2018 Presentations

Upload Your Presentation

*note your file will appear to the right once approved

2018 Presentation Files

There is no single magic button to prevent ransomware from holding your backups hostage. Veeam, however, offers seven tips for preventing ransomware attacks on backup storage. Using the strategies presented here, you can limit your organizations vulnerabilities to ransomware on backup storage and easily recover your data if it is held hostage. Also, see how Bedford School in Bedford England and the City of Sarasota were able to recover from ransomware attacks without paying any ransom using Veeam Backup & Replication.
Title: 7 Tips to Prevent Ransomware Attacks on Backup Storage (0 click)
Caption: There is no single magic button to prevent ransomware from holding your backups hostage. Veeam, however, offers seven tips for preventing ransomware attacks on backup storage. Using the strategies presented here, you can limit your organizations vulnerabilities to ransomware on backup storage and easily recover your data if it is held hostage. Also, see how Bedford School in Bedford England and the City of Sarasota were able to recover from ransomware attacks without paying any ransom using Veeam Backup & Replication.
Filename: 7-tips-to-prevent-ransomware-attacks-on-backup-storage.pptx
Size: 16 MB
PDF export of the Keynote from “An In-House Federated SSO Solution via Open Source Software” @ 1:15 on Monday in Aralia.
Title: An In-House Federated SSO Solution via Open Source Software (0 click)
Caption: PDF export of the Keynote from “An In-House Federated SSO Solution via Open Source Software” @ 1:15 on Monday in Aralia.
Filename: an-in-house-federated-sso-solution-via-open-source-software.pdf
Size: 3 MB
VMware & Amazon Web Services recent partnership has made it easier than ever for datacenter administrators to deploy and migrate workloads to the public cloud. We will look at the technical layout of VMC on AWS as well as use cases such as backup, DR, and hybrid cloud solutions.
Title: AWS Integration with VMware Cloud on AWS (0 click)
Caption: VMware & Amazon Web Services recent partnership has made it easier than ever for datacenter administrators to deploy and migrate workloads to the public cloud. We will look at the technical layout of VMC on AWS as well as use cases such as backup, DR, and hybrid cloud solutions.
Filename: aws-integration-with-vmware-cloud-on-aws.pptx
Size: 15 MB
Neenah is a 1 to 1 Chromebook 6 -12 and iPad's 3 - 5. Neenah also has VoIP phones, IP security cameras, card access and HVAC systems that require network access. Learn how we built our network to be able to handle the needs of our students, staff and community. We will share what worked and what did not work while we were designing future ready network.
Title: Building a Network to Meet Today's Classroom Needs (0 click)
Caption: Neenah is a 1 to 1 Chromebook 6 -12 and iPad's 3 - 5. Neenah also has VoIP phones, IP security cameras, card access and HVAC systems that require network access. Learn how we built our network to be able to handle the needs of our students, staff and community. We will share what worked and what did not work while we were designing future ready network.
Filename: building-a-network-to-meet-todays-classroom-needs.pdf
Size: 2 MB
PDF
Title: BUILDING A NETWORK TO MEET TODAY’S CLASSROOM NEEDS (0 click)
Caption: PDF
Filename: building-a-network-to-meet-todays-classroom-needs-2.pdf
Size: 2 MB
Building an Accessible Website with Drupal 8
Title: Building an Accessible Website with Drupal 8 (0 click)
Caption: Building an Accessible Website with Drupal 8
Filename: building-an-accessible-website-with-drupal-8.pdf
Size: 499 KB
As educational institutions continue to explore technology applications that will help improve student outcomes; video streaming, capture, and playback have become more mainstream on campus. Creating effective spaces for recording, managing assets, and securing access are important considerations for technologists. This session will cover use applications for ad-hoc and automated capture as well as management of user groups, access rights, and content publishing for consumption on any device, anytime, anywhere.
