IRL

In Real Life – Our Blog, Published Articles And Conference Sessions 

We believe that we must constantly be sharing with others and learning from them in order to carry forward the best ideas.  We have committed to sharing our insight, design, development and support experience via articles, blogging, webcasts and in person conferences every year and we are always happy to discuss contributing to a community event regardless of where it is in the world.

Gabriella’s technical presentations from events in the past 5 years are available on slideshare here.

For our latest news on business trends and technologies visit our blog at https://turtleblog.info

Our next Conference Session is at Engage User Group in Antwerp 8-9 May 2017.  Register for free here

Adm04. Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud May 8 11.45

Are you looking at Cloud options and wondering how and if you can get there from where you are? If you have Domino on premises and are considering Cloud then a good option is a hybrid architecture which maintains all your on premises configuration managed by your own administrators but adds Cloud client access managed by IBM. We will look at how simple it is to create this hybrid solution using Domino passthru servers and review how things like user and directory maintenance, client access and mail routing will then work. From Domino Admin to Domino Hybrid Admin in a few simple steps.

Eme02. Embracing IoT in the Enterprise and Blocking the Top 10 Risks – May 9 10am

Enabling Internet of Things (IoT) so your employees and your customers can have a simplified experience with new services and products sounds exciting. In this session, we will dig into the top ten risks that come with the IoT experience. Due to the rapidly evolving nature of IoT and associated threats, there are risks in allowing access to your enterprise resources. Custom firmware, embedded operating systems and wi-fi connectivity of IoT devices offer many possible areas for exploits and misuse. Come explore current security offerings and get a first look at best practices. Walk away with an immediate checklist to benefit your enterprise as it deploys and offers IoT access.