More operations events
Deployment of faster, better, more engaging technology in your contact center can result in more satisfied customers who spend more with your enterprise. Join us for Enterprise Connect in Orlando this spring, and dive in to a comprehensive Contact Center track focused on leveraging Mobile, Video, and Proactive Engagement technologies for the Contact Center.
Unified Communications has become the default term for next-generation, IP-enabled enterprise communications, and at Enterprise Connect, the UC track embraces everything from interoperability to choices and strategies when it comes to strategic vendors. Save $200 off conference passes with code MPIWK.
Learn strategies for managing your video systems ? and their underlying networks ? so as to provide the best video experience at the most reasonable cost to your enterprise?while also making sure video doesn't compromise the performance of other business critical applications on your network.
Hear industry experts explore WebRTC's myths, realities, promise and pitfalls. Join us on March 17th at Enterprise Connect in Orlando for a full day of programming focused on WebRTC and learn how it can help you achieve your organizational goals.
Learn how to leverage the Cloud for maximum benefit in your Communications & Collaboration future. Join Enterprise Connect in Orlando from March 17-20, with a track fully dedicated to exploring the full range of Cloud Communications options, from range of options ? from virtualization in on-prem datacenters, to Hosted PBX services, to more complex hybrid public-private cloud models for service delivery to your end users
IT leaders are expected to break down silos between different technology teams, get end users to understand and embrace policies, and forge productive relationships with their counterparts on the business side of the organization. This is harder than it sounds, because while people can behave rationally, they can also be governed by emotions such as frustration and fear of change. They can be driven by ego, a bad attitude, or simple ignorance. They can cause conflict that can disrupt professional relationships, drag down a team or even poison an entire department. Unfortunately for technical-minded leaders, there’s no Python script to program company-wide collaboration and harmony and get everyone to sing Kumbaya. We have to learn how to build healthy relationships with employees, drive engagement, and understand how to resolve conflicts using practical, effective strategies. In this workshop, participants will get a deep-dive on what motivates us as human beings and how our emotional wiring can quickly override our best intentions. You’ll learn assertive communication and conflict resolution strategies that will help re-engage the staff and encourage organizational change. You’ll see that peaceful doesn’t have to mean passive and that conflict isn’t always a negative for an organization. This is a participatory workshop utilizing collaboration techniques from Joe Weston’s Respectful Confrontation method. “We have to face the fact that either all of us are going to die together or we are going to learn to live together, and if we are to live together we have to talk.” Eleanor Roosevelt Who Should Attend: IT managers who need to motivate technical staff and create an engaging, productive work environment; engineers and administrators that need to work across IT silos; IT professionals that interact with internal business units and end users. Key Takeaways: Attendees will Understand our emotional wiring and how it can trigger both positive and negative responses Learn real-world strategies to resolve conflicts Discover how to motivate and engage co-workers Recogize that “peaceful” and “respectful” conflict resolution doesn’t equate to passivity Find positive outcomes in conflicts
One of the great advantages of being at Interop is the InteropNet. Having direct access to one of the world’s largest traveling networks offers us the opportunity to explore a number of network troubleshooting techniques on a live production network. In this class, we will explore the following topics: 1. Network instrumentation. One of the first steps in troubleshooting is having the right equipment in the right place. 2. Problem Isolation. It is a big network and there is not time to look at everything. The key to getting the root of the problem is to quickly isolate the fault domain and begin troubleshooting there. 3. Applying a systematic approach to troubleshooting problems. To resolve problems quickly, we must take a structured approach. After resolving the problem, it is critical that we look at what worked and what didn’t work and modify the approach for future problems. 4. Applying and validating the fix. Once the problem has been identified and a fix formulated, it is important to validate thatthe fix that was applied really fixed the problem. Who should attend: Network Analysts Network Engineers Desktop Support Wireless Engineers
Over the last two years, the hottest topics in networking have been Software-Defined Networking (SDN) and Network Virtualization (NV). There is, however, considerable confusion amongst enterprise IT organizations relative to these topics. There are many sources of that confusion, including the sheer number of vendors who have solutions that solve different problems using different solution architectures and technologies, all of whom claim to be offering SDN and/or NV solutions. This beginner to intermediate level, enterprise-focused workshop will cut through that confusion by presenting a top down approach to SDN and NV that starts by identifying the problems and opportunities that SDN and NV may be able to address. The workshop will also describe the primary characteristics of SDN and NV solutions and will identify a set of questions that IT organizations should use when interacting with providers of NV and SDN solutions. The relationship between SDN and network function virtualization (NFV) will be analyzed as will how all of these approaches do or do not help IT organizations respond to the key problems and opportunities facing enterprise IT organizations. Included in the workshop will be a moderated debate amongst some leading-edge vendors as well as an analysis of the approach to SDN and NV that is being taken by a dozen key vendors. The workshop will conclude with a session in which the audience gets to ask questions of organization that have already begun to adopt SDN and/or NV.
