Scrambled Egg Bar, American Fried Potatoes, Grilled/Roasted Sausage Links, Crisp Bacon Strips, Selection of Fresh Fruits and Berries, Individual Assorted Yogurts, Assorted Baked Breakfast Breads
Over 70% of the workforce is disengaged from their work; in other words they are there for the paycheck. And although you may create great solutions and develop the best systems and technology, unless employees are engaged you will find that adoption of your solutions will be severely lacking. Focusing on employee engagement may not seem like an IT responsibility, but without it too many initiatives will not meet expectations. During this keynote you will be introduced to the 11 secrets that create engaged employees - ones that are ready to adopt your technology.
While the Cloud revolution is in progress, gaining a clear competitive advantage that provides your organization and customers significant business value with minimum risk will continue to be a strategic goal. What are your deployment choices? Which one will allow you to move workload seamlessly and securely from on-premise to the public cloud? How can you ensure that your business transformation yields a secure information fortress? This presentation will share how to transform your business addressing these challenges all while achieving significant cost savings and assuring deeply integrated security.
We all know that upgrading hardware will improve performance. That was one of our goals when LeanLogistics replaced our eight-year-old storage array with a new Nimble CS500. The real improvement, however, came from the transformation of our down-level database cloning process to take advantage of the capabilities newer arrays have to offer. By reducing our database clone times from 30 hours down to 30 minutes, we have increased our development cycles, reduced our risk due to a failed clone, saved storage space, and improved performance.
Learn how Spectrum Health created an intelligent, intuitive, and HDI award winning Service Catalog with more than 80,000 services. The Catalog’s architect and lead developer will discuss how Spectrum Health Information Services uses process improvement practices to continually seek feedback in gaining an accurate understanding of its users and providing them with an Amazon like ordering experience. Additionally, you’ll hear about the benefits gained through automation and the streamlining of request and fulfillment processes.
Panelists will discuss the business impact of the current limits of diversity in the IT workforce, explore potential causes and contributing factors of these limits, and describe their organizations’ efforts to improve IT workforce diversity.
In this session, we will explore approaches that can be used to experiment, prototype and pilot new technology. Traditional views on Innovation typically revolve around how it might result in new products, services and revenue. There is another side of Innovation that is often overlooked and underutilized, and that is how Innovation can help companies become more efficient with their existing internal processes, especially if they are a manufacturing company. In his session, we will address in detail the two concepts of “Beneficial Disruption” and “Design Thinking” as key components in this journey.
Well known is the Hero's Journey, exemplified perfectly by Luke Skywalker. But less well known is the equally iconic path of the Heroine. It is different and foundationally relevant to what women experience working alongside male colleagues. This session explores this archetype and the critical lessons that can lead to better understanding of the journey for women in technology.
Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they manage only virtual machines, in a fraction of the footprint and at far lower cost than conventional storage. Tintri offers them the choice of all-flash or hybrid-flash platform, converged or stand-alone structure and any hypervisor. Rather than obsess with storage, leaders focus on the business applications that drive value—and that requires that they keep storage simple.
DBA, Network Admin, Desktop support-what’s your role? All of them? With all the hats you’re wearing now, let’s add security to your role. Where do you start, what resources are available to help get you going and keep you sane? Learn/share what has worked… or not worked in smaller IT shops who have the same responsibility to secure their company.
Mixed Field Greens with Tomato, Cucumber and Carrot, Assortment of Dressings, Fresh Fruit Salad, Tortellini with Baby Spinach, Roasted Vegetables and Red Pepper Cream Sauce, Tuscan Style Breast of Chicken, Broccolini with Garlic Bread Crumbs, Freshly Grated Parmesan Cheese and Red Pepper Flakes, Cheesy Garlic Bread, Tiramisu, Baci Mousse, Lemon-Anise and Cannoli
Every day there are new statistics about how the generation born between 1980 and 2000 and how they are changing the way the workforce works:
- They are IMPACTFUL
- 75% of the workforce by the year 2030.
- They are EDUCATED
- 79% hold higher education degrees than other generations.
- They are CONNECTED
- 56% won’t accept jobs from companies that ban social media
- They are FLEXIBLE
- 45% will choose workplace flexibility over pay
- They are MOBILE
- 2 years is the average job tenure
Change is imminent; so what are we doing to educate, train and guide our next generation of leaders?
Amway’s commitment to talent development is a key objective for management and executive leadership at the Amway Corporation. The Internal Business Solutions Department is a team of Systems Analyst who are the primary contact and partner for the research and recommendation of technical solutions for the internal business areas such as; Finance, Manufacturing, Logistics, Strategic Planning, Research and Development, Sales Analysis and Forecasting, Legal, Human Resources, and Information Technology Divisions. The Internal Business Solutions Team’s talent development strategy is to implement a program to benchmark, track, train, and provide team members the opportunity to attain the best systems analyst skills for internal customer technical demands.
