Dell Technologies PowerStore Deep Dive with Chief Architect Dan Cummins

Event: Tech Field Day Presents Dell Technologies: Power Up the Portfolio

Appearance: Dell Technologies Presents PowerStore at Tech Field Day PowerUp

Company: Dell Technologies

Video Links:

Personnel: Dan Cummins, Jodey Hogeland

Dell Technologies PowerStore is a data-centric storage array with enhanced intelligence and extreme flexibility. In this session, Chief Architect Dan Cummins and Global Tech Evangelist Jodey Hogeland go deep into the PowerStore architecture and features with a panel of independent technologists during a special Tech Field Day event. They discuss the complete range of PowerStore X and PowerStore T models, from 32 to 112 CPU cores and 384 to 2560 GB of memory. They then dive into VMware integration with PowerStore X, running virtual machines at the edge. Next is a discussion of the scalability of the PowerStore 2-node appliance, including drive support and connectivity options. PowerStore can scale up and out, and the pair demonstrates integration and scalability in the session. Dan presents the PowerStore data engine, with data reduction, dynamic resiliency, programmability, and integration with containers. They finish with a discussion of data movement and the anytime upgrade program.


Dell Technologies Introduces PowerStore

Event: Tech Field Day Presents Dell Technologies: Power Up the Portfolio

Appearance: Dell Technologies Presents PowerStore at Tech Field Day PowerUp

Company: Dell Technologies

Video Links:

Personnel: Dan Cummins, Jodey Hogeland

In this session, Chief Architect Dan Cummins and Global Tech Evangelist Jodey Hogeland will review the technical aspects and advantages of PowerStore. PowerStore is a data-centric storage array with enhanced intelligence and extreme flexibility. Dan and Jodey will walk through these aspects from a technical perspective and detail information pertaining hardware specifications, data reduction and resiliency technologies, external and internalized intelligence, and industry changing deployment methods.


Travis Vigil and Caitlin Gordon Introduce the “Powered Up” Dell Technologies Storage and Data Protection Lineup

Event: Tech Field Day Presents Dell Technologies: Power Up the Portfolio

Appearance: Dell Technologies Executive Kickoff at Tech Field Day PowerUp

Company: Dell Technologies

Video Links:

Personnel: Caitlin Gordon, Stephen Foskett, Travis Vigil

Stephen Foskett hosts the introduction to our special Tech Field Day event, Power Up the Portfolio with Dell Technologies! This executive introduction features Travis Vigil, SVP responsible for Product Management and Portfolio planning for Dell EMC’s storage division, and Caitlin Gordon, VP responsible for marketing Dell Technologies’ storage and data protection portfolio.

Vigil and Gordon present the Dell Technologies storage and data protection lineup with special emphasis on key “powered up” products: PowerStore, PowerFlex, PowerScale, PowerProtect, and cloud storage. During this introduction, Vigil announces the new PowerFlex product line, announced for the first time at this special Field Day event. Following this introduction, Foskett presents some questions to set the stage for two days of presentations focused on these five product lines.


Meraki Health and Adaptive Policy

Event: Tech Field Day Virtual Cisco Live Experience

Appearance: Cisco Meraki Presents at Tech Field Day Virtual Cisco Live Experience

Company: Cisco

Video Links:

Personnel: Alex Burger, Jayanthi Srinivasan, Nikitha Shashidhar, Sunmeel Bhumkar

In this session, Meraki introduces incredible new innovations from rolling out simple, scalable policies with adaptive policy to network and application assurance all the way from the client to the applications


Cisco NCS-5700 Router Technical Overview

Event: Tech Field Day Virtual Cisco Live Experience

Appearance: Cisco Service Provider Presents at Tech Field Day Virtual Cisco Live Experience

Company: Cisco

Video Links:

Personnel: Vincent Ng

This session Introduces the new generation of two NCS-5700 Line Cards to the current NCS-5500 routing platform and the new Broadcom Jericho2 NPU is introduced with compatibility and native modes. You’ll see the newest capabilities with 400G optics, and the different combinations of optics speeds and breakout modes.


SecureX Cisco’s Security Platform

Event: Tech Field Day Virtual Cisco Live Experience

Appearance: Cisco Security Presents at Tech Field Day Virtual Cisco Live Experience

Company: Cisco

Video Links:

Personnel: Ben Greenbaum

Cisco has been building an integrated security architecture for years. Threat Response was the flagship portal into that integration. With SecureX, Cisco is taking it several steps further. In this session, you’ll see what that means for Cisco customers, how it will lead to greater operational effectiveness and improved situational awareness, and how the power of integration unlocks maximum value from the products you already have.


Cisco Wireless Technologies and Use Cases in Industrial IoT

Event: Tech Field Day Virtual Cisco Live Experience

Appearance: Cisco IoT Presents at Tech Field Day Virtual Cisco Live Experience

Company: Cisco

Video Links:

Personnel: Patrick Grossetete

This session dives into the many domain-specific wireless network technologies that are available and overviews the Cisco IoT Wireless portfolio and future evolution.


Networking Field Day Experience Roundtable: The Rise of Cloud

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Networking Field Day Roundtable at Aruba Atmosphere Digital

Company: HPE Aruba Networking

Video Links:

Personnel: Drew Conry-Murray, Jason N. Beshara, Jennifer Huber, Jennifer Minella, Jonathan Davis, Keith R. Parsons, Mitch Dickey, Nick Shoemaker, Tom Hollingsworth

Cloud is everywhere. It is leading the charge for digital transformation and changing the way we do business daily. But what does cloud offer for traditional infrastructure players? Is there room in the cloud for wireless or networking or even infrastructure security? Join Tom Hollingsworth and the Networking Field Day Experience delegates as they get their head out of the clouds and take a look at what it all means.


