Events

El Paso November 14

Register: CLICK HERE TO REGISTER or call our offices at 516-277-2057.
FREE to IT professionals in networking, security, storage, architecture, telecommunications, etc.
Date: 11/14/2012 from 7:30 AM to 12:15 PM
Add this to my Outlook Calendar
Location:
Marriott, Free Parking & WiFi, 915-779-3300
Program Description:
This tightly-focused 1/2 day seminar ending with an iPad raffle focuses on cloud/virtualization/infrastructure and security/network/BYOD issues. Angelbeat coordinates expert speakers (from organizations on the right) who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." Listen to Angelbeat CEO's Ron Gerber podcast to hear why you should attend. Watch Angelbeat on Youtube to see clips from past events and hear other attendee testimonials. There is new content on managing consumer smartphones & tablets on your corporate network, driven by bring-your-own-device (byod) to work initiatives. Raffle drawings at the end for an iPad and other great prizes. Join your peers from Helen of Troy, Western Refining, General Genetics, ScottHulse, El Paso Schools, Canutillo Schools, Deming Schools, UTEP, New Mexico State University, El Paso Central Appraisal, Texas Tech Health Sciences Center, University Medical Center and many top employers who are confirmed attendees.

7:30 - 8:30: Full Hot Breakfast, Registration, Product Demonstration

8:30 - 8:50: WAN Optimization/Load Balancing for Cloud/SaaS Application Performance/Network Analysis
Many popular IT solutions, like Web-based apps, SaaS, and cloud initiatives, increase distance between workers and storage and servers, resulting in poor application performance across the enterprise WAN. Learn how WAN optimization, load balancing and acceleration of cloud-based applications can transform your network from barrier to enabler, while reducing bandwidth requirements and telecom spending. See how purpose-built appliances enable visibility and deliver critical packet-flow information across data networking infrastructures. Gain valuable insights on maintaining/enhancing end user performance requirements/QoS while supporting the inevitable transition from wired client-server to wireless cloud/virtualized networks. Determine if accelerating all applications at one layer - versus accelerating specific applications at another layer - is the best strategy for your organizations.

8:50 - 9:10: IPv6 Migration
Adopting IPv6 is an inevitability for all large enterprises and service providers. As the global supply of IPv4 addresses continues to dwindle, support for the exploding number of IPv6-enabled devices – new laptops, smart phones, tablets and more – that will connect to the Internet and computer networks will be a requirement. Every day of IPv6 adoption delay compromises a business's ability to fully participate in the Internet ecosystem and reach the growing number of end users, customers, partners and suppliers who are online with IPv6-enabled devices.

Despite this detrimental consequence, recent surveys reveal that 60% of enterprise IT teams do not have an IPv6 adoption plan and 80% feel that they are not well educated on IPv6. Among those that do have a plan, 64% fear they will not successfully implement support for IPv6. To aid enterprises and service providers in the IPv6 adoption process, Angelbeat has arranged for Infoblox to discuss its IPv6 service offerings, including IP address management capabilities that are necessary to successfully adopt and manage the new IPv6 addressing schema.

9:10 - 10:00: Security/Compliance
Security and compliance vulnerabilities will only grow in 2012, driven by these trends:
- Virtualization and cloud computing, with sensitive/confidential information and programs stored in multiple and possibly unsecured third-party locations
- Secure remote access requirements from an ever growing list of devices - laptop, netbook, home PC, MAC, smartphone and tablet - accessing behind-the-firewall data via multiple networks including corporate LAN, home wifi, public wifi and 3G/4G cellular.
- Social networks in the workplace, with hackers targeting facebook, linkedin and twitter web 2.0 applications which are now required business applications and cannot be blocked.
- Web-based or SaaS enterprise applications, with browser vulnerabilities that are often the weakest link in a defense-in-depth strategy exposing organizations to substantial risk

Experts will discuss how spam, anti-virus, web filtering, IDS/IPS, firewall, ediscovery, patching, e.g. traditional security products are responding to these trends and corresponding threats, and share recommendations and best practices on how you can stay one step ahead of hackers.

10:00 - 10:30: Virtualization, Cloud, Storage
Organizations must optimize their existing and internal server/storage/data center infrastructure for maximum efficiency - combining the best of virtual and private cloud functionality - before considering external/outsourced public cloud services.
- Virtualization recommendations for and across servers, storage and data centers to increase utilization, create R&D testing sites without impacting live production, support disaster recovery/business continuity requirements, etc.
- Integration of networking, server and storage protocols/equipment under a common virtualization platform and data center/network "fabric"
- Server/Storage Reliability/Uptime, critically important with significantly fewer hardware platforms with virtualization, all running at much higher utilization levels
- Growth trends for iSCSI, Fibre Channel, NSA and SAN storage deployments, and how this affects your virtualization strategies
- Scale-up vs Scale-out storage strategies
- Tiered storage strategies to match data access requirements and update frequency with hardware costs
- Disaster Recovery and Business Continuity Best Practices; the importance of cost-effective and efficient recovery systems.
- Data Deduplication on primary and backup hardware, to eliminate unnecessary storage of redundant information.
- Backup/archiving best practices in virtualized/cloud architectures, where data is not locked to a specific location or hardware platform.
- Green IT, energy cost savings and using Power Usage Efficiency (PUE) calculations to financially justify infrastructure IT projects
- Thin client architecture, benefits of centrally hosting applications, and matching internal infrastructure/storage hardware/software with end user client computing platforms.

