This session will allow participants to ask questions and to share experiences and success stories they have encountered as they advance along the path toward cloud and/or edge computing and IT.
As communication technologies change the needs of IoT solutions continue to evolve. Organizations must recognize the differing networking requirements for differing IoT devices deployed in numerous vertical markets. The right technology must be connected to the appropriate use cases in order to successfully deploy the entire IoT solution, otherwise it will fail. This presentation segments the market by analyzing different usage scenarios and identifying the key issues, questions and technology needed to properly implement IoT solutions.
This session will explore the rise of Internet of Things (IoT) and the disruption it will cause for infrastructure and operations teams, as they must adapt their infrastructure, processes, skills and tooling.
High-performing teams standout because they do and behave differently. Although building this kind of teams can often feel more like art than science, there are a set of practical steps that CIOs can use — how can I identify whether am I doing it right or not? Does pulling the best performers together guarantee a high-performing team? Is it necessarily a long and winding road, or are there catalysts to accelerate it?
While most enterprises are actively engaged with using cloud-based resources in 2018, connecting the enterprise to the cloud often lags behind in terms of sophistication, security, and architecture. There are several approaches far superior than simple internet or VPN private internet access. This session will provide an overall framework in which to place cloud conductivity options, highlight the strengths and weaknesses of each option, and recommends best use case decisions.
When engaging IaaS providers, contract structures, schedules and negotiation best practices are quite different, compared to traditional service deals. Use this interactive session to improve your IaaS deals by optimizing key contract clauses in simpler agreements, building key best practice SOW, SLA and pricing schedules, and optimizing negotiation strategies to avoid standard IaaS contractual constraints.
I&O leaders must evolve strategies to provide an agile infrastructure for the business to enable global reach, solve business issues like latency, customer experience and compliance, while providing the flexibility to enter new markets quickly, anywhere, anytime. This must embrace traditional compute, emerging trends in edge computing, IoT, AI/ML and the ever-changing cloud marketplace. I&O leaders themselves must also evolve the skills, processes and roles to support this brave new world.
Organizations using public cloud services often wonder if public cloud services will be less expensive than hosting applications in their data center. Many exceed cloud budget expectations and struggle to establish financial management procedures to continuously monitor cloud spending. Join this session to learn how to evaluate public cloud costs and implement best practices to avoid overspending.
Nina Schick will discuss how Western liberal democracies will be surpassed by Chinese techno-authoritarianism in the coming age of AI superpowers.
Liberal democracies as a the leading global system of governance will diminish in the next two decades. Technological advances are eroding the foundations on which liberal democracies rely to survive and thrive.
These developments herald the end of the US-led liberal international order, which emerged victorious at the end of the Cold War.
In its place a new unipolar geopolitical order led by China will emerge in a system of techno-authoritarian AI superpower.
China will not just be another player - but the biggest player the world has ever seen - fuelled by an artificial intelligence revolution powered by data.
This new phase of geopolitics will lead us to an hitherto unimagined future. Although dystopian from a Western perspective, it may be the only way that the planet is able to fend off existential technological and environmental threats.
This talks will primarily be aimed at helping audiences to understanding the coming geopolitical revolution in the age of AI.
This roundtable will allow attendees to share experiences and strategies for security cloud-based services including SaaS, PaaS and IaaS services.
In addition to vulnerabilities in the application, containers face security threats though code dependencies, container host platforms, orchestrators, network interfaces, and other vectors. In this Roundtable discussion for end-users, we'll discuss experiences and security best practices when deploying containers into production.
Hype about AI continues to grow as consumers become familiar with virtual assistants outside the office. I&O leaders are keen to exploit this to optimize the IT service desk, but neither the technology nor the workplace culture is ready to depend on virtual agents in 2018. When will this happen, and how should I&O leaders prepare now?
This roundtable discussion explores best practices and lessons learned from enterprise (not vendor) attendees on how to successfully build a DevOps culture and navigate the inevitable hurdles that arise.
