Search by track

Search by tag

Jul 30 2015

Will Your Cloud Strategy Deliver the Business Value You Want?

Sherrie Brown Littlejohn, EVP & Head of Technology Strategy, Architecture & Innovation, Wells Fargo

Moving to the Cloud is a technology business management decision that demands careful planning. Both clear articulation of the business benefits and an equally clear-eyed understanding of the risks and challenges are management requirements. In the time of DevOps and cloud architects and engineers, how can you ensure efficient, effective  resource allocation to ensure a successful implementation?

App > Cloud

On The Edge: Deploying and Managing Remote Network Edge IT

Henrique Oliveira, Director of Business Development, Data Center Solution, Emerson

Reliance on connectivity and technology close to the user, at distributed locations with no on-site IT expertise and limited physical security, is pressuring budgets and SLAs while increasing risk of a security breach.  Discuss how to better manage cost and risk at the edge of the network.  Learn how to improve speed of IT deployment, increase application availability, lower service costs and harden security in remote compute locations.

IT + Networks

Brought to you by

Emerson Network Power


Why Data Center Design Strategies Fail?

David Winn, AMS Service Line Leader, HP

What do current technology roadmaps and trends tell us about what your IT and data center infrastructure should be in the future? Anything? What would be on your wish list? Each major interdependent infrastructure layer needs to be addressed: network, server, storage, power, cooling. Here’s a chance to give your best guesses as to what would be winning designs and strategies in the future. Where will you put your money?

Design + Strategy

Brought to you by



Physical Facilities Security Matters: A Practitioner’s Guide

Matt Powers, VP, Global Technology Marketing, Anixter

A “macro-segmentation” approach to risk security management is required within the layers of physical security to support a risk management strategy.  What are best practices for adopting a deter, detect, delay and defend strategy designed specifically for the data center environment? Here’s a six-layered approach with policy and practice guidelines for perimeter, clear zone, reception, service corridor, data hall and equipment cabinet areas.

Security + Risk

Brought to you by



Back to main programme