Welcome!

Perl Authors: AppDynamics Blog, Liz McMillan, Mike Hicks, RealWire News Distribution, Bob Gourley

Related Topics: IBM Cloud, Java IoT, Containers Expo Blog

IBM Cloud: Article

Virtualization Journal Attracts JavaOne Attendees to SYS-CON Media Booth

Virtualization Journal now reaches more than 60,000 online readers with monthly digital editions and weekly newsletters

Founded in 2005, SYS-CON Media's 'Virtualization Journal (virtualization.sys-con.com) is the world's first magazine devoted exclusively to what Gartner has earmarked as the single highest-impact IT trend through 2012: virtualization. And now it will be available in print, on newsstands worldwide, as the first and only print publication serving Virtualization markets.

Premium Advertising Tool for Virtualization Markets!
Virtualization Journal now reaches more than 60,000 online readers with monthly digital editions and weekly newsletters. The premier issue of the magazine's print edition, which debuts on May 6, 2008, at JavaOne in San Francisco, as a media sponsor of this event, will be available on newsstands worldwide. Article submission inquiries can be directed by email to editorial(at)sys-con.com and the world's most targeted advertising opportunities can be explored by contacting advertising(at)sys-con.com, or by phone 201 802-3021.

SYS-CON Media seeks to support the world-beating "International Virtualization Conference & Expo" series as its premier media sponsor and with top-quality print collateral, available at newsstands wherever fine-quality technical journals are sold.

Already in its third issue, 'Virtualization Journal' seeks to demystify virtualization and help IT professionals and Data Center Managers to understand fully the benefits of virtualization, including reduced power consumption, improved server utilization, increased availability by reducing planned downtime, and reduced costs. Each issue addresses the key drivers, outcomes, and barriers to virtualization deployment.

Topics covered include: Server Virtualization, Desktop Virtualization, Application Virtualization, File Virtualization, The Future of the Virtual Enterprise, Hosted Virtualization, Para-virtualization, Virtualization Hardware Support, Virtual Security, Hardware-level Virtualization, Storage Virtualization, I/O Virtualization, Service-Oriented Virtualization, Virtualization for Server Consolidation and Containment, Windows Virtualization, Utility Computing, State of the Virtualization Services Market, Virtualization-based Malware, Cloud Computing, and Middleware Virtualization.

What's in the Premier Issue of the Print Edition?
Virtualization Journal's premier issue will offer the following technical articles and feature stories:

  • "Microsoft's Virtualization Lexicon" by Ben Armstrong (Microsoft)
  • "Planning and Securing Virtualization Servers" by Jae Ellers (VMware)
  • "Managing the Lego Data Center" by Omar Sultan (Cisco)
  • "What's VirtualBox and Why's It Useful to Developers?" by Tim Marsland (Sun)
  • "Six Considerations Before Taking Virtualization into Production" by Michael Harding (Symantec)
  • "Virtual Data Marts – Solutions with Promise" by Robert Eve (Composite Software)
  • "The Next Virtualization Waves Are Just Forming" by Pete Manca (Egenera)
  • "Virtualization Lifecycle Management & Virtual Sprawl" by David M. Lynch (Embotics)
  • "Security Shouldn't take a Backseat to Virtualization" by Ryan Sherstobitoff (Panda Security)
  • "Has VMware Awoken the Slumbering Microsoft Giant" by Brian Madden (The Brian Madden Co)
  • "Virtual Security: Challenges & Solutions" by Scott Lowe (ePlus)
  • "Can Virtualization Help My Small Business?" by Clint Eschberger (Virtual Enthusiasm)
  • "Simplifying Data Center Management" by Madhur Kohli (Levanta)
  • "The Role of the Network in Virtualizing Applications & Infrastructure Services" by Peter Linkin (Cisco)
  • "What Is Service-Oriented Virtualization?" by John Michelsen (iTKO)
  • "Using 'Containers' Virtualization Versus Dedicated Physical Servers" by Marc Perkel (Computer Tyme)
  • "Managing Virtual Sprawl" by David M. Lynch (Embotics)

Virtualization Technology Providers and Contributors in 2008
The following companies are among the providers and contributors of Virtualization technology: 3Leaf Systems, 3Tera, Acronis, Actional, Active Endpoints, ActiveGrid, activePDF, ActiveServers, ActiveState, Actuate, Agile Software, Agilent, AGiLiENCE, Agilysys, Akamai, Akorri, AlachiSoft, Altova, AMD, AMDAHL, Amentra, Amyuni, anacubis, Apani, APC, Appcelerator, Appistry, AppStream, Ascential, Attune Systems, Autodesk, AutoVirt, Availl, Azul Systems, BEA Systems, B-Hive, Black Duck Software, Black Hat, Blackbaud, Blue Lane Technologies, BlueArc, BlueNote, BluePhoenix Solutions, BMC Software, Borland, Bristol Technology, Brix Networks, BroadVision, Brocade, Burton Group, Business Objects, CA, CalAmp, Cassatt, Cast Iron, Catbird, Cayenne Technologies, Ceedo Technologies, Cenzic, CiRBA, Cisco Systems, Citrix Systems, ClearApp, ClearCube Technology, Compass America, Composite Software, Compuware, Configuresoft, Continuity Software, Coraid, Courion, Coyote Point Systems, DataDirect, DataSynapse, Dell, Double-Take Software, Ecora Software, EDS, Egenera, Elastra Corporation, Embarcadero, EMC Corporation, Enomaly Open Source, Enterprise Management Associates, Entuity, EqualLogic, ESRI, F5 Networks, Fortisphere, Forum Systems, Fujitsu, GemStone, Getronics, GigaSpaces, Green Hills Software, Grid Dynamics, GridGain Systems, GT Software, Hitachi Data Systems, HP, Hyperic, IBM, ICEsoft, Illumita, ILOG, IMEX Research, Information Builders, InstallFree, Intel, International Computerware, iTKO LISA, JBoss, Juniper, Kidaro, LynuxWorks, ManageIQ, Marathon Technologies, Mellanox, Microsoft, Mindreef, MKS, Moka5, Motorola, NASTEL, Ncomputing, NEC, NetApp, Netegrity, Neverfail, Nexaweb, NextAxiom, Nimbus, Novell, OpenSpan, OPNET Technologies, OpTier, Oracle, Panacea Software, Parallels, Pillar Data Systems, PlateSpin, PLX Technologies, Progress Software, Prolifics, Prosync Technology, Provision Networks, QLogic, Quest Software, Racemi, Raxco Software, Red Hat, Reflex Security, Resolutions Enterprises, Riverbed Technology, Rogue Wave, rPath, RSA Security, SanDisk, SAP, Saugatuck Technology, ScaleMP, Secure Command, ShavLik, ServInt Internet Services, Silpion IT Solutions, Software AG, Splunk, StackSafe, Stoneware, StoreVault, StrikeIron, STT, WebOS, Sun Microsystems, Surgient, Sybase, Symantec, Tenfold, TheInfoPro, Thinstall, Third Brigade, TIBCO Software, Tideway Systems, TRANGO Virtual Processors, Transitive, Trend Micro, Trigence, Unisys, Verio, VeriSign, Virtual Iron, VirtualLogix, Vizioncore, VKernel, VMLogix, vmSight, VMware, WSO2, XDS, Xiotech, xkoto, and Xsigo Systems.

More Stories By Virtualization News

SYS-CON's Virtualization News Desk trawls the news sources of the world for the latest details of virtualization technologies, products, and market trends, and provides breaking news updates from the Virtualization Conference & Expo.

Comments (1)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...