As the global leader in Content Delivery Network (CDN) services, Akamai makes the Internet fast, reliable and secure for its customers. Akamai implemented a unified online external support community to foster communication among the company’s globally dispersed customers, partners, and employees. The Akamai Community establishes a destination for peer-to-peer assistance, SME thought leadership, and interactive self-service. When the business saw how powerful the external community was to their customers, the internal Aloha Community was built to serve employees as their new social internet to replace disparate systems and become the single knowledge source for all things internal to Akamai. Attendees will walk away with the understanding of how Akamai leveraged community platforms to drive customer and employee engagement.
Securing employee Identity has never been more important. Data breaches have become as ubiquitous as data itself, with a different organization taking that unfortunate news spotlight every week. One thing, however, is consistent: Most breaches involve credentials that are leaked, intercepted or stolen. In this session we’ll dive into current trends and threats, and discuss how Okta can help save your business from the dark side of the cloud.
It is no longer a theory that I.T. organizations will be running portions of their IT workloads in data centers over which they do not have direct control (the “cloud”). The choices are simultaneously amazing and daunting to the CIOs of today. This panel will provide attendees insights on why and how organizations of various sizes moved all or portions of their IT solutions to the cloud, and what they learned in the process.
During this session participants will engage with Bluescape technology (a game changing cloud based collaborative software) in a learn by doing experience. Attendees will gain an understanding of how a West Michigan office furniture manufacturer (Haworth) developed and is using Bluescape, combined with Lean methodologies, to transform the way they work and drive superior and sustainable business results. Participants will also be exposed to how Bluescape customers are capitalizing on the cloud based technology platform to inspire employees through collaboration, innovation, engagement and empowerment while driving results all over the world from the entertainment industry, education arena, financial investment industry, architectural and design world, from product development to sales and countless others. At the end of the session, participants will be given an opportunity to collaborate as thought leaders in the development of ways that they can transform their current organizations using collaboration cloud based technology.
Experts estimate that by 2020 there will be 50 billion devices connected to the internet. The proliferation of the “Internet of things” – the network of connected objects with the ability to communicate and share data with each other– brings both untold benefits to businesses as well as significant security, privacy, and legal risks. Vulnerabilities in some of these internet-connected devices can be exploited to allow hackers to access and misuse personal information, or even cause harm to the device or the device’s user. In this session, we will give you an overview of the emerging legal issues and trends from the “Internet of things.”
Many organizations have mandatory requirements for DR Testing. Either internal compliance initiatives or external regulations demand that the DR plan is executed and that execution is documented. At United Bank of Michigan, Norman Galang, Network Administrator, was the only person who could execute the DR test, presenting the organization with some concern.
The IT Team started to evaluate the process as a whole and designed a criteria for DR Best Practices:
- The process should be simple enough so everyone can execute it for testing or production failovers
- The test needs to be documented to meet compliance initiatives
- Applications need to be protected consistently to meet business requirements
- Service levels have to be supported effectively
Based on this criteria, the team selected Zerto Virtual Replication. It installed in under one hour and they were replicating.
Join us to learn how you can simplify your disaster recovery processes.
In software development there exists a tension between quality, cost, and time. Traditional software processes stress quality over efficiency. Delivering cost competitive quality software in today’s time constrained market is a difficult task.The pressures introduced by the rapidly changing organizational needs introduce pressures into software development requiring it to be as adaptable as the organizational needs. Many traditional software processes are top heavy with documentation and rigid control mechanisms making it difficult applying them to different software projects. New families of processes, referred to as Agile Processes, are making headway into the software industry. These processes focus more on people interactions and early development of code than on documentation and planning calling themselves agile because, unlike the traditional processes, they are adaptable, not rigid.
In this “fireside chat” We will have a conversation with experienced leaders about Agile Processes, the philosophy driving them, the challenges faced when implementing them, the appropriate use and the real life experience and outcomes.
It is becoming common wisdom that firewalls, IPSs and other traditional information security tools simply are not adequate protection given the nature of today's threatscape. Attackers are well equipped, skillful, determined and, often state or organized crime sponsored. That gives them a lot of resources - perhaps resources beyond those that you have to defend against them. So what are CISOs. CIOs and their teams to do?
This keynote will take a moderately deep dive into the application of cyber intelligence, cyber threat analysis and the application of cyber forensics from one who has been on both sides of the street: a researcher, a practitioner and an educator. Drawing on over 50 years in the field of information security, Dr. Peter Stephenson will guide you through the maze of "solutions" to help you define the problems they are supposed to solve, applying the right solutions to the right problems and using the advanced techniques of threat analysis, forensics and threat intelligence to predict threats against your infrastructure before you have to explain why the breach occurred.
You'll met bad guys, attack types, malware authors, cyber crime campaigns as well as a lot of tools. Techniques and processes (TTPs) that are prevalent in the threat space. You'll take a stroll in the underground and, hopefully, you'll come away with solid defense strategies for your enterprise.
The bad guys are in your networks.... now your task is to mitigate damage.
Enjoy this complimentary cocktail reception featuring an open bar, hors d’oeuvres and conversation. Make this an important element of your attendance to the Summit. The ability to network and collaborate with your peers in an open and no-hype environment will prove to provide long lasting value to your key business initiatives moving forward.
Event VenueDirections & Information Below
303 Monroe Ave NW • Grand Rapids, MI 49503 • ph. 616-742-6500