The concept of “if” has been replaced with “when and how bad” when it comes to the reality of cyber attacks and business disruptions for many organizations. Defending the business while ensuring it continues to thrive is a delicate balance that risk and security professionals must embrace, while at the same time is often their greatest challenge. Successful organizations and business leaders identify, assess, embrace, and manage risks to ensure they are prepared to minimize their impacts if they are realized. This same philosophy and approach should be true for risk and security activities and the professionals who enable them as well. This workshop will explore a risk based and pragmatic approach to defending information infrastructure and data assets. Both proactive capabilities to manage risk and reactive capabilities to minimize realized risks will be explored. Topics will include information risk profiles, threat and vulnerability analysis, vulnerability management, and business resiliency capabilities (Command and Control, Incident Response, Business Continuity and Disaster Recovery). Interactive discussions, examples, and cross industry case studies will be presented throughout the workshop to provide examples of discussion points as well as identify and explore current and evolving industry-leading practices.
The mobile development landscape is littered with solutions that allow organizations to create cross-platform mobile experiences. However, how do you ensure that the approach you choose is consistent with your overall digital strategy and keeps you from having to reinvent the wheel for each new experience? In addition, how do you ensure that the applications that you create will meet the needs of the users you are creating it for? These are the challenges that most all organizations are facing today. In this workshop, we will walk through the litany of options that are available, see examples of these technologies in action, and examine case studies for application strategies that have been successful. This will include a review of native, hybrid, and other cross-platform application technical solutions. In addition, you will be able to see working versions of each of these application strategies to determine which one meets your overall business goals. We also will walk through the development process to try and determine how to successfully deliver an application using these strategies that your users will find intuitive. We will examine solutions that allow you to closely monitor the development process as well as integrate user feedback into the development process.
Can you afford to deploy new applications in days or weeks when your competitors can do it in minutes? Are your developers satisfied with the time it takes to move a new application from development through QA and CA to production? Are you able to deploy new releases daily? Are you happy that your development teams prefer public cloud services over internal IT? If you've answered NO to at least one of these questions, it's high time to put the Software-Defined Data Center (SDDC) near the top of your priority list. Not surprisingly, vendors know all your pain points and bombard you with buzzwords. They are also quick to tell you how their shiny new gadgets solve all your woes. We all know that marketing hype is more often about buying a road map than a deployable solution, but you can protect your enterprise from vaporware by understanding the technologies available on the SDDC/SDN landscape. This workshop will unravel the mysteries of software-defined storage, software defined networking (SDN), overlay virtual networks, and network function virtualization (NFV) and help you select the optimal design and product mix for your new data center.
Jumpstart Your Cloud Computing Knowledge Base Amazon Web Services (AWS) is by far the pacesetter in the cloud computing industry. Every IT organization and practitioner will need to understand the power and potential of this platform as it transforms the operations of IT around the world. If you want – or are under pressure -- to begin using AWS, this workshop is for you. Both fundamental and advanced AWS services are discussed during the workshop, ensuring that you gain a complete overview of AWS. The workshop is presented in a highly interactive fashion to allow for questions and discussion.
