Track: Sponsors

Palo Alto Networks

Essential Steps to Prevent Ransomware Infections
Ransomware continues to evolve, infecting organizations of all size and industry, taking in massive profits for cyber attackers. In order to effectively protect your organization, you must go behind the scenes and understand how to combat the latest delivery techniques used by adversaries. Join Palo Alto Networks threat expert, Scott Simkin, as he details advances in ransomware and exploit kits. You will leave this must-attend session with practical ways to prevent these critical threats, including in-depth policy recommendations and simple tips to reduce your attack surface.
Monday, 09:15 AM | Porter, Room C118

College Scheduler

Empower your students by simplifying scheduling! How Student Schedule Planning Benefits The Entire Institution
Imagine the smoothest registration your institution has ever experienced. Now add benefits for Advising, Orientation staff, and the Registrar's office. College Scheduler will demonstrate how one solution can alleviate registration frustration, provide administration with critical course demand data, increase advising efficiency, and streamline orientation.
Monday, 10:15 AM | Porter, Room C118


Beyond End-of-term Course Evaluations: How Live Formative Feedback Drives Student Success
Relying on end-of-term course evaluations is critical for meeting accreditation standards and for teaching and learning improvement. However, many institutions notice that student engagement in the evaluation process decreases over time. This is where using live formative feedback to complement summative assessment can have a positive impact on student success. This session will cover how to develop an effective assessment strategy that increases student engagement by leveraging both course evaluations and live formative feedback. An innovative classroom tool, Bluepulse®, will be highlighted to show you how it can help you enhance the student learning experience, teaching effectiveness, and decision making with fact-based learning analytics.
Monday, 11:15 AM | Porter, Room C118


Do you have a Resilient Enterprise?
Manual processes, cross-team hand-offs, and siloed point solutions hinder security team’s abilities to efficiently respond to attacks or asses and remediate vulnerabilities. Linking security and IT together can help deliver more efficient security response, streamline remediation and clearly visualize security posture.
Monday, 11:15 AM | Porter, Room D250


AWS Next Generation Architecture: Lambda and EC2 Docker Container Service
Learn about next generation AWS tools. AWS Lambda lets you run code for virtually any type of application or backend service without provisioning or managing servers. Just upload your code and Lambda takes care of everything required to run and scale your code with high availability. You can set up your code to automatically trigger from other AWS services or call it directly from any web or mobile app. Amazon EC2 Container Service (ECS) is a highly scalable, high performance container management service that supports Docker containers and allows you to easily run applications on a managed cluster of Amazon EC2 instances. Amazon ECS eliminates the need for you to install, operate, and scale your own cluster management infrastructure.
Monday, 03:00 PM | Porter, Room C118


Dell: Emerging and Traditional Technology Snapshots
Traditional Technology – Dell and UC Berkeley's Ben Gross present UCB Client Standards and the UCOP adoption of end-user computing configurations designed to meet the various, unique user requirements at volume cost.

Emerging Technology – Dell and UCSC's George Peek and Josh Sonstroem discuss Dell’s Z9100 100Gb switch, powering the evolving Science DMZ and with implications for all Higher Education throughout the country.
Monday, 04:00 PM | Porter, D246