Title: Capture, Streaming and Management of AV Content (0 click)
Caption: As educational institutions continue to explore technology applications that will help improve student outcomes; video streaming, capture, and playback have become more mainstream on campus. Creating effective spaces for recording, managing assets, and securing access are important considerations for technologists. This session will cover use applications for ad-hoc and automated capture as well as management of user groups, access rights, and content publishing for consumption on any device, anytime, anywhere.
Filename: capture-streaming-and-management-of-av-content.pdf
Size: 2 MB
PowerPoint slideshow presentation
Title: Chromebook Repairs and Costs (0 click)
Caption: PowerPoint slideshow presentation
Filename: chromebook-repairs-and-costs.pptx
Size: 3 MB
Update on Cisco Digital Network Architecture and Catalyst 9k series of switches.
Title: Cisco Catalyst 9k and DNA update (0 click)
Caption: Update on Cisco Digital Network Architecture and Catalyst 9k series of switches.
Filename: cisco-catalyst-9k-and-dna-update.pdf
Size: 18 MB
The theory and math behind determining classroom display sizes and location
Title: Classroom Display Sizes, Just how big do they need to be? (0 click)
Caption: The theory and math behind determining classroom display sizes and location
Filename: classroom-display-sizes-just-how-big-do-they-need-to-be.pptx
Size: 3 MB
This instructor led course will walk you through some of the basics of Amazon Web Services & Microsoft Azure so you can "kick the tires" and see which solution may be better for your infrastructure. Providing a broad overview, virtual data centers, security, networking, compute, and storage will all be configured during these labs. Attendees will need their own laptop for the labs. AWS & Azure require an email address and credit card to sign up for the free tiers which will be utilized in these labs. Those who do not wish to participate in the hands on aspect can watch the labs as the presenter will be leading everyone by example and projecting it on the screen.Lab manuals will be provided for those who want to follow along and perform the labs at the same time.
Title: Clout 101 - A hands on approach (0 click)
Caption: This instructor led course will walk you through some of the basics of Amazon Web Services & Microsoft Azure so you can "kick the tires" and see which solution may be better for your infrastructure. Providing a broad overview, virtual data centers, security, networking, compute, and storage will all be configured during these labs. Attendees will need their own laptop for the labs. AWS & Azure require an email address and credit card to sign up for the free tiers which will be utilized in these labs. Those who do not wish to participate in the hands on aspect can watch the labs as the presenter will be leading everyone by example and projecting it on the screen.Lab manuals will be provided for those who want to follow along and perform the labs at the same time.
Filename: clout-101-a-hands-on-approach.pdf
Size: 2 MB
This instructor led course will walk you through some of the basics of Amazon Web Services & Microsoft Azure so you can
Title: Clout 101 - A hands on approach (0 click)
Caption: This instructor led course will walk you through some of the basics of Amazon Web Services & Microsoft Azure so you can "kick the tires" and see which solution may be better for your infrastructure. Providing a broad overview, virtual data centers, security, networking, compute, and storage will all be configured during these labs. Attendees will need their own laptop for the labs. AWS & Azure require an email address and credit card to sign up for the free tiers which will be utilized in these labs. Those who do not wish to participate in the hands on aspect can watch the labs as the presenter will be leading everyone by example and projecting it on the screen.Lab manuals will be provided for those who want to follow along and perform the labs at the same time.
Filename: clout-101-a-hands-on-approach-2.pptx
Size: 7 MB
The Nuts and Bolts of Collaborative Networks
Title: Community Area Networks (CANs) (0 click)
Caption: The Nuts and Bolts of Collaborative Networks
Filename: community-area-networks-cans.pdf
Size: 13 MB
ConfigMgr, What's New and what's coming
Title: ConfigMgr, What's New and what's coming (0 click)
Caption: ConfigMgr, What's New and what's coming
Filename: configmgr-whats-new-and-whats-coming.pdf
Size: 363 KB
A constant challenge IT organizations are facing as they migrate to windows 10 is managing all their hardware properly. To fully leverage Windows 10's advanced security features, organizations need to enable UEFI, SecureBoot, TPM and more. Many of these features require upgrading the device firmware. Finally, upgrading drivers on in-place devices is becoming a best practice for performance and reliability. Join systems management experts from Now Micro to discuss common challenges and see demo's of automating these changes on your devices.