Networking Field Day Experience Roundtable: The New Edge

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Networking Field Day Roundtable at Aruba Atmosphere Digital

Company: HPE Aruba Networking

Video Links:

Personnel: Drew Conry-Murray, Jason N. Beshara, Jennifer Huber, Jennifer Minella, Jonathan Davis, Keith R. Parsons, Mitch Dickey, Nick Shoemaker, Tom Hollingsworth

The rise of Internet of Things (IoT) is driving digital transformation at a rapid pace. What role can the wireless edge play in this shift? What can traditional infrastructure vendors play in determining who the owners and facilitators of this new edge might be? Join the Networking Field Day Experience delegates and Tom Hollingsworth as they explore these ideas and try to find out what the new edge looks like.


Powering the Aruba Zero Trust Network

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Powering the Aruba Zero Trust Network

Company: HPE Aruba Networking

Video Links:

Personnel: Marc Ibanez, Samuel Perez, Viwesh Ananthakrishnan

Zero Trust is a hot topic with a wide variety of definitions and applications. Applying a Zero Trust approach to the network starts with user and device visibility combined with integrated identity-based access control. This session will showcase the integrated, end-to-end network-powered Zero Trust that is built into Aruba networks including ClearPass Device Insight (device discovery and profiling) and ClearPass Policy Manager (access control and segmentation).


Breaking Down Network Siloes with an Aruba Unified Infrastructure

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Breaking Down Network Siloes with an Aruba Unified Infrastructure

Company: HPE Aruba Networking

Video Links:

Personnel: Justin Noonan, Jyothi Sreekumar, Samuel Perez, Scott Calzia, Steve Brar, William Choe

Siloed management of WAN, wired, and wireless networks—orchestrated by standalone tools—creates IT complexity that often leads to downtime and user experience concerns.
It’s time to break down the silos. Tune in as Aruba shares its vision for a unified infrastructure that drives simplicity across campus, branch, re¬¬mote worker, and data center locations. Discover how IT can streamline deployments, strengthen security measures, and ensure the best user experience—all from a single pane of glass.


Aruba Using AIOps to Redefine IT Outcomes

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Using Aruba AIOps to Redefine IT Outcomes

Company: HPE Aruba Networking

Video Links:

Personnel: Jose Tellado, Jyothi Sreekumar, Patrick LaPorte, Rajesh Bhagwat, Sri Ventkiteswaran

Aruba AIOps allows network operations teams to react and resolve reported issues quickly, eliminate support tickets by predicting and preempting issues before they impact users or the business and exceed SLAs by continuously implementing optimization recommendations based on learnings from peers.


Juniper Encrypted Traffic Analysis Overview

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero

With encryption on the rise and challenges in decryption for both privacy and technical reasons, this presentation and demonstration show one of Juniper’s most recent product announcements for ETA, or Encrypted Traffic Analysis. Juniper is introducing the ability to detect malicious activity over encrypted traffic without the need for interception and decryption. We will describe Juniper’s approach and the technology that makes it all possible.


Juniper Demo Multicloud Connected Security

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Josh McKenzie

SRX-enforced security policies, enabling L4-L7 traffic inspection for known and unknown malware, are deployed across AWS and Azure using a single set of metadata tags to follow instances as they are created. After a threat is detected, effected hosts are automatically isolated from the rest of the network.


Juniper Multicloud Connected Security

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Josh McKenzie

Enterprises are increasingly shifting workloads to the cloud to take advantage of dynamic scaling and flexible deployment options. This also introduces new challenges for security administrators, especially when multiple cloud environments need to work together. Learn how we can leverage the metadata features across various cloud environments to describe workloads and extend security policies that adapt alongside your services no matter what cloud provider hosts them.


Juniper AI for a Threat Aware Network

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero

Enterprises have to strike a delicate balance between business agility and security which can often be seen at odds with one another. By leveraging machine learning data driven improvements can be made by providing more efficient and effective security models. Combining signals from both the network and security infrastructure you already have in place, you can start to not only automate the detection but also the defense against malicious activity. You need context to accurately determine the full severity of an event before you can start remediating the threat. By correlating multiple events into high fidelity signals we can more accurately confirm what devices have been compromised and effectively use automation to remediate, reducing your risk and shorten time to resolution.


Juniper Connected Security Overview

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Oliver Schuermann

Join Oliver Schuermann as he gives a brief overview of the Juniper Connected Security strategy, which allows customers to take advantage of their Juniper infrastructure, as well as other components to create a Threat Aware Network. Juniper Connected Security is about Safeguarding Users, Applications, and Infrastructure by extending security to all points of connection across the network. Security, or classic perimeter-based security, is now converging with the network.


Tempered Cloud, Virtualization, Containers, and APIs

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Thomas Kee

In this video, Thomas will cover the finer details of virtualization, cloud, containers, and APIs for Tempered. He’s been driving the engagement with cloud applications and marketplaces.


Tempered Host Identity Protocol (HIP): Identities and Trust and Achieving Zero Trust Security

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Ludwin Fuchs

In this video, Ludwin Fuchs, the authority on Host Identity Protocol (HIP) will cover identities, trust, the networking data plane, and intelligent multi-homing


What Is Tempered Airwall?

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Bryan Skene

In this session we will discuss lessons learned in the trenches, what is the Tempered Airwall Solution for Zero Trust Network Access, have an overview of our platform, and short demos.