Owned and Organized By![]() |
![]() |
![]() |
![]() |
||||
Home | Agenda | Speakers | The 3rd Data Centre Summit 2013 |
Registration |
For printable agenda, please click here | ||||
Time | Agenda | |||
08:45 - 09:15 | Registration | |||
09:15 – 09:30 | Opening Remarks
Donald Mak |
|||
09:30 - 10:25 | Insights Panel 1: Emerging Trends in off-site data centres Adoption
Panel Chair Michael Mudd, Managing Partner, Asia Policy Partners LLC Executive Panelists Michael Leung, Chief Information & Operations Officer, China CITIC Bank International Jonathan Leung, Vice President, Head of Hosting Services, Hong Kong Exchanges and Clearing Carbo So, IT Operations and Transformation Manager, MTR Bradden Wondra, Chief Technology Officer, Growth Markets, Pearson |
|||
10:25 – 11:00 | Keynote 1: Cloud Computing and Big Data to support Service Innovations
Cloud computing is increasingly being adopted by large organisations as well as Small to medium size enterprises (SMEs) today. However, up to now, the use of the cloud by businesses tends to be almost entirely on IT services and software applications with a drive for cost savings, productivity enhancements and standardisation in control. In fact, at the forefront of cloud development, the cloud is increasingly unfolded as a disruptive force fuelling business innovations. This talk will highlight how to use the cloud and Big Data to support knowledge-intensive business activities. Challenges for the breeding the next generation of knowledge workers and organisations will also be outlined. |
|||
11:00 – 11:30 | Keynote 2: Return on Agility: Innovation Powered by the Cloud
Today, enterprises and government organizations are experiencing stifled innovation, not due to or lack of ideas – but instead lack of available resources, computing capacity and high CAPEX requirements. The elastic nature of Cloud Computing allows you to shift from owning infrastructure to renting infrastructure and allows you to experiment and innovate much more quickly at lower cost – both in a dollars and cents . Making your datacenter walls elastic and secure in a hybrid virtual private cloud environment, allows you to leverage the elastic capabilities of the cloud to drive innovation, scale and high availability, while still maintaining the security, access policies and networking topology you require to be compliant. |
|||
11:30 – 12:00 | Keynote 3: Software Defined Data Centers a reality with Web-scale Converged Infrastructure
Web-scale technologies, which are inherently software defined, were innovated by the world’s largest cloud and Internet companies to overcome the limitations of legacy datacenter architectures. However, keeping pace with rapidly changing IT demands and bringing web-scale technologies into the enterprise data center means meeting a diverse set of requirements. Datacenters must run business-critical applications according to their unique capacity and performance demands. In addition, the vast resources of public clouds offer an enormous opportunity to design modern hybrid clouds. Join us on a technical discussion on the building of a software defined datacenter using the ideal compute and storage infrastructure. We will explore the requirements for web-scale converged infrastructure to use as the foundation for your software defined datacenter environment. We will also discuss best practices and examples of running tier 1 databases and applications such as SQL Server and Exchange, applications and infrastructure servers, and virtual desktops on the 100% software-defined Nutanix Virtual Computing Platform. |
|||
12:00 – 12:20 | Morning Networking Coffee Break Sponsored by China Mobile International |
|||
12:20 – 12:50 | Keynote 4: Data Center Automation
In the Data Center, costs of downtime has skyrocketed and business SLAs has had to rise to keep pace. In another hand, tight resource constraints hold IT budgets and headcount flat. Data Center Automation is automating changes which occur predictably and frequently, which would otherwise have been done manually! In this talk, we will cover how to deploy your Data Center Cloud network in a flat, automated and centralised management method, in order to simplify DC operations and reduce errors or downtime. |
|||
12:50 – 14:00 | Lunch Break |
|||
14:00 – 14:45 | Insights Panel 2: Securing Data Centers Against Advanced Adversaries
Panel Chair Terence Tang, Partner, Enterprise Risk Services, Deloitte Executive Panelists Epsilon Ip, Enterprise Security Architect, Cathay Pacific Airways Francis Fung, CTO, Midland Realty Lewis Tam, Chief Information Security Officer, Ping An Insurance (Group) Company of China Paul Haswell, Partner, Pinsent Masons |
|||
14:45 – 15:15 | Keynote 6: The Impact of Data Sovereignty on Cloud Computing in Asia
In 2013 there was a seismic shift in the debate around the issue of data sovereignty, which has seen it emerge as a priority issue for legislators and policy makers all over the world. Governments that have led the region in setting precedence and regulatory frameworks around data sovereignty continue to be challenged by this issue. The new Asia Cloud Computing Association report, “The Impact of Data Sovereignty on Cloud Computing in Asia” shows data privacy, data protection and data security regulations do not cross borders as easily as data flows. The report offers recommendations to governments aspiring to take the greatest advantage of cloud computing to enhance economic opportunity and will serve as a resource for service providers doing business in the 14 economies examined. |
|||
15:15 – 15:30 | Afternoon Networking Coffee Break Sponsored by China Mobile International |
|||
15:30 – 16:00 | Closing Keynote: Controlling The Risk of Cloud, Internally And Externally Within Your Organization
The modern IT executive handles many relationships with internal users as well as external service provider. However handing your data center cloud services both internally and externally for your stakeholders does not absolve you of the multitude of security, privacy and operational risks. In fact, this may further complicate your risk profile. There is a need to control the risk even more tightly to ensure you don’t end up as another high-profile corporate horror story. |
|||
Agenda is subject to change without prior notice |
© 2014 Market Intelligence Group Limited All rights reserved |