Title: Dealing with Hardware - Overcoming challenges with Windows 10 (0 click)
Caption: A constant challenge IT organizations are facing as they migrate to windows 10 is managing all their hardware properly. To fully leverage Windows 10's advanced security features, organizations need to enable UEFI, SecureBoot, TPM and more. Many of these features require upgrading the device firmware. Finally, upgrading drivers on in-place devices is becoming a best practice for performance and reliability. Join systems management experts from Now Micro to discuss common challenges and see demo's of automating these changes on your devices.
Filename: dealing-with-hardware-overcoming-challenges-with-windows-10.pdf
Size: 360 KB
Software increasingly plays a vital role in delivering the institutions mission to students, faculty, and staff. In order to have the legal right to use the software, education faces many challenges to achieve the required needs. This session will frame both the administrative and procurement perspective to software licensing.
Title: Framing the challenges with Software Licensing in Education (0 click)
Caption: Software increasingly plays a vital role in delivering the institutions mission to students, faculty, and staff. In order to have the legal right to use the software, education faces many challenges to achieve the required needs. This session will frame both the administrative and procurement perspective to software licensing.
Filename: framing-the-challenges-with-software-licensing-in-education.pdf
Size: 1 MB
Free tool for SSO, Rostering and Centralized Access
Title: Harnessing the Power of Clever (0 click)
Caption: Free tool for SSO, Rostering and Centralized Access
Filename: harnessing-the-power-of-clever.pptx
Size: 2 MB
How to use the Information Technology Infrastructure Library (ITIL) as a guide to select and setup your Information Technology Services Management (ITSM) solution (Help Desk). Included in this Google Shared Folder are the slide presentation and many documents summarizing the individual processes of each ITIL Services Book.
Title: Help Desk (0 click)
Caption: How to use the Information Technology Infrastructure Library (ITIL) as a guide to select and setup your Information Technology Services Management (ITSM) solution (Help Desk). Included in this Google Shared Folder are the slide presentation and many documents summarizing the individual processes of each ITIL Services Book.
Filename: help-desk.pdf
Size: 21 KB
Slide deck and presentation notes. But really... you probably had to be there. Enjoy!
Title: I'm Not Classically Trained: Lessons learned through an unconventional path to education technology. (0 click)
Caption: Slide deck and presentation notes. But really... you probably had to be there. Enjoy!
Filename: im-not-classically-trained-lessons-learned-through-an-unconventional-path-to-education-technology.pdf
Size: 1 MB
Powerpoint presentation from our session on Tuesday at 11 AM
Title: Integrated Architecture-Going Beyond just Firewall and AV (0 click)
Caption: Powerpoint presentation from our session on Tuesday at 11 AM
Filename: integrated-architecture-going-beyond-just-firewall-and-av.pdf
Size: 4 MB
PDF of Presentation
Title: Integrating Macs in a Windows Environment (0 click)
Caption: PDF of Presentation
Filename: integrating-macs-in-a-windows-environment.pdf
Size: 7 MB
I will outline how Winneconne Community School District is able to use multiple products to allow seamless integration from wired to wireless devices, school owned or BYOD. I will demonstrate ways to monitor and filter students on any device using products from Extreme Networking, Palo Alto, GoGuardian, and Gaggle.This can happen at home just as easily as it can happen at school.
