MassTLC’s Tech & Innovation Conference:

September 18, 2019

11:00am-6:00pm

Design Center, 19 Drydock Avenue, Boston

Audience:

Senior engineering executives, developers, architects, managers, and product professionals

Description:

With new and more sophisticated technologies being developed at such a fast pace, developers, architects, product managers, security professionals, and others in the tech industry must parse out the most effective tools, methods, processes, and team building strategies to be successful.

This one-day, hands-on event, will provide a both a glimpse into the future as well as tools and techniques for the here and now to utilize next gen networks, advanced methods in machine learning and AI, optimizing hybrid/cloud, and gleaning ROI as companies make investments and adopt programs.

Speakers:

Pete Buonora
Enterprise Solutions Architect
AWS

Katie Chase
SVP
Fidelity Center for Applied Technology

Anusha Dharmalingam
Enterprise Solutions Architect
AWS

Parth Gargava
Senior Software Engineer
Fidelity

Joshua Ness
Senior Manager
Verizon 5G Labs

Sandeep Parikh
Cloud Native
Google Cloud

Andre Sharon
ED
Fraunhofer USA CMI at Boston University

Bryan Stiekes
Technical Director
Google Cloud

Slater Victoroff
CTO
Indico

Agenda:

11:00 – 11:30     Registration, lunch, networking 

11:30 – 12:00     Opening Keynote: Bryan Stiekes, Technical Director, Google Cloud, Google
As developers and inventors we’re presented with an array of capabilities we’ve never had access to before. Cloud computing, easily accessible data-analytics systems, and pre-baked machine learning APIs offer incredible technical opportunity, yet we’re faced with the challenges of introducing disruptive solutions into organizations which are sensitive to change. This talk with explore how Google drives innovation, deals with change, and Bryan will share insights from his career on how to successfully drive change within an organization.

12:00 – 12:45    Modern Day Application Development: Google Cloud: Sandeep Parikh, Cloud Native Advocate, Google Cloud
How can you leverage new technologies like serverless apps without losing operational visibility and access to your existing applications? That’s where Cloud Run comes in. Cloud Run is a managed platform that brings serverless deployment and execution to containers. Cloud Run is based on Knative, an open source effort that enables you to run your stateless apps or functions in any Kubernetes cluster. In this session, we’ll walk through Cloud Run and how it can be used to run modern applications, and how it’s portable to any Kubernetes environment.

12:50-1:45         Accuracy and Ethics in AI Workshop: Slater Victoroff, Indico
Over the past decade AI has continued its steady march of progress. Near-human accuracy has been achieved on a wide variety of tasks from object recognition to natural language understanding, to machine translation. However, these advances have not come without cost. As organizations continue to adopt AI at ever-accelerating rates we can either learn from history or condemn ourselves to repeat it. In this session we’ll explore exactly why even the most technically advanced organizations on the planet struggle with these issues. In a set of short lectures and hands-on exercises you’ll learn to use a basic set of tools that can help to pre-emptively identify and avoid these and other ethical concerns. Topics covered include proper experimental setup, appropriate benchmarking, human-in-the-loop processes, and encoded biases.

1:45 – 2:00         Networking Break 

2:00 – 2:30        5G and the Impending Technology Revolution: How Connectivity Will Reshape Hardware, Software, and Everything in Between: Joshua Ness, Senior Manager, Verizon 5G Labs
5G is rumored to be a golden solution, the bringer of a “killer app” that will change the way we collectively live, work, and play. But how will this new connectivity standard really impact important advancements across business and consumer industries? In this interactive workshop, you’ll learn what you can expect from 5G in the near-to-mid future and how you can start preparing for it now. You will also participate in a group setting to see firsthand how 5G will impact various layers of front-end and back-end innovations, as well as how business can help their own customers rise to meet the challenges ahead.

2:35 – 3:35        World Class Technology Development: Dr. Andre Sharon, ED, Fraunhofer USA CMI at Boston University
In this talk, Prof. Sharon will present the activities of Fraunhofer USA CMI, including examples of innovative automation systems developed and deployed in industry. He will also conduct a hands-on exercise on the financial justification required for “Management” to approve an automation investment, so that a “cool” idea doesn’t just die in the Lab.

3:35 – 3:55         Networking Break

3:55 – 4:55         Blockchain: Using today’s tech to impact tomorrow’s success: Katie Chase, SVP, Fidelity Center for Applied Technology and Parth Gargava, Senior Software Engineer, Fidelity
Zero knowledge proofs are the highest level privacy scheme for information sharing. Zero knowledge proofs allow data to be verified without revealing sensitive information to multiple parties using advanced cryptography. These methods have the potential to revolutionize the way data is collected, used and transacted with. Parth will be explaining how ZK SNARKS (a form of Zero Knowledge proofs) work with a use case for identifying accredited investors.

5:00 – 6:00          Cloud Optimization Workshop: Anusha Dharmalingam, Enterprise Solutions Architect, AWS and Pete Buonora, Enterprise Solutions Architect, AWS
Security in the cloud is much like security in your on-premises data centers, except with more visibility and ability to automate tools and processes. This allows customers to both move more quickly and stay secure.

This AWS workshop is designed to teach users learn how to identify and remediate threats in their environment. The workshop will begin with a review of AWS Security tools followed by a scenario-based break-out discussion where the audience will form teams and define how they would detect security threats and plan automated responses. We will wrap the session with presentation from teams on their potential threat detection and response solutions.

 

Platinum Sponsors

Gold Sponsors