Start | Finish | Description | ||||
7:00am | 8:00am | Delegate arrival and registration | ||||
8:00am | 8:30am | Breakfast: Sponsored by VMware | ||||
8:30am | 8.45am | Welcome and Opening Remarks sponsored by Data#3 | ||||
8.45am | 9.30am | Craig Rispin, keynote presentation sponsored by Data#3 | ||||
9:40am | 10.20am | Vmware - Cloud Computing: What's Real, What's
Relevant for Enterprise IT, and What Role Does VMware Play Michael Francis, Senior Systems Engineer IT organizations must respond to increasing demands from business stakeholders. Virtually every decision business makes involves IT, and in business where first movers gain competitive advantage, IT responsiveness and agility matter. Yet many IT organizations struggle to meet business needs in a timely way because their applications and services run on infrastructures that are too costly to manage and challenging to change. Today’s IT organizations, faced with decreasing resources and increasing business needs, are looking to cloud computing to provide a more efficient, flexible and cost-effective model for delivering IT to business: IT as a Service. While cloud computing provides the approach, VMware delivers a pragmatic path and customer-proven solutions that allow organizations to preserve existing technology investments, while achieving the goal of enabling IT as a Service. Join us to learn more. |
||||
HP: Enabling the Cloud with HP
3PAR Converged Infrastructure Steve Kelly, Sales Director, 3PAR, HP StorageWorks In September of 2010, HP acquired 3PAR, the leading global provider of utility storage—a category of highly virtualized and dynamically tiered storage arrays built for public and private cloud computing and the storage building block of utility computing. Utility computing is the underlying technology platform that enables the delivery of enterprise IT as a utility service. Organizations use utility computing to build agile and efficient virtualized IT infrastructures for flexible workload consolidation and for the delivery of software and hardware as a service via the cloud. HP 3PAR Utility Storage is built to serve as the storage foundation for utility computing and a key enabler of cloud-based services delivery.In this session, you will understand the compelling reasons that make HP 3PAR the leading choice for the worlds largest public cloud deployments, and a key part of HP’s converged Infrastructure portfolio. |
||||||
Data#3, Managed Services -
Services from the Cloud “ITaas” Matt Hendra, National Manager MS, Craig McDonald, Solution Architect & Alan Urriste, Service Desk Manager Data#3 has been offering Managed services for 20+ years, this session will give an overview of Data#3’s current Managed Service’s business and our increasing capability to deliver traditional onsite services via the cloud medium. We will discuss the use of cloud Service desk to provide 24 by 7 support via force.com and how this can also assist the reduction of your standard end user support team. We will outline our current offerings around email as a service and cloud delivered application packaging. The session will outline the markets evolution to cloud and some of the efficiencies with a access anywhere support medium |
||||||
Symantec - Enterprise Information
Management: IT's Next Critical Frontier Kerri Le, Product Marketing Manager APAC - Data and Systems Management Group A key question for IT professionals is how to build a strategy that incorporates new platforms such as hosted services or virtualisation without interrupting existing data protection, data recovery and data management processes and policies. This session will focus specifically on Information Management, and how to build a robust strategy to secure and manage information consistently irrespective of your environment, be it physical, virtual or cloud based. Symantec will review the convergence of technologies such as backup, archiving, and deduplication and outline the 4 actions every organisation should take to eliminate information islands and effectively and efficiently manage information. |
||||||
Microsoft Customer Immersion
Experience - Forget the brochure and the sales guy – experience the
technology first hand Bruce Smith Throughout JuiceIT, drop into the Customer Immersion Experience and gain a practical end user focused understanding of how you can use Microsoft productivity software, HP notebooks, and Plantronics headsets to deliver the best phone based productivity experience, communicate, create content, and collaborate, gain business insights and be productive from anywhere. Based on real world scenarios and leveraging Windows 7 Office 2010, SharePoint 2010, Lync, Exchange and Windows Phone – the Customer Immersion Experience will give you the insight you need to make the right decision for your organisation. |
||||||
10:25am | 11.05am | IBM: What value to expect from storage