Title: Keeping your network safe (0 click)
Caption: I will outline how Winneconne Community School District is able to use multiple products to allow seamless integration from wired to wireless devices, school owned or BYOD. I will demonstrate ways to monitor and filter students on any device using products from Extreme Networking, Palo Alto, GoGuardian, and Gaggle.This can happen at home just as easily as it can happen at school.
Filename: keeping-your-network-safe.pdf
Size: 2 MB
Do you remember that issue we experienced last year for a brief time and how we resolved it? ...yeah, neither did we. Or maybe the new student employees that need be to trained in but you have so little time to do so that you ultimately end up throwing them to the wolves with near zero preparation...yeah, guilty there too. Please join us as we share how we've evolved from a collection of random documents to our now knowledge-centric environment that utilizes UW-Madison's Knowledge Base to lower incident rates and promote self-service amongst our users.
Title: Knowledge-Centered Support, Let's DoIT! (0 click)
Caption: Do you remember that issue we experienced last year for a brief time and how we resolved it? ...yeah, neither did we. Or maybe the new student employees that need be to trained in but you have so little time to do so that you ultimately end up throwing them to the wolves with near zero preparation...yeah, guilty there too. Please join us as we share how we've evolved from a collection of random documents to our now knowledge-centric environment that utilizes UW-Madison's Knowledge Base to lower incident rates and promote self-service amongst our users.
Filename: knowledge-centered-support-lets-doit.pdf
Size: 4 MB
Powerpoint of the presentation
Title: Leading and Learning: Edina Public Schools Expands Data Strategy (0 click)
Caption: Powerpoint of the presentation
Filename: leading-and-learning-edina-public-schools-expands-data-strategy.pptx
Size: 8 MB
This session will show how our district lives in both the Office 365 and G-Suite worlds. We will show how we create the appearance of SSO for users in both Office 365 and G-Suite and keep the accounts and passwords synced automatically using free tools from Microsoft and Google. We will discuss why this was needed for our 1400 student district, the challenges we face, the effectiveness of the solution, as well as some shortcomings.
Title: Local AD, Azure AD, and G-Suite User Management (0 click)
Caption: This session will show how our district lives in both the Office 365 and G-Suite worlds. We will show how we create the appearance of SSO for users in both Office 365 and G-Suite and keep the accounts and passwords synced automatically using free tools from Microsoft and Google. We will discuss why this was needed for our 1400 student district, the challenges we face, the effectiveness of the solution, as well as some shortcomings.
Filename: local-ad-azure-ad-and-g-suite-user-management.pptx
Size: 361 KB
This hands on session will focus on data closet temperatures and digital signage using a Raspberry Pi3.
Title: MacGyver IT: featuring Raspberry Pi (H200) (0 click)
Caption: This hands on session will focus on data closet temperatures and digital signage using a Raspberry Pi3.
Filename: macgyver-it-featuring-raspberry-pi-h200.pdf
Size: 6 MB
‘Asset management’ are words that make IT folk groan almost as much as ‘backups.’ Good asset management will change how your team operates by saving time, money, and creating new efficiencies. Green Bay Area Public Schools transitioned from using Google sheets to using Solarwinds, an integrated asset management, and help desk solution. Learn how it was possible to move 24,000 devices last summer with only eight technicians and good asset management. Our asset management/help desk system is now at the heart of everything ‘hardware and service’ in Green Bay.
Title: Making Asset Management Work for You (0 click)
Caption: ‘Asset management’ are words that make IT folk groan almost as much as ‘backups.’ Good asset management will change how your team operates by saving time, money, and creating new efficiencies. Green Bay Area Public Schools transitioned from using Google sheets to using Solarwinds, an integrated asset management, and help desk solution. Learn how it was possible to move 24,000 devices last summer with only eight technicians and good asset management. Our asset management/help desk system is now at the heart of everything ‘hardware and service’ in Green Bay.
