May 9-10, 2023 | USA
.NEXT is finally live again, and we can’t wait to meet you in person. Come discover how easy it is to manage all your clouds as one, public and private alike. We’ll show you how to run your apps from any cloud at any scale, with the flexibility you want and the security you need. The hybrid cloud really is the best of both worlds—join us in Chicago and see why
June 26-30, 2023 | France
Performance and QoS, Privacy, security, ownership and reliability issues, Power-efficiency and Cloud computing, Dynamic resource provisioning, Application streaming, Load balancing, Cloud service subscription model, Cloud SLAs, business models and pricing policies, Cloud-related privacy, Cloud standardized SLA, Managing applications in the clouds, Cloud-related control, Roaming services in Clouds, Mobile clouds, Agent-based Cloud Computing
May 25, 2023 | Germany
The Workshop on Virtualization in High-Performance Cloud Computing (VHPC) aims to bring together researchers and industrial practitioners facing the challenges posed by virtualization in HPC/Cloud scenarios in order to foster discussion, collaboration, mutual exchange of knowledge and experience, enabling research to ultimately provide novel solutions for virtualized computing systems of tomorrow.
July 8-10, 2023 | China
Rapid proliferation of computing and communication systems with increasing computational power and connectivity into every sphere of modern life has brought security to the forefront of system design, test, and validation processes. The emergence of new application spaces for these systems in the internet-of-things (IoT) regime is creating new attack surfaces as well as new requirements for secure and trusted system operation. Additionally, the design, manufacturing and the distribution of microchip, PCB, as well as other electronic components are becoming more sophisticated and globally distributed with a number of potential security vulnerabilities. Therefore, hardware plays an increasingly important and integral role in system security with many emerging system and application vulnerabilities and defense mechanisms relating to hardware.