Search by track

Search by tag

Nov 10 2015

Enterprise Cloud Design Strategy

Joe Belinsky, VP, Technology Infrastructure Services, Moneris Solutions Roy Hart, CIO, Seneca College Shawn Rosemarin, Chief-of-Staff, VMWare

Adoption and expansion of cloud within the enterprise requires effective planning to ensure that cloud capabilities are integrated within the overall IT delivery fabric and business processes of the organization, and that this is accomplished without increasing security/regulatory exposure. This session identifies key issues that need to be considered in the adoption and expansion of cloud within IT and business contexts.

App > Cloud

Spotlight on Analytics

Dean McKeown, Associate Director, Masters Programs, Queen's School of Business Jerrard Gaertner, President, CIPS, Course Advisor, Developer, Instructor , University of Toronto Paul Lewis, CTO, Hitachi Data Systems, Canada

Cloud has redrawn the lines around traditional data and application constraints, and nowhere is the benefit of the expanded perimeter clearer than in analytics. This session examines how ubiquitous access and effectively-unlimited IT infrastructure facilitates new uses of technology. Receive exposure to new, never-before-public data from a survey of Canadian businesses.

App > Cloud

Delivering Cloud via Public, Private & Hybrid Environments

Craig McLellan, Founder, ThinkOn Marcus Cziesla, Director, Cloud Solutions, Red Hat

In a world that is transitioning from traditional on-premise infrastructure to corporate IT fabrics that incorporate multiple cloud platforms, defining and delivering cloud infrastructure is more a journey than a destination. This session provides a framework for identifying key issues in establishing public, private and hybrid clouds and decision-making tools that allow businesses to align cloud options with new business enablement.

App > Cloud

Designing the Whole Eco-System, Open-Source SDDC

Speaker Details Coming Soon

In order to build truly data-driven data centers the whole stack must be connected.  To orchestrate your workload in real-time, the “North-bound” IT stack and “South-bound” facilities stack, traffic must be able to integrate, communicate and automate. Getting there, however, is a journey. This session allows those to share their own “open” journey of discovery and opines on where they think the industry is headed.

IT + Networks

Cloud Business Models, Metrics & Imperatives

AJ Byers, President, JEDTech Group Sylvia Bauer, Canadian Program Director, CenturyLink Tracey Hutchison, Channel Director, Cisco Systems Canada

Cloud offers tremendous opportunities for scale, but successful adoption of an enterprise cloud strategy requires the active participation and support of senior management. What do business executives focus on, as they understand the potential for cloud to enhance business outcomes?  What do these executives focus on when they deliver benefits to stakeholders ranging from shareholders to employees to customers?

App > Cloud

Will 380 VDC Power in the Data Center Gain Traction?

Speaker Details Coming Soon

Discuss the pros and cons of 380 VDC in the data center. Is DC power an upcoming trend or just a fad? Where are the 380 VDC data center facilities located today? What are the operating costs of DC compared to AC and what’s more efficient? Will services and maintenance be easier with 380 VDC or not? What are the safety factors you need to work with in a “live DC environment? What are the challenges for 380VDC implementation in either a new data center or existing one? What about integration with alternative energy sources?

Critical Environment

Governance, Risk and Compliance

Andrew Nunes, Partner, Fasken Martineau DuMoulin Barney Baldwin, Global Head, Risk Technology, RBC Capital Markets Dave Collings, IT Manager, SMB

In many cases, the key cloud management issue for businesses is governance: how is cloud incorporated within existing governance, risk and compliance structures? This session explores what needs to be done to ensure cloud is a positive contributor to GRC, and not a point of exposure.

Security + Risk

Back to main programme