virtualisation Garry Barker, IBM Partner Enablement Manager This session will look into the value of storage virtualisation. Various products in the industry today meet the definition of storage virtualisation, but meeting the definition isn’t the same as delivering the value to your business that virtualisation should offer. Two major values of storage virtualisation are efficiency and flexibility, including minimising the cost of delivering application performance, reducing storage space wastage and providing the flexibility to change responsively with business needs. This last value is taking on a greater importance with the evolution of cloud computing. The session will explore how these values should be delivered on by a storage virtualisation solution, using IBM’s most recent disk virtualisation solution as the example and will touch briefly on the relevance to cloud computing. |
||||
Cisco Virtual Gateway Mark Swalwell, Product Sales Specialist Enhance compliance with industry regulations and simplify audit processes of highly virtualized environments with the Cisco Virtual Security Gateway (VSG). Learn about trusted multitenant access with granular, zone-based, and context-aware security policies, dynamic provisioning of security policies and trust zones during virtual machine (VM) instantiation, mobility-transparent enforcement and monitoring and reduced errors and improved collaboration across server and security teams. |
||||||
Data#3: Strategic Consulting IT Service Management: How to eat the
elephant and not get indigestion Steve Bird, National BA LEad - Strategic Consulting & Steve Bollard, National Practice Manager - Strategic Consulting A brief introduction to Data#3’s Strategic Consulting Practice followed by a deeper view into our IT Service Management offering. A traditional approach to implementing IT Service Management is to implement large and complex ITIL aligned modules in their entirety. This approach often causes organizations to fall short of achieving their desired IT Service Management outcomes as they struggle to implement low value aspects of best practice, and miss out on other high value processes and activities. |
||||||
CA - State of the Internet:
Crimeware-as-a-service Chris Thomas, Principal Consultant - Internet Security Business Unit Each individual and each Internet-connected device presents a certain footprint that is exposed and often manipulated for criminal or political gain. Malware, or malicious software, is often the catalyst for this manipulation, while targets span the gamut from corporate and national secrets to personal information that can be used to directly steal money or perpetuate another crime. Technology and the Internet provide the means and opportunity, while global socioeconomic trends provide the motive to perpetuate these crimes. Supporting this criminal activity and adding to the challenges of protection and law enforcement is the growth of a criminal ecosystem. This network of criminals and services introduces multiple layers of anonymity while providing modular functionality for perpetuating cybercrime. This ecosystem as has been labelled as “Crimeware-as-a-Service,” and we share examples of how this ecosystem is exploiting the latest technology trends of cloud computing and social media. |
||||||
Microsoft Customer Immersion Experience - Forget the brochure and the sales guy – experience the technology first hand Cont. | ||||||
11.05am | 11.45am | Trade Hall / Morning Tea: Sponsored by IBM | ||||
11.50am | 12.30pm | Citrix: Desktop Virtualisation - Transforming
Desktop Delivery Alan Pettigrew, Virtual Computing Technology Evangelist Desktop virtualization technology is becoming the efficient way to meet today’s demands for lower cost, tighter security, and greater flexibility in desktop delivery. The Citrix desktop virtualization approach lets IT deliver the right desktop for every user. Delivery can be tailored to meet the various business requirements across the enterprise, including task workers, office workers, and mobile workers. This session covers the Citrix strategy including reasons why virtual computing is becoming more prevalent. There will be demonstrations showing how desktops and apps can be delivered as a service to any user, on any device. The session is designed to show how the solutions build upon Citrix vision of what virtual computing brings to businesses: enabling virtual work styles for users and increasing business agility for IT. Discover How virtual workstyles can make your organisation more agile, how "work from anywhere" can increase workforce productivity, how the latest mobile devices can help drive innovation and how fast, flexible desktop delivery can make it easy to implement business initiatives like offshoring and branch expansion. |
||||
Websense Richard Costanzo Websense Security Labs identified a 111.4% increase in the number of malicious websites from 2009 to 2010 and 52% of data stealing attacks occurred over the Web. The convergence and dynamic nature of Web-based technologies are bringing revolutionary changes that are exposing organisations to new and emerging security risks. With data theft being one of the primary goals of most modern attacks, attackers are using a mix of email and Web-based attacks in order to infiltrate an organisation’s networks. Subsequently, organisations need to go beyond just offering point solutions, such as corporate email filtering solutions, and need to adopt a unified approach to combating the convergence of these modern threats. Learn why convergence is the future of IT Security and importantly what steps can be taken to effectively protect your organisation from modern threats both NOW and in the future. |
||||||