Filename: making-asset-management-work-for-you.pptx
Size: 7 MB
Google Slide of presentation
Title: My Superintendent/Principal wants to do video newsletters! Now What?! (0 click)
Caption: Google Slide of presentation
Filename: my-superintendent-principal-wants-to-do-video-newsletters-now-what.pptx
Size: 3 MB
Slideshow from session.
Title: Network Management with Lansweeper! (0 click)
Caption: Slideshow from session.
Filename: network-management-with-lansweeper.pdf
Size: 4 MB
Slide deck from the Password Cracking 101 presentation
Title: Password Cracking 101 (0 click)
Caption: Slide deck from the Password Cracking 101 presentation
Filename: password-cracking-101.pptx
Size: 1 MB
Windows AD, JAMF Casper, Skyward, Infinite Campus, Google Chrome Management Console, Citrix, Palo Alto, Cisco ISE, Cisco CMX, Cisco Call Manager, Cisco Spark. These are all powerful task specific tools in use at Waukesha School District. Each of these tools contains valuable information about the daily operations of the district. Imagine though if you could breakdown the walls between these tools and share information in a simple format that the average user could understand. If you could capture the app inventory of a mobile device, share that on the same screen with it's physical location and provide access to that information to families in the student information system. What if you could maintain the Add Move Change process for you phone system in seconds and automate the phone directory in real time to your website. Would it be possible to automate the provisioning of Citrix resources, and assignment of iPad or chrome Apps based on enrollment in a class on the SIS. Waukesha School District has been successful at leveraging the API to integrate tools together and do all of these and more. Come join the discussion and see how it is possible to free your data.
Title: Prison Break ( using the API to breakout your data) (0 click)
Caption: Windows AD, JAMF Casper, Skyward, Infinite Campus, Google Chrome Management Console, Citrix, Palo Alto, Cisco ISE, Cisco CMX, Cisco Call Manager, Cisco Spark. These are all powerful task specific tools in use at Waukesha School District. Each of these tools contains valuable information about the daily operations of the district. Imagine though if you could breakdown the walls between these tools and share information in a simple format that the average user could understand. If you could capture the app inventory of a mobile device, share that on the same screen with it's physical location and provide access to that information to families in the student information system. What if you could maintain the Add Move Change process for you phone system in seconds and automate the phone directory in real time to your website. Would it be possible to automate the provisioning of Citrix resources, and assignment of iPad or chrome Apps based on enrollment in a class on the SIS. Waukesha School District has been successful at leveraging the API to integrate tools together and do all of these and more. Come join the discussion and see how it is possible to free your data.
Filename: prison-break-using-the-api-to-breakout-your-data.pdf
Size: 2 MB
Side deck from introduction and links
Title: Raspberry Pi Baking Tips and Recipe Exchange (0 click)
Caption: Side deck from introduction and links
Filename: raspberry-pi-baking-tips-and-recipe-exchange.pdf
Size: 1,009 KB
PDF of Presentation slides.
Title: Raspberry Pi Bell System in a Small School (0 click)
Caption: PDF of Presentation slides.
Filename: raspberry-pi-bell-system-in-a-small-school.pdf
Size: 2 MB
With more districts deploying a 1:1 device program among staff and students, selecting an IT Asset Disposition (ITAD) Vendor that can maintain security and provide ROI is more important than ever. Districts are finding themselves with large quantities of solid state devices, laptops, and other mobile equipment that requires a refresh approximately every 3-5 years. Asking key questions and knowing your ITAD vendors policies, processes and certifications are essential. This presentation will review the challenges in sanitizing solid state devices and other IT equipment, as well as how districts can benefit from a new source of revenue while ensuring the security of student data by developing a solid RFP.
