Cloud Intelligence Conference Phoenix 2012

Home > Blogs > Developer Visual Studio / ASP.NET > Cloud Intelligence Conference Phoenix 2012

Cloud Intelligence Conference Phoenix 2012

Like This Blog 0 Interface
Added by May 9, 2011

Cloud Intelligence Conference Phoenix AZ May 8, 2012 On May 8, 2012, Interface Technical Training hosted The Cloud Intelligence Conference which included 19 sessions across 5 targeted learning tracks. Attendees gained knowledge and information to help develop their company's cloud computing strategy. Download the Agenda PDF Here are the presentation slides of the speakers at The Cloud Intelligence conference in Phoenix, AZ.(Right click the links and "Save link as" to save the PDF's to a file)

Morning Keynote:  Virtualization’s Past, Present, & Future: Ten Plannable Paths for 2012 and Beyond Speaker: Greg Shields, Concentrated Technology

Afternoon Keynote: Mobile Cloud Computing – Next Generation Services and Applications Speaker: Dr. Avril Salter, Next Direction Technologies

Session 1: Demystifying the Cloud – a company agnostic view of Cloud platforms and offerings Speaker: John Sanderson, Microsoft – Windows Azure Solution

When Worlds Collide: HTML5 Meets the Cloud Speaker: David Pallmann – Neudesic

Constructing Your Private Cloud: Strategies for IT Administrators and Decision Makers Speaker: Greg Shields – Concentrated Technology

Extend your Exchange On-Premises Organization to the Cloud Speaker: Mike Pfeiffer – Interface Technical Training

Can I Keep Secret Data in the Cloud? Speaker: Mike Danseglio – Interface Technical Training

Session 2: Get your head out of the clouds and start computing Speaker: Harold Wong – Microsoft

Seeing is Believing – Putting a Real App in the Cloud Speaker: Stephanie Lemus – Microsoft

VMware vSphere HA & DRS: Avoiding 16 Configuration Mistakes that’ll Kill your Virtual Environment Speaker: Greg Shields – Concentrated Technology

Office 365 – Value for the Enterprise Speaker: Sean McNeill – Catapult Systems How Secure are My Mobile Apps? Speaker: Mike Danseglio – Interface Technical Training

Session 3: Google / Office 365 Speaker: George Galindo, Statera

SharePoint and Azure: Digital Asset Management Solutions Speaker: Vishnu Arunachalam, Attunix

Extending Apps to Everywhere: Your Guide to Internet-enabling Remote Desktop Services Speaker: Greg Shields, Concentrated Technology

Communicating in the Cloud with Lync Online Speaker: Mike Pfeiffer, Interface Technical Training

Cloud Computing Outside the Data Center – There Is Another Solution Speaker: Dr. Avril Salter, Next Direction Technologies

Session 4: Build a private cloud in 1,000 easy steps Speaker: Harold Wong, Microsoft

SharePoint Online Speakers: Thomas Baer & Erin Giffin, Statera

Videos You May Like

An Overview of Office 365 – Administration Portal and Admin Center

0 842 3

This is part 1 of our 5-part Office 365 free training course. In this Office 365 training video, instructor Spike Xavier introduces some of the most popular services found in Microsoft Office 365 including the Admin Portal and Admin Center. For instructor-led Office 365 training classes, see our course schedule: Spike Xavier SharePoint Instructor – … Continue reading An Overview of Office 365 – Administration Portal and Admin Center

Creating Users and Managing Passwords in Microsoft Office 365

0 642 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.