Federated cloud infrastructures are the future of application deployments. This is good news for IT because hybrid systems provide high availability, promote mobility, and can simplify disaster recovery and continuity of operations. However, federated architectures also create thorny orchestration and management challenges, as data and applications are dispersed across private and (eventually several) public clouds. For many, this is already a reality. For everyone else, getting there is a three-step process. The first step is to get your applications running in a federated environment. Next, you need to understand the tools and techniques that are available for monitoring and managing a hybrid architecture. Finally, drill into performance management, including synthetic transaction monitoring, to ensure that your federated architecture can meet user demands. If you thought finger pointing among internal teams was bad, just wait until diagnosing a slow-down requires wrangling with cloud service providers.
The widespread deployment of flash memory-based solid state disks (SSDs) over the past few years has revolutionized the storage industry. Flash promises levels of performance unthinkable just a few years ago, but the cost can be as extreme as the performance. Vendors have tried to address this disparity by using SSDs in many ways, from PCIe flash cards in servers and all-solid-state arrays to hybrid storage systems that try to take advantage of the best attributes of flash and disk. In this session we’ll look at how flash-based SSDs work and the various ways they can be deployed. We’ll pay close attention to the workloads and use cases each deployment model is best suited to.
After a decade of relative technology stagnation, data center networking has seen dozens of new technologies emerge to offer new business services. This means more networking, more technology and more things to do. This vendor-agnostic, technology-focused session will outline how you can build the physical network that will serve as the foundation for the Software-Defined Data Center (SDDC). You will be introducted to essential technologies, designs, protocols and processes so you can plan for the next-generation network.
Big data projects are moving from lab experiments to key corporate initiatives. Studies show that 70% of enterprise organizations will have deployed or plan to deploy big data projects in 2014, with average spend per company estimated at $8 million. The focus of big data going forward will be better decision making and a move toward real-time interaction with customers and partners. In a series of workshop sessions, we’ll bring out leaders of big data projects to talk about what they’ve learned and the skills required to be successful. We’ll talk about what it takes to bring project lengths down to manageable timeframes, how to incorporate analytical models, and how to optimize big data operations.
As an increasing number of valuable corporate assets are made available over computer networks, having the ability to understand the types of threats facing your organizations as well as possessing the skills required to identify and mitigate flaws on your networks are increasingly important components of an organizations' risk posture. This full day course will enable IT professionals to better understand the methodologies, tools, and techniques used by attackers against their technical infrastructure, with the primary aim of helping them develop better defense methods and capabilities. Attendees will learn to perform basic technical security vulnerability assessment tasks and gain a strong foundation for future studies in host and network security assessment. The workshop will use Kali Linux(tm), a collection of free and open source security tools many attackers and security practitioners use. Students will have access to a network of targets that will allow them to get hands-on experience, enhancing understanding of the process and tools, and how to effectively counter them. Guidance will be provided for continued learning after the course if students wish to go on to master the tools and techniques introduced in this course.
Whether it is an existing application that is running slowly or a new application that is ready to be deployed, the analysis of applications running over the network is on the minds of many IT professionals. This day is dedicated to the area of analyzing, troubleshooting, and understanding the impact the network has on applications. All too often, applications are deployed without any analysis being performed on them. After deployment, they begin running slowly or not at all. It is at this point the blame game begins. The developers blame the network folks, the network folks blame the server administrators, and the application vendors tell you that you are the only one ever experiencing the problem. This day will consist of a series of talks, demonstrations and panels. Each of these will help build your knowledge and understanding of: 1. How the network impacts the application 2. The benefits of setting up an Application Performance Team 3. Determining application performance, before it is deployed 4. Steps to take when troubleshooting problematic applications 5. Application analysis tools, their benefits and challenges 6. Where to start when troubleshooting an application problem
In this workshop we will look at the area of protocol analysis and how it can be used to help resolve the toughest of network and application problems. The focus of this class will be Wireshark and a number of other readily available tools. In this class we will: 1. Show you how to turbocharge Wireshark into a very powerful troubleshooting tool 2. Learn how to capture the right packets in the right place 3. Eliminate that traffic that is not part of the problem and focus on the problem traffic 4. Compare applications that work with those that don’t.
