The more things change, the more they look the same…
What work looks like, and how it’s done, has changed a lot since the early 1800s. Actually, it’s changed a lot just since 1990! But, to understand where we’re going, we have to first understand where we’ve been.
By popular demand, Trivalent has invited back Lance J. Richards, who keynoted our 2014 Expo. Lance is a senior Human Resources executive and a Workforce Futurist. He will take us on a rapid ride from the days of the caveman to the Industrial Revolution to today… and beyond. We’ll look at the evolution of work, from man-as-machine to machine-as-brain, from Push to Pull. We will also consider the impact of communications, technology and globalization on how work continues to evolve…especially the changes in the immediacy ratio of work: rewards. Even the realities surrounding labour arbitrage and acceleration of technology could suggest that China and India may be nearing a peak. Now what?
We know where we’ve been, but do we understand where we are going? If you employ or lead people, this has an enormous impact on you and your company. Well grounded in statistics, and leveraging a number of specific research sources, this talk is a curated blend of what we know, and where it’s all pointing.Regardless of industry or size, more and more customers are running enterprise storage workloads—unified communications and collaboration, online transactions, database, enterprise resource planning—in both remote office and data center locations. To stay competitive, businesses need their critical applications to be able to access data quickly and efficiently to convert customer interactions into transactions and turn information into insights. The new Dell Storage portfolio delivers enterprise storage features, with the industry's most fully optimized flash performance and intelligent storage software on a platform that scales from the remote office to the data center.
The Software Defined Data Center is now a reality, and traditional tools and processes of managing this new landscape is taxing on both IT and Business Professionals alike.
VMware’s vRealize Suite offers a single-pane-of-glass view into both virtual and physical environments, and provides critical insight into the health and efficiency of your data center’s compute, storage and networking resources. This session will break down our vRealize offerings, and which licensing model addresses your management needs.
Learn about today’s threat landscape, and the tools and techniques that hackers are using to gain access to your networks and money. We will discuss a few of their methods, see a few demonstrations of how they are gaining access, then we’ll talk briefly about what Sophos is doing as a company to get ahead of these criminals.
Legacy business continuity architectures have been around for many years; however, their cost has put them out of the reach of most organizations. New cloud technologies have brought this goal within the reach of all consumers. Not only does cloud computing make BC/DR technology affordable, but also more feature rich, quicker to deploy and easier to test than traditional systems. In this executive briefing, Aaron Shaver, Solution Architect for US Signal will show how these new architectures provide a path to affordable business continuity.
For our participants in the Executive Track, our morning keynote speaker, Lance J. Richards, will bring further commentary to his earlier comments and then lead a roundtable discussion about specific applications and situations, especially drilling into the impact of these changes on the technology industry…and your people. Join us in this more intimate setting for a deeper dive into the future of work.
The benefits of the public cloud are numerous, yet one roadblock that is commonly run into is establishing connectivity to workloads once they’ve been migrated to the public cloud.
It’s one thing to connect to a web app across the public internet, but some applications either don’t play nicely that way, or you don’t want them to send traffic across the public internet. One economical way around this issue is with the Site to Site VPN capabilities that are baked into Microsoft Azure.
This demo-heavy session will cover the use cases, architecture, and configuration of a site to site VPN from your on-premise network, to workloads hosted in Azure.
Cyber-attacks once were mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.
Most of today's malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network's defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities - flaws for which no patch is available and no signature has been written. Any organization can become a victim.
In a disaster, you need tools to survive. Our BIASurvivor workshops teach you how to determine the need for a Business Continuity/Disaster Recovery Plan and the steps to help you get started.
As businesses rely more and more on technology to support their operations, they must consider the effects of technology outages and downtime on the productivity of their end users. Interruptions in daily productivity represent significant costs to businesses. The goal of any good Business Continuity strategy is continuity of business operations with minimal interruptions. Trivalent Group provides several solutions centered around solid strategies for business continuity that are based on their operational value.
In this session, Veeam will discuss their new Cloud Connect technology and how this is changing the game for doing cloud backups for an off-site data protection strategy. Cloud is typically considered backing up data to one of the many public cloud providers but Veeam has created technology that will modify how you consider doing cloud backups. This approach to cloud backups has enhanced the integration between both Veeam customers and Veeam Cloud Providers to give customers a great level of data protection.
Join US Signal as we talk about compliance. During this presentation we will explore what HIPAA and PCI compliance are, who has to be compliant, and how compliance impacts business operations. We will explore the requirements, risks, and opportunities associated with HIPAA and PCI compliance for the customer, managed service provider, and the cloud service provider. We will then build on this by discussing solutions that Managed Service Providers and Cloud Providers can offer to help business and IT teams address their compliance obligations while achieving their business objectives.