Adobe: How can you cut project
review cycles, create more effective business communication, protect your
information, increase overall business efficiency and optimize your IT
environment, through deployment of Adobe Acrobat Stephen Nichols Business is looking for ways they can improve efficiency in how we work together. We are constantly exchanging information and collaborating on projects and this session will look at ways you can optimize your environment by taking advantage of Adobe Acrobat and related technologies. This session will show you how you can speed up information exchange with interactive, online document reviews using Dynamic PDFs that allow reviewers to respond to comments as they're being made. Document security is also important to ensure your documents are protected, even when they’re being shared with partners, suppliers, and customers. |
||||||
HP - Session details not yet available | ||||||
Microsoft Customer Immersion
Experience - Forget the brochure and the sales guy – experience the
technology first hand Bruce Smith Throughout JuiceIT, drop into the Customer Immersion Experience and gain a practical end user focused understanding of how you can use Microsoft productivity software, HP notebooks, and Plantronics headsets to deliver the best phone based productivity experience, communicate, create content, and collaborate, gain business insights and be productive from anywhere. Based on real world scenarios and leveraging Windows 7 Office 2010, SharePoint 2010, Lync, Exchange and Windows Phone – the Customer Immersion Experience will give you the insight you need to make the right decision for your organisation. |
||||||
12.35pm | 1.15pm | Data#3 - Simplifying Service Management with
Service Manager 2010 Justin Cook, National Technology Specialist & Scott Gosling, Microsoft Practice Manager There are a vast number of service desk products available in today’s market, many of which are extremely complex to implement or simply fall short of what they promise to deliver. Due to these challenges, we often find organisations simply aren’t using their service desk product to its full potential. System Center Service Manager 2010 can be implemented to deliver a valuable service desk solution with a rich CMDB in a significantly shorter time than most other service desk products. This session will demonstrate the value SCSM can deliver, by demonstrating integration with existing System Center products, walking through incident management, change management, and problem management. In addition we will demonstrate the value of the CMDB and how easily CIs can be added via AD, SCCM, SCOM or other systems. Finally, we will walk through the user portal demonstrating creating an incident, and showcasing some of the self service features available. |
||||
Symantec - Email storage is easy
with Symantec.cloud Adrian Covich, Principal Systems Engineer Nearly 65 percent of IT Managers think email archiving is vital. To date, 27 percent have deployed a dedicated archiving solution, but many organisations still use their email servers as an ad-hoc archive wanting to avoid the complexity of implementation, difficulty estimating storage requirements and the requisite high upfront investment. For businesses wishing to ensure effective email storage management, this Symantec.cloud session will explore how using a cloud model to manage email storage/archiving can provide greater efficiencies and the flow on benefits this has for common business challenges, such as dealing with mailbox quotas, managing local PST files, addressing the need for tamper-proof archiving, reducing hardware and managing multiple office sites. This session will also look at business drivers for email archiving, including the need for rapid access to emails even when deleted, legal discovery and regulatory compliance, and look at reasons why some businesses do not have a dedicated email archiving solution in place. |
||||||
Cisco: Virtualisation Experience
Infrastructure (VXI) Mark Swalwell, Product Sales Specialist Cisco provides the platform and architecture to support hosted virtual desktop and improve enterprise mobility and productivity. Learn how this innovative new solution is optimized to deliver any application to any device in any workplace. |
||||||
Vmware - Disaster proof your
business with Vmware Wayne Carlston Traditional disaster recovery solutions are often costly and complex—and can’t meet your recovery objectives even after doubling hardware (and cost) for protected applications. Testing them can be a nightmare because the steps are tedious and the documentation is hard to keep up to date. Likewise, keeping two sets of hardware in sync is nearly impossible. VMware vSphere lets you recover to any machine, not just specific duplicate hardware, reducing hardware costs and maintenance budget and lowering the complexity of maintaining a backup site. Even if you haven’t virtualized all production servers, virtualize target servers for your data recovery to allow greater simplicity, reliability, and cost savings. |
||||||
Microsoft Customer Immersion Experience - Forget the brochure and the sales guy – experience the technology first hand Cont. | ||||||
1.15pm | 2.15pm | Trade Hall / Lunch: Sponsored by Cisco | ||||