Cloud computing in its broadest sense is the usage of external IT resources. Attendees will be educated on various cloud computing options, to help them determine the most appropriate solution for their organization.
- Distinction between private cloud and virtualized/in-house data center
- Benefits of moving some, most, if not all storage & server hardware to a co-location/hosting facility, e.g. perhaps only backup files and tapes are stored/located offsite?
- Benefits of transferring some, most, if not all software applications to a cloud service provider, e.g. using a cloud provider to handle peak/high-volume customer web demand only?
- Recommendations for an integrated public cloud/private cloud/virtualized data center infrastructure, covering both internal/employee & external/customer-facing applications
- Strategies for securing, patching and updating virtual and cloud environments, while ensuring compliance with corporate standards
- Cloud computing definitions and framework: IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), SaaS (Software-as-a-Service), to name a few acronyms/options that will be discussed at the seminar

10:30: Break, Product Demonstrations, Comparison of Apple vs Microsoft vs Google Devices, Peer Networking

11:00 - 12:00: BYOD Bring Your Own Device, Consumerization of IT, MDM Mobile Device Management, High-Speed Wireless, Cloud-based VoIP/Unified Communications, SIP Trunking
Apple is projected to sell over 250 million iPhones and iPads in 2012. These employee-owned consumer devices, along with Google Android-powered clients and upcoming Windows 8 Tablets/Windows Phone offerings, are making their way to the workplace - the Bring-your-own-Device (BYOD) revolution - creating a new set of security and management challenges for IT departments. Experts will share best practices on supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated from personal information when using the same hardware platform? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products?

Every tablet and smartphone shares a common feature - they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the Billions of units, plus more mission-critical applications are being deployed wirelessly, it is essential that rf Interference be understood, measured and eliminated. Learn why 802.11n and spectrum intelligence technologies should be deployed in your ever changing work environment, to ensure mobile user performance and satisfy QoS standards.

The growing importance of unified communications in today's always-on, always-connected world, is widely accepted by all IT professionals. Learn how to combine Twitter, Facebook, YouTube and other social networking applications with email, instant messaging, voice mail and traditional telephone communications, thereby increasing the productivity of your workforce. Understand the evolution of telephone systems - from premise-based PBX or VoIP installations to hosted or cloud-based delivery platforms - and see what changes are recommended within your own organization, based on workforce demographics. See how you can provide your employees with a common unified communications platform supporting desktop, smartphone, laptop and tablet devices.

End of Event, Raffle Drawings for an iPad and other great prizesCLICK HERE TO ATTEND THE EVENT
http://penclub.fr/?hah=552961 information imatinib mesylate 400mg discount amlodipine in mayami purchase accutane about buy baclof usa lipitor discount lipitor prices 150mg bupropion tablets http://penclub.fr/?hah=782506 bupropion hcl xl 300 mg http://sisyphe.info/?hat=225547 amisulpride online information geftinat 250mg natco enalapril 2.5 mg best price in france geftinat 250mg natco ciprofloxacin hcl 500 mg taran norvasc 50 mg in mexico buy generic a-ret information about mexico norvasc information about prilosec 20 mg capsule waklert norvasc cheap online http://offres.ro/?xxv=924555 active site of gefitinib norvasc 500 mg 600 pills omeprazole 20mg super kamagra uk in united states about gefitinib tabs enalapril malaete in new york buy tadacip canadian in usa http://mjz-57.fr/?her=704078 buy diflucan on line in california ciprofloxacin 500 mg http://reseau-terra.eu/?gag=342540 doxycycline 100 mg capsules dilantin 100mg more info azithromycin without prescription rogaine shampoo uk in uk http://www.stop-it.it/spip.php?asr=98869 bupropion sr 100mg best price simvastatin more info about tadalafil super active 20mg purchase sulpitac online in united states 600 pills omeprazole 20mg ing accutane naltrexone more info about buy malegra 100 http://netia59.ac-lille.fr/rxs/?gha=372520 cheap bupropion from united states discount lipitor buy lovegra online uk about buy tadalafil from mexico online info about order clomiphene citrate