Overview
Free Registration is now open for the L.A. Tech Summit.
Location: Westin South Coast Plaza, Costa Mesa
Hotel Address: 686 Anton Blvd, Costa Mesa, CA 92626
Hotel Telephone: (714) 540-2500
Join your peers by registering now. Gather the key IT knowledge needed to be indispensible. This year's Tech Summit agenda is carefully designed to provide you with the latest IT trends and knowledge needed to make the best possible decisions on behalf of your organization. It will allow you to see the best practices other leading companies have adopted, key IT challenges they are facing, and new solutions that are solving these challenges. The available seating is limited so be sure to sign up as soon as possible to ensure you will have a seat. You are welcome to invite other key people on your team.
Information on Sponsoring This Event
Agenda Summary 
9:00 am: | Registration Open, Signature Refreshments, Peer Networking. |
9:45 am: | New Network and Wireless Technologies. |
10:15 am: | What's New in Backup and Disaster Recovery. |
10:45 am: | Overcoming the Pain-Points of Remote IT Support |
11:15 am: | The Network Functions Platform. |
11:45 am: | Best Practices in Cloud Utilization & Security. |
12:15 pm: | Lunch & Peer Networking. |
![]() ![]() |

Fee: FREE to Register (Limited Seating so Register Now).

Example Past Participants in Our Nationwide Events
• AECOM • Aggreko llc • Ally Financial • Altegra Health • Aramark • Arby's Restaurant Group • BB&T • Bell Flavors & Fragrances • Big Lots • Burrow Global, LLC • Capital One • Catholic Charities USA • CH2M HILL • City of Atlanta • City of Fort Worth • City of Sacramento • Clay Co School Board • ClearResult • Cleveland St University • Cox Enterprises |
• CVS Health • DC Department of HR • Dept of Veteran Affairs • Detroit Housing Comm • Dollar Tree • Dunkin' Bands • Encore Capital Group • Energy Transfer • Equifax • FEMA • First Green Bank • Florida Blue • Franczek Radelet P.C. • FUJIFILM SonoSite, Inc. • GameStop • Gates Corporation • Georgia Institute of Tech • Georgia Lottery Corp • Great Lakes Cheese Co. • HealthPort |
• Hilton • Hotel Managers Group • Kelly Moore Paint • Kennesaw State • Luminant • Mansfield Oil Company • Marriott • MARTA • McKesson • Montgomery County Gov • Museum of Art San Diego • National Labor Relations • Pasco Co Sheriff's Office • PepsiCo • Petro Hunt, L.L.C. • Philip's • Phoenix Health Care • Plains All American • Progressive • RelaDyne LLC |
• Rexel USA • Rutgers University • Santander Consumer • SBM Offshore USA, Inc. • Sharp HealthCare • Southeast Restoration • Starwood • SunTrust • The Container Store • Goodyear Tire & Rubber • The Home Depot • TransCentra • TXU Energy • United Natural Foods, Inc • University of Colorado • University of Georgia • Utah First Credit Union • WestRock • Willis Towers Watson • YWCA Rhode Island |
|
|

Fee: FREE to Register (Limited Seating so Register Now).
Key Sponsors |
![]() |


Detailed Agenda
Agenda topics subject to change
9:00 am: Registration Open, Signature Refreshments, Peer Networking.On arrival you will be greeted for check-in, vendor area is open along with the main presentation room with refreshments being served on arrival. First speaker is on shortly after. This time is spent networking with your peers and vendors.
9:45 am: New Network and Wireless Technologies.
Designing a local area network from scratch is always fun, the wired side of this presentation will cover issues such as the latest Network management tools, design complexity to meet the requirements, PoE or not, just 100GB and choices for going beyond, and redundancy considerations. On the wireless side, although there are many ways to configure and use Wi-Fi, this session will focus on some of the newest tools that best-in-class organizations are applying to achieve the following goals out of their wireless networks:
- Practicing active management.
- Using managed wireless products.
- Prioritizing usage.
- Developing a guest policy carefully
- Building security from the start.
10:15 am: What's New in Backup and Disaster Recovery.
IT disasters happen every day, in every company. With the right preparation, no one ever hears about them. Without it, these disasters can make the evening news. The first step is to define what your company cannot live without, otherwise known as a Business Impact Analysis (BIA). Once the mission critical applications have been identified, you must then agree upon what is acceptable downtime or the recovery time objective (RTO). The difference between zero downtime and fifteen minutes of downtime is significant from a cost perspective. This session will then cover the new tools available for the actual backup and disaster recovery process including testing.
- New tools available to detect and trigger DR activation as needed.
- Automated damage assessment and notification tools.
- Latest backup tools/methodologies/costs and speed of recovery for each.
- Reconstitution challenges and solutions.
10:45 am: Overcoming the Pain-Points of Remote IT Support.
In retrospect, creating an IT Infrastructure is “easy”, maintaining it is “difficult” and supporting it is “daunting.” It is estimated that 75% of a typical IT budget is spent on simply maintaining and supporting existing IT operations! IT support is not just about fixing technical problems. It is the art of detecting and resolving issues arising from humans interacting with technology. When dealing with non-technical users, you must constantly factor in the unexpected - including a high dose of human frustration. Using real-life examples, this session will discuss how engineers can streamline their remote IT support via background management while eliminating their reliance on end-users for triage and access to critical system information. We will also show how IT process automation can help organizations get out of the constant firefighting mode.
11:15 am: The Network Functions Platform.
Enterprises and service providers are moving toward a virtual approach to network and security functions to gain agility and operational efficiencies. However, virtualized servers often fall short when running I/O and compute-intensive networking, security and app delivery functions. In addition, VA provisioning can be complex. All of which adversely impacts adoption and the ability to maintain SLAs for business-critical customers and applications.
In addition to abstracting complexity and taking the guesswork out of VA provisioning, AVX Series Network Functions Platforms provide the best of both worlds – the agility of virtualization and the performance of dedicated appliances. Mix and match different size ADC, SSL VPN and 3rd-party networking, security and app delivery virtual appliances. Add, manage, change and delete VAs on a purpose-built platform that enables intuitive instantiation, service automation and guaranteed performance per virtual network function.
11:45 am: Best Practices in Cloud Utilization & Security.
The goal of any organization is to use IT at its most effective level. For an IT manager cloud sizing doesn’t have one correct answer, since every environment is truly unique in its demands. A few considerations and best practices. A Cloud migration project can be a relatively simple exercise, where applications are migrated "as is", to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or business processes. However, there is no business transformation as part of this move. If the expectation is broader strategic capabilities as a result of a move to the Cloud, it is important to develop a true Cloud migration plan to include core tactics such as:
- Shift to DevOps
- Cloud Containers
- Hybrid Clouds
On the security side, there are different considerations and vulnerabilities specific to each cloud model such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). This session will discuss DLAs, security architecture drawings, specialized protections for the perimeter, firewall secretion, function segregation, and vulnerability analysis.
12:15 Lunch & Peer Networking Raffle Drawings, Vendor Networking and Finale.
This concludes our speaker sessions, enjoy lunch and network with your peers, discuss presentation topics with speakers and vendors on-site
12:45 pm: End of Main Event and Prize Giveaways
We encourage to you network and discuss the days topic and reach out to any of our vendors and/or speakers for any addtional information. Thank you for your time and particpation in our event


Fee: FREE to Register (Limited Seating so Register Now).