2.15pm | 2.55pm | Data#3: Cloud - Your Choices, Your Future Dave Fenton, Solutions Development Manager Is cloud the start of an industrialisation of IT or just this year’s black for the IT fashion world ? In this presentation we will explore the driving forces behind cloud computing, the reality of cloud computing today and the choices and imperatives this presents you. |
||||
Appsense - User virtualization in
an increasingly cross platform world, let’s make it easy Sean Walsh, Vice President of Sales and Business Development Australasia AppSense will deliver a market update and show the growing trend on how to maximize staff productivity and reduce costs. As we move to a cross platform & multi device world, we need to ensure the user has an improved user experience which is business critical. A happy user is more productive. |
||||||
Trend Micro: Securing Your
Journey to the Cloud Lani Refit, Security Architect Unlock the full potential of your journey to the cloud by understand how the risks uncovered along the way can be mitigated. |
||||||
IBM: What value to expect from
storage virtualisation Garry Barker, IBM Partner Enablement Manager This session will look into the value of storage virtualisation. Various products in the industry today meet the definition of storage virtualisation, but meeting the definition isn’t the same as delivering the value to your business that virtualisation should offer. Two major values of storage virtualisation are efficiency and flexibility, including minimising the cost of delivering application performance, reducing storage space wastage and providing the flexibility to change responsively with business needs. This last value is taking on a greater importance with the evolution of cloud computing. The session will explore how these values should be delivered on by a storage virtualisation solution, using IBM’s most recent disk virtualisation solution as the example and will touch briefly on the relevance to cloud computing. |
||||||
Microsoft Customer Immersion
Experience - Forget the brochure and the sales guy – experience the
technology first hand Bruce Smith Throughout JuiceIT, drop into the Customer Immersion Experience and gain a practical end user focused understanding of how you can use Microsoft productivity software, HP notebooks, and Plantronics headsets to deliver the best phone based productivity experience, communicate, create content, and collaborate, gain business insights and be productive from anywhere. Based on real world scenarios and leveraging Windows 7 Office 2010, SharePoint 2010, Lync, Exchange and Windows Phone – the Customer Immersion Experience will give you the insight you need to make the right decision for your organisation. |
||||||
3.00pm | 3.40pm | CA - How ARCserve solves Remote Office Data
Protection Rod Tansey, Senior Consultant - CA Data Management We all know that performing backup at remote offices can be challenging and risky. When you consider that many times it’s performed by non-IT staff – who may have to transport physical media to the data centre, HQ or DR site for disaster recovery purposes – is there any wonder why this can be so problematic? The CA ARCserve family of products makes remote office data protection and system high availability a breeze. See this demonstrated in a virtualised environment with both VMware and Hyper-V platforms. |
||||
McAfee:
Secure, easy, and scalable enterprise mobility Ben Strong, Systems Engineer Do your users want to access email on their smartphones and tablets? Do they want to connect their personal devices to the work network? How can you say yes to this explosion of mobile devices while maintaining security and compliance? “Jailbroken,” “rogue devices,” and “data loss” are terms that will make even the most seasoned IT professional take notice. But while employees want device choice and access to apps, you need to keep your organisation secure and compliant. Attend this session and discover how you can easily provision, deploy, manage and decommission smartphone and tablet devices, transparently secure smartphone and tablet devices, their corporate data, and the IT network they access, easily provide data protection and full device control of smartphone and tablet mobile devices; and minimise IT support costs while boosting user productivity. |
||||||
Sophos - Protecting yourself from
current and future threats Paul Ducklin, Head of Technology Today’s legal system is dealing with cybercrime, but just barely. Your best defense should include a combination of common sense decisions and protection software. Businesses and end users should employ this type of multi-layered approach to avoid becoming the victims of malware. |
||||||
Vmware - The VMware
Virtualization Journey: Your road to ITaaS (Whiteboard Presentation) Paul Burtwistle and Jason Leith Join us as we WHITEBOARD the Virtualization journey. This session will help you understand the considerations you need to think about as you and your organization seek the benefits of delivering ITaaS. |
||||||
Microsoft Customer Immersion Experience - Forget the brochure and the sales guy – experience the technology first hand Cont. | ||||||
3.45pm | 4:30pm | Trade Hall / Post Event Networking: Sponsored by CA | ||||
All day | Coffee Cart: Sponsored by Symantec | |||||
All day | Juice Bar: Sponsored by HP |