Title: Retiring your Technology Devices: Ensuring Security While Generating ROI (0 click)
Caption: With more districts deploying a 1:1 device program among staff and students, selecting an IT Asset Disposition (ITAD) Vendor that can maintain security and provide ROI is more important than ever. Districts are finding themselves with large quantities of solid state devices, laptops, and other mobile equipment that requires a refresh approximately every 3-5 years. Asking key questions and knowing your ITAD vendors policies, processes and certifications are essential. This presentation will review the challenges in sanitizing solid state devices and other IT equipment, as well as how districts can benefit from a new source of revenue while ensuring the security of student data by developing a solid RFP.
Filename: retiring-your-technology-devices-ensuring-security-while-generating-roi.pdf
Size: 2 MB
Notes from roundtable
Title: Roundtable - 1:1 Best Practices 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-11-best-practices-1030.pdf
Size: 422 KB
Notes from roundtable
Title: Roundtable - 1:1 Best Practices 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-11-best-practices-915.pdf
Size: 408 KB
Notes from roundtable
Title: Roundtable - Apple 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-apple-1030.pdf
Size: 404 KB
Notes from roundtable
Title: Roundtable - Apple 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-apple-1030-2.pdf
Size: 409 KB
Notes from Roundtable
Title: Roundtable - Apple 9:15 (0 click)
Caption: Notes from Roundtable
Filename: roundtable-apple-915.pdf
Size: 398 KB
Notes from roundtable
Title: Roundtable - Apple 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-apple-915-2.pdf
Size: 407 KB
Notes from roundtable
Title: Roundtable - Chromebooks 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-chromebooks-1030.pdf
Size: 521 KB
Notes from roundtable
Title: Roundtable - Chromebooks 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-chromebooks-915.pdf
Size: 417 KB
Notes from roundtable
Title: Roundtable - Data Security 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-data-security-1030.pdf
Size: 425 KB
Notes from roundtable
Title: Roundtable - Disaster Recovery 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-disaster-recovery-1030.pdf
Size: 488 KB
Notes from roundtable
Title: Roundtable - Fiber WAN 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-fiber-wan-915.pdf
Size: 398 KB
Notes from roundtable
Title: Roundtable - Google Admin 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-google-admin-1030.pdf
Size: 416 KB
Notes from Roundtable
Title: Roundtable - Google Admin 9:15 (0 click)
Caption: Notes from Roundtable
Filename: roundtable-google-admin-915.pdf
Size: 468 KB
Notes from roundtable
Title: Roundtable - Helpdesk Best Practices 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-helpdesk-best-practices-1030.pdf
Size: 390 KB
Notes from roundtable
Title: Roundtable - Helpdesk Best Practices 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-helpdesk-best-practices-915.pdf
Size: 415 KB
Notes from roundtable
Title: Roundtable - Large Institutions 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-large-institutions-915.pdf
Size: 413 KB
Notes from roundtable
Title: Roundtable - Management-Leadership of IT Dept 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-management-leadership-of-it-dept-1030.pdf
Size: 411 KB
Notes from Roundtable
Title: Roundtable - Mobile Device Management 1030 (0 click)
Caption: Notes from Roundtable
Filename: roundtable-mobile-device-management-1030.pdf
Size: 409 KB
Notes from roundtable
Title: Roundtable - Navigating Higher Ed IT 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-navigating-higher-ed-it-915.pdf
Size: 427 KB
Notes from roundtable
Title: Roundtable - Office 365 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-office-365-1030.pdf
Size: 419 KB
Notes from roundtable
Title: Roundtable - Office 365 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-office-365-915.pdf
Size: 408 KB
Notes from roundtable
Title: Roundtable - Open Source 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-open-source-1030.pdf
Size: 406 KB
Notes from roundtable
Title: Roundtable - Security Best Practices 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-security-best-practices-915.pdf
Size: 501 KB
Notes from roundtable
Title: Roundtable - Small Institutions 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-small-institutions-915.pdf
Size: 414 KB
Notes from roundtable
