please visit the Red Hat Cloud Tour page.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm