Below you can find an extract of the main sessions in detail. These will vary by location as will the plenary keynotes. Please visite the individual country websites for information about the programme and timing as well as for
registration.
PLENARY
BREAKOUT SESSIONS
TRACK I - “Discover efficient IT operations in the data center”
1. CONVERGED INFRASTRUCTURE SOLUTIONS
“Achieving unprecedented efficiency and agility through convergence”
Fabric-based approaches to convergence are often inflexible and incomplete. This session introduces you to a convergence model that preserves what you have today, brings greater flexibility for the future and enables you to converge beyond the infrastructure
2. STORAGE I “Dynamic integrated computing and storage: The Fluid Cache tier”
The need for application performance is increasing daily......cannot lag behind. Flash-based storage is emerging as a solution; however, most products today fall short. Fluid Cache tier brings together the best of server and storage technologies and helps customers increase performance without sacrificing the efficiency, agility and resiliency of storage arrays.
3. STORAGE II
“Recover data instantly - Backup 2.0”
Rapid data growth and the complex IT landscape spanning physical, virtual and cloud environments are breaking the traditional approach to data protection. In this dynamic environment, a strategic approach is required to meet shrinking RPO and RTO service levels. This strategy includes a pragmatic and unified approach that covers physical, virtual and cloud environments, eliminates backup windows, reduces storage footprint and allows for the recovery of data. Learn about data protection delivers on this strategy even on a tight budget.
4. SERVER & INFRASTRUCTURE MANAGEMENT
“Data Center systems management”
Systems Management frameworks are the neural-net of IT. IT organizations are demanding increased functionality, yet without all the complexity. Discover how to manage servers more effectively, while dramatically reducing the time and cost of maintenance.
5. NETWORKING
Details to follow..
TRACK II - “Realize your end-user potential”
1. ENDUSER COMPUTING
“Realize your end-user potential”
Systems Management frameworks are the neural-net of IT. IT organizations are demanding increased functionality, yet without all the complexity. Discover how to manage servers more effectively, while dramatically reducing the time and cost of maintenance.
2. BRING YOUR OWN DEVICE & SECURITY“Bring Your Own Device & Advanced Persistent Threats – coming to a network near you”
The latest trend is a growth in advanced, persistent threats that are targeted and well-funded. Learn the tools, techniques and procedures to stay ahead of these threats. Key marketplace trends impacting security, customer pain points and key threats, how Dell can help solve them..
3. DESKTOP VIRTUALIZATION
“Taking desktop virtualization from pilot to production”
Virtual desktops won't completely displace PCs in 2012 or any other year. That said, it has been, and will remain just one of many options for IT pros to deliver applications to remote desktops. How do you get past the common proof of concept pitfalls, and what are the best practices for success?
4. WINDOWS MIGRATION
“Driving end point efficiency"
The end of life of Windows XP is imminent. Many organizations have not even started transitioning to Windows 7 and Windows 8 is right around the corner. How do you plan and execute a seamless transition to a new operating system, and combine the right devices and applications to achieve your organizational objectives?
6. WORKSTATIONS
Details to follow