Title: Roundtable - Tuesday Apple (0 click)
Caption: Notes from roundtable
Filename: roundtable-tuesday-apple.pdf
Size: 419 KB
Notes from roundtable
Title: Roundtable - Tuesday Google (0 click)
Caption: Notes from roundtable
Filename: roundtable-tuesday-google.pdf
Size: 678 KB
Notes from roundtable
Title: Roundtable - Tuesday Microsoft (0 click)
Caption: Notes from roundtable
Filename: roundtable-tuesday-microsoft.pdf
Size: 452 KB
Notes from roundtable
Title: Roundtable - Tuesday Security (0 click)
Caption: Notes from roundtable
Filename: roundtable-tuesday-security.pdf
Size: 393 KB
Notes from roundtable
Title: Roundtable - Windows 10 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-windows-10-1030.pdf
Size: 408 KB
Notes from roundtable
Title: Roundtable - Windows 10 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-windows-10-915.pdf
Size: 576 KB
Notes from roundtable
Title: Roundtable – Network Management/Monitoring 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-network-management-monitoring-1030.pdf
Size: 385 KB
Notes from roundtable
Title: Roundtable – Network Management/Monitoring 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-network-management-monitoring-915.pdf
Size: 427 KB
Notes from roundtable
Title: Roundtable – SCCM/Config Manager/Group Policy 10:30 (0 click)
Caption: Notes from roundtable
Filename: roundtable-sccm-config-manager-group-policy-1030.pdf
Size: 548 KB
Notes from roundtable
Title: Roundtable – SCCM/Config Manager/Group Policy 9:15 (0 click)
Caption: Notes from roundtable
Filename: roundtable-sccm-config-manager-group-policy-915.pdf
Size: 475 KB
Securing Our Schools against Ransomware and Emerging Threats
Title: Securing Our Schools against Ransomware and Emerging Threats (0 click)
Caption: Securing Our Schools against Ransomware and Emerging Threats
Filename: securing-our-schools-against-ransomware-and-emerging-threats.pdf
Size: 32 MB
This presentation will teach participants the value of providing students' online data to parents. Participants will understand how a child’s online activity can be used by parents to keep them safe online, frame academic conversations, and promote good digital citizenship. Participants will also learn how emotional sentiment scanning is a more comprehensive way to identify instances of self- harm and bullying on Gmail and Social Networking sites.
Title: Securly: Student Safety, Reimagined (0 click)
Caption: This presentation will teach participants the value of providing students' online data to parents. Participants will understand how a child’s online activity can be used by parents to keep them safe online, frame academic conversations, and promote good digital citizenship. Participants will also learn how emotional sentiment scanning is a more comprehensive way to identify instances of self- harm and bullying on Gmail and Social Networking sites.
Filename: securly-student-safety-reimagined.pptx
Size: 7 MB
SpreadSheet Tips and Tricks Every Admin Should Know
Title: SpreadSheet Tips and Tricks Every Admin Should Know Tuesday 9:45 (0 click)
Caption: SpreadSheet Tips and Tricks Every Admin Should Know
Filename: spreadsheet-tips-and-tricks-every-admin-should-know-tuesday-945.pptx
Size: 87 MB
Formalized help desk strategies, processes, and procedures not only create a more efficient service organization by illuminating work and capacity, they provide the basis for building trust and cultivating collaborative, productive relationships, resulting in happy technicians and end users. We will share the story of our journey from a highly stressed department running all day with our hair on fire, never catching up or satisfying our end users to a department that has time to solve problems, build positive relationships and plan strategically to get ahead of the curve on major projects.
Title: Using a Help Desk To Reduce Stress and Cultivate Productive Relationships With Happy End Users (0 click)
Caption: Formalized help desk strategies, processes, and procedures not only create a more efficient service organization by illuminating work and capacity, they provide the basis for building trust and cultivating collaborative, productive relationships, resulting in happy technicians and end users. We will share the story of our journey from a highly stressed department running all day with our hair on fire, never catching up or satisfying our end users to a department that has time to solve problems, build positive relationships and plan strategically to get ahead of the curve on major projects.