Private cloud deployments are often just a glorified facade for server virtualization, missing the flexibility, elasticity and self-service aspects of cloud services. The missteps leading to this sad state usually start in the design phase, making it even more important to focus on the design of your private cloud infrastructure. This workshop will focus on the design aspects of private cloud infrastructure including: -Failure domains and availability zones; -Disaster avoidance and recovery; -Optimal compute capacity; -Storage aspects, including software-defined storage (SDS); -Flexible network infrastructure; -Virtualized network services and security. After attending this workshop you'll be able to: -Prioritize your design and decision-making process; -Evaluate how emerging technologies (SDDC, SDN, SDS, overlay networks…) fit into your next-generation data center design; -Select the optimal infrastructure for your private or public cloud deployment. Who Should Attend: This workshop targets architects and designers who are planning, designing or building next-generation data centers supporting private cloud services. It will also help server, virtualization, security and networking engineers understand the limitations of traditional data center designs and the options made available with the emerging software-defined technologies.
Wireless and mobility are the new engines that drive much of today's business. As Ethernet to the network edge becomes less of a priority, employees and customers expect robust wireless access the moment they enter your premises. Users want mobile productivity tools and an always-connected experience to help them work better. And organizations that don’t have a mobile presence risk irrelevance. The pace of wireless innovation is relentless, but rather than try to hold back the flood, IT organizations should ride the wave and find ways to leverage mobility-oriented technologies to drive business success. Of course, “mobility” and “wireless” are complex subjects with many moving parts. There is no one-size-fits-all paradigm. Shaping the best wireless story for your own business needs is just as critical as recognizing that being in the mobility game is mandatory.
Everyone is talking about cloud storage services, but are they really appropriate for ordinary business applications? The cloud can provide massive capacity on demand, providing a big win for operational efficiency, but data can be “stranded” thanks to relatively slow links. Cloud storage can serve as a file distribution engine, yet many worry about security and privacy implications. In this workshop, storage expert Stephen Foskett will discuss the realities of cloud storage. This workshop focuses on practical applications for cloud storage rather than “cloudy” future strategies. We will begin with the basics, outlining the difference between file, block, and object storage to make it clear exactly what cloud storage is. We will discuss public cloud services and options for in-house private cloud storage. We will cover both primary and archive storage, including protocol gateways, caching, and integration. We will also discuss leveraging cloud for multi-site distribution and replication for disaster recovery.
This 2 days tutorial focuses on specific steps you can take to improve the effectiveness of your IT organization and ensure alignment with the business you support. We will focus on critical policy areas and the translation of those policies into standard operating procedure through the development and implementation of core ITIL processes. In an environment of constant change, IT accountability has taken on new levels of urgency. IT departments regularly struggle with staffing levels, turnover, burnout, lack of credibility, or end-user and managerial dissatisfaction. If you're questioning how to satisfy the end user, control or cut costs, determine the best sourcing options by category of work effort, and still offer a balanced and fulfilling career progression to IT professional staff, we have answers for you. Most importantly, over the 15 years this course has been offered at Interop, we have learned how to engage you and your fellow classmates to help each other through sharing what is working and why.
Cloud computing with OpenStack is a powerful way of providing and consuming IaaS to achieve the scale and agility required by IT departments today. In the most recent release, Havana included nearly 400 application-driven enterprise features. Organizations such as Fidelity, Bloomberg, Comcast, PayPal, Cisco Webex, Best Buy, Concur and Shutterstock are now deploying OpenStack-powered IaaS in production order to increase operational efficiency and create real business value. The OpenStack Boot Camp provides an opportunity for cloud architects, IT management and business leaders to gain a working understanding of OpenStack, its core projects, the current state of the technical components, use cases ideally suited to OpenStack, and considerations for taking OpenStack from dev/test into production environments. Join us for the 1/2 day Boot Camp and gain insight into: •The State of the Stack: what works and what needs work •Which components of OpenStack are fully featured today and which are in development •OpenStack vs. other open source cloud software choices •Getting started with OpenStack •Considerations for moving OpenStack out of dev/test and into your production environment
Enterprise Connect's Mobility track offers you the chance to learn about the latest developments in wireless technology, mobile device functionality. Sessions will feature a strong emphasis on mobility management, from the device to the networks to the back-end systems.