Learn about the cutting edge Next Generation Storage. We are the leading provider of Intelligent Flash Arrays! Our mission is to accelerate, redefine, and transform enterprise IT by changing the performance and economics of enterprise storage. Our flash storage arrays, with patented IntelliFlash Architecture, deliver high I/O and low latency for business applications such as databases, server virtualization and virtual desktops. Our customers achieve business acceleration and unmatched storage capacity reduction.
This session will help you understand the most common insider threats and provide tips to help protect against them. We will take a look at the actors involved in insider breaches and dissect the anatomy of a typical breach. Then review some of the stats from Verizon's DBIR and look at a few real world breaches. We will also discuss irrational biases we have has humans and how they impact our ability to accurately quantify risk and 6 actionable tips for mitigating various types of insider threats.
– Expanding or upgrading on-premise compute and storage resources can be an expensive endeavor and many organizations are putting off such upgrades and replacements due to capital expenditure concerns.
As more organizations are finding themselves in this situation, many are turning to the operational expenditure route that the public cloud offers in addition to numerous other advantages.
This session will serve as an introduction to Azure IAAS, with a heavy focus on Virtual Machines hosted inside of Azure. Azure will be introduced and discussed and the session will wrap up with demos of the Azure pricing calculator and the Azure Management Portal.
Brian “Skip” Schipper will host an informal Q&A before his keynote discussion, sharing insights about what makes a company great to work for in the eyes of its employees. In March 2015, Twitter placed in the 25 best companies in Fortune magazine’s annual survey. During his tenure as head of HR at Cisco, the company moved from the mid-40s to number 6 on the Fortune survey. After thirty years in HR positions in companies like Compaq, Microsoft, Cisco, Groupon and Twitter, Skip will answer your questions about how these technology companies strive to create distinct workplaces to attract top talent.
This presentation will cover blending multiple service types into a seamless network, strategies for implementing MPLS and Quality of service, tips for traffic analysis and managing network utilization, options for a cloud overlay, and creating a network location failover plan.
Businesses today are tasked to improve their Cybersecurity posture. For the past few years headlines are highlighting those that fall short. Whether you’re just getting started, or have a repeatable process; this 30 minute presentation can help. It includes the National Cyber Hygiene Campaign, which is designed to assist small to medium businesses with guidelines to improve your Cyber profile. WMCSC security professionals will review the campaign and share tips for reducing risk to your business.
With the amount of data that business is generating exponentially increasing, so goes the need to protect that data. Critical data, such as employee information, financial records, and health records cannot afford to be left in jeopardy.
However, Backup is not your destination. Backup is merely one of many roads on the journey to providing Recovery. This Recovery starts with the Backup and extends to automated Disaster Recovery (DR) & Service Level Agreement (SLA) testing with DR orchestration and SLA compliance reporting.
You will learn:
Twitter was recently named one of the best twenty-five companies to work for by Fortune magazine. Brian “Skip” Schipper, Twitter’s global head of Human Resources will share insights that you can apply to make your workplace great for your employees. These practices are central to attracting, developing and retaining top tech talent.
Cloud computing discussions may have gone stale in many organizations. However, why aren’t more companies embracing it? Perhaps it has to do with not understanding the different solutions available or how it can be used in new and creative ways. We’ll help you better understand what Cloud Computing means today and your opportunities with it.
Businesses in some industries are required to implement specific policies and procedures relating to the use of information technology. Even if your business isn’t required to implement a specific policy, policies and related procedures are often a legal and practical necessity. During this breakout session, we will discuss the IT policies that every business should consider implementing, and tips for constructing a good policy for your business.
In this session, Veeam will discuss how Veeam Partners can help customers get out of the backup game and offload backup services to a trusted advisor. Data protection is not always a topic that many customers enjoy but it is all a necessity when it comes to the integrity of the customers’ business information. Data needs to be protected and having the proper tools for the job can help enable businesses to perform optimally with reduced setbacks.
In this session we will discuss NETGEAR's key benefits and portfolio overview .In business, confidence is everything. When it comes to your network, it’s even more important. Whether you’re a small business with big dreams or a mid-size business ready to take the next step, you need to share access and ideas safely, connect remote locations securely and give your people the tools to perform. At NETGEAR, we provide networking, storage and security solutions without the cost and complexity of big IT. Our advanced range of reliable, affordable networking products are easy to install and maintain. We deliver solutions you can count on, so you can spend more time on what matters most – growing your business.