Filename: using-a-help-desk-to-reduce-stress-and-cultivate-productive-relationships-with-happy-end-users.pptx
Size: 2 MB
Using Intelligence for Cyber Security
Title: Using Intelligence- Analytics-Big Data in Cyber Security (0 click)
Caption: Using Intelligence for Cyber Security
Filename: using-intelligence-analytics-big-data-in-cyber-security.pptx
Size: 114 MB
PDF export of the Keynote from “What’s up with this buzz about Docker” @ 2:30 on Monday in Crown Palm.
Title: What’s up with this buzz about Docker (0 click)
Caption: PDF export of the Keynote from “What’s up with this buzz about Docker” @ 2:30 on Monday in Crown Palm.
Filename: whats-up-with-this-buzz-about-docker.pdf
Size: 3 MB
Take a deeper dive into vulnerability scanning with the Nessus Vulnerability Scanner, Kali Linux and Knoppix STD.
Title: White Hat Warrior (B347) (0 click)
Caption: Take a deeper dive into vulnerability scanning with the Nessus Vulnerability Scanner, Kali Linux and Knoppix STD.
Filename: white-hat-warrior-b347.pdf
Size: 11 MB
Using a scanner tool can help technicians identify channel conflicts, overlapping and network configuration issues that may be affecting the connectivity or performance of your wireless network. Using tools WiFi Explorer (Mac) and NetSpot (Win/Mac) to maintain a healthy WiFi network.
Title: WiFi = WeFix (B348) (0 click)
Caption: Using a scanner tool can help technicians identify channel conflicts, overlapping and network configuration issues that may be affecting the connectivity or performance of your wireless network. Using tools WiFi Explorer (Mac) and NetSpot (Win/Mac) to maintain a healthy WiFi network.
Filename: wifi-wefix-b348.pdf
Size: 6 MB
With a bi-yearly release cycle for Windows 10, organizations are looking for the best method to keep their environments compliant. During this demo-centric session we'll show several methods currently in use and how to best use them for upgrading to the latest version.
Title: Windows 10 Upgrading to the latest and greatest! (0 click)
Caption: With a bi-yearly release cycle for Windows 10, organizations are looking for the best method to keep their environments compliant. During this demo-centric session we'll show several methods currently in use and how to best use them for upgrading to the latest version.
Filename: windows-10-upgrading-to-the-latest-and-greatest.pdf
Size: 4 MB
This deep-dive session will be geared to help IT staff understand changes to the Windows 10 deployment and Servicing model. We'll cover automating windows 10 imaging and service model. We will also cover handling the hardware that comes with new and old devices and the need to manage all of this in a task sequence during our deployments as well as afterwards. We will also discuss how to handle servicing updates with ConfigMgr, WSUS, and Windows Updates for Business. This demo-heavy workshop will go through new features in Windows 10 that your environment can benefit from.
Title: Windows 10, Deployment Workshop (0 click)
Caption: This deep-dive session will be geared to help IT staff understand changes to the Windows 10 deployment and Servicing model. We'll cover automating windows 10 imaging and service model. We will also cover handling the hardware that comes with new and old devices and the need to manage all of this in a task sequence during our deployments as well as afterwards. We will also discuss how to handle servicing updates with ConfigMgr, WSUS, and Windows Updates for Business. This demo-heavy workshop will go through new features in Windows 10 that your environment can benefit from.
Filename: windows-10-deployment-workshop.pdf
Size: 8 MB
Slidedeck for Windows 10 Building a lab, Creating Reference Image, and Deployment
Title: Windows 10: Lab, Imaging and Depoyment (0 click)
Caption: Slidedeck for Windows 10 Building a lab, Creating Reference Image, and Deployment
Filename: windows-10-lab-imaging-and-depoyment.pdf
Size: 842 KB