Rise of the Cloud: Cloud Computing Imperative 2012

0
479
  • Global studies prove that ‘cloud computing services’ could add US $800bn in net new business revenue by end of 2013.

The time when IT was just a support function to a few businesses around the world is over. Global politics and the global economy are being shaped by IT. For the IT leader to survive and sustain in this environment they must lead by consistently changing the strategies and re-create IT. This new era brings with it urgent and compelling forces: the cloud, social, mobility and an explosion in information.
Fleming Gulf Conferences launches Cloud Computing Imperative 2012 to be held on 12-13 March followed by a cloud security workshop programme on 14 March in Dubai – UAE, which will set the stage for IT specialists from public, private and government entities to network with industry peers, share experiences and learn how to view and implement Cloud and its security.

The cloud computing conference has a dynamic speaker line up comprising of who’s who of the industry like Tareq Alemadi, Head of Information Technology, Office of Her Highness Sheikha Moza Bint Nasser, Mohamed Roushdy, Chief Information Officer, Siraj Finance, Firas Sleiman, Lead Enterprise Architect and Acting Director of Technology, Abu Dhabi Government (Musanada), Dr. Jassim Haji, Director of Information Technology, Gulf Air, Neetan Chopra, VP – IT Strategy and Architecture, Emirates Group IT, Ali Al-Hamdany, Group Director of Information Technology, Air Arabia.

This prominent speaker panel will take the audience into the imperatives of what’s this “ Cloud “ ? develop strategies to implement IaaS, PaaS, SaaS, XaaS, elevate strategical steps to the Cloud and planing the shift of IT responsibilities. The topics are tacked together in a way to shift from the usual rigmarole and get a fresh perspective on managing project budget, build a strong return on investment from Cloud Computing, understand the shift from managed services to the Cloud, master the Cloud infrastructure and see Cloud security from a hacker’s perspective.

LEAVE A REPLY

Please enter your comment!
Please enter your name here