Gartner surveys show formulating cloud strategy is one of the biggest challenges IT infrastructure management faces. Join this Roundtable to discuss how to author an impactful cloud strategy. Tackle the big challenges, make your strategy resonate with stakeholders, share your concerns and successes. Gain insight from your peers and your moderator, a Gartner analyst.
As DevOps and Mode 2 practices expand in an organization, how must other departments, outside development and operations, also change their practices?
In this workshop, learn how to approach DevOps! We will explore seven steps to get started, critical success factors, pitfalls — but most importantly what your next action items are to move forward with a DevOps vision.
This workshop is a practical session on how to start or assess an existing continuous improvement program (CIP) to ensure production of consistent results and achieving a sufficient return on investment. Participants will leave with a better understanding and reliable methods for ensuring their CIP is scalable, repeatable and customizable, meeting the needs of your organization.
The topic of containers and container management has witnessed immense interest in enterprise IT over the past 12 months. In this session, I&O leaders will learn about the potential impact containers will have on their IT environment, the evolving vendor ecosystem and how they need to rethink current infrastructure and operations approaches to be successful.
This session provides eight steps to use for planning negotiations with major vendors — megavendors, and new and emerging vendors. These steps can and should be used for any major negotiation to ensure the right questions are asked and the right detail is revealed to analyze proposals from a cost-optimization and risk-mitigation standpoint. They focus on engaging the right IT and business stakeholders to identify requirements and then using stakeholders as part of the negotiation plan and strategy to optimize these deals to optimize and balance cost, value and risk. Attendees from this session will receive ready-to-use checklists, templates, and matrices to execute these eight steps effectively in their organizations.
Enterprises are on a journey to digital business, and an expansion of their application portfolios. I&O leaders need to modernize for existing applications while adding support for agile development, rapid and real-time scaling, and low-latency analytics. Infrastructures of the future will span enterprise data centers, cloud and the edge — enabled and managed by I&O.
Artificial intelligence (AI), is a wide ranging term and recent developments have moved it into the mainstream and security software. However, without a background it’s difficult for customers to evaluate its use in products and what benefits it provides over more conventional technologies. This session shows security leaders how to evaluate claims and determine the concrete benefits of using applications of artificial intelligence.
As organizations move toward a digital business model, CIOs and IT leaders must be equipped to adopt cloud-based services, replacing traditional on-premises infrastructure. They need to understand and communicate both the risks and rewards of a hybrid infrastructure as well as optimize costs as they adopt these services that are needed to achieve hybrid cloud benefits including agility, innovation, speed and savings. This presentation will discuss:
● What are the benefits derived from hybrid infrastructure and services?
● What are the risks to be managed?
● What processes should you adopt to support the desired benefits? How do you optimize costs?
As IT infrastructure and application increases in complexity due to cloud, mobile and new architectures, incumbent ITOM provider offerings are being rendered ineffective. Even new and emerging providers, with their narrow focus, often find themselves at a disadvantage as they are not able to cover a broad and ever-changing IT environment. Understand what are the key trends in the vendor landscape, their capabilities and how you can optimize your IT monitoring strategy.
Hyperscale cloud providers' have extended their runtime environments for development and use on edge devices, such as IoT "things". Signs point to public cloud technology on-premises! This session will detail the distinctions between cloud, core and edge, and the different approaches of Amazon Web Services (AWS), Microsoft Azure and Google will be addressed in detail.
Knowing that development teams are turning to agile methodology is a key signal for automation adoption and process change in operations. This session will review the top three areas for consideration by I&O leaders.
Workload placement will become the key driver of digital infrastructure delivery. Nevertheless, I&O leaders often struggle to find which workloads are best suited for which location — be it public cloud, hosting, colocation, edge or on-premises. This session reviews the main strategies of successful I&O leaders that are focused on business value, rather than cloud adoption only, as a goal.
Multifactor authentication (MFA) is now mainstream, and many organizations are looking for secure, user-friendly and easy-to-integrate implementation options. A new crop of cloud-based MFA services provides support for common authentication uses cases, both within the enterprise and in hybrid access scenarios. In this session we will discuss cloud-based MFA that can balance trust, user experience and cost.