Blog iconBlog

Carolina Advanced Digital, Inc. > Blog > IT Hot Topics

IT Hot Topics Conference 2016 moves to RTP with new format and venue

Carolina Advanced Digital announces its annual conference will move from Greensboro, North Carolina to the Raleigh-Durham area for 2016, sporting a new venue and format. “The changes made for 2016 are the result of collective attendee and sponsor feedback,” says Susan Jabbusch, VP of Carolina Advanced Digital.


Read More
email email email email email email email
profile iconPosted by Jennifer Minella

Federal Cybersecurity Coordinator Howard Schmidt Guides Industry Professionals

At this year’s IT Hot Topics Conference, there will be two keynote speakers. STEM advocate Dr. Uma Gupta will speak on Wednesday, May 6th, and the other, Howard Schmidt will speak on Thursday, May 7th.  With positions held such as Special Assistant to the Bush and Obama Administrations and Cybersecurity Coordinator for the federal government, it is no surprise that Howard Schmidt is known to be a top information security expert. Mr. Schmidt, serves as a partner in the strategic advisory firm, Ridge-Schmidt Cyber, an executive services firm that supports business and government leaders in the navigation of cybersecurity challenges. At Ridge-Schmidt, Mr. Schmidt partners up with Tom Ridge, the first secretary of the Department of Homeland Security. He also serves as executive director of The Software Assurance Forum for Excellence in Code (SAFECode). Mr. Schmidt brings together talents in business, defense, intelligence, law enforcement, privacy, academia and international relations. He also served in the military and law enforcement for over 26 years. Beginning active duty with the Air Force, he later joined the Arizona Air National Guard. He has also had a dynamic career in the private industry and professional organizations. Mr. Schmidt has testified before congressional committees on computer security and has been featured on television and radio shows including, BBC, ABC, CNN, CNBC, Fox TV as an expert resource about cyber-security, investigations and technology. He is a co-author of The Black Book on Corporate Security and author of Patrolling CyberSpace, Lessons Learned from a Lifetime in Data Security. Howard is a Ham Radio operator (W7HAS), a private pilot, outdoorsman and an avid Harley-Davidson rider. The 2015 IT...
Read More
email email email email email email
profile iconPosted by cadinc

Learn More About Security Solutions from Gold Sponsor Dell SonicWALL at IT Hot Topics Conference

Some of the most dynamic security solutions in the industry today are offered by Dell SonicWALL. Dell SonicWALL specializes in a range of hardware and applications including network firewalls/UTMs (Unified Threat Management), Secure Remote Access (SSL-VPN), email security, backup and recovery, and management and reporting for businesses of all sizes. Dell SonicWALL’s Next-Generation Firewalls and Unified Threat Management (UTM) Firewalls are some of the best in the industry. Due to the constant potential for security threats, organizations need to deploy more all-inclusive, robust security solutions. Dell SonicWALL solutions are available for small and mid-sized business customers through large enterprise customers. They are perfect for large campus environments, enterprise settings, government, and healthcare facilities. In addition to firewall capabilities, UTMs also provides additional security services such as gateway antivirus and anti-malware detection, intrusion prevention, geo-IP filtering, content filtering, and application control. The Global Management System allows network administrators to manage and provision security appliances across an extensive network. Attendees can give Dell SonicWALL’s UTM a whirl via the IT Hot Topics Conference live demo network, an enterprise-grade infrastructure that provides access and services throughout the conference. Dell SonicWALL’s presence at IT Hot Topics Conference will be valuable to network administrators and information officers who want to learn more about using its security solutions. Dell SonicWALL’s solutions will also be showcased in the vendor expo at the conference in Greensboro, NC. To register for IT Hot Topics Conference, visit www.hottopicsconference.com. Questions about Bradford Networks or conference events, contact Meghan Balfrey, Marketing & Communications Manager at...
Read More
email email email email email email
profile iconPosted by cadinc

Upgrade Your Wireless in 16 Hours

Wireless technologies are everywhere. With the growing popularity of wireless, we’re seeing more and more places businesses, schools, government offices, retail stores, and transportation systems like air planes and trains–that are fully loaded with wireless. And yes, WiFi is even available in new cars! (And you thought texting and driving was a bad idea.) Wireless technologies are springing up everywhere with more robust speeds and features than ever before. So, what’s the big deal? With the advent of these WiFi-reliant systems weaving through our world, the need for experienced professionals to manage them is growing exponentially. Sadly, our industry has failed in helping our technologists evolve through the changes from telecomm to wired networking and now to wireless. While some of the fundamental technologies are shared across these communication standards, the reality is WiFi demands a set of tools and skills a professional can’t acquire without investing specific attention to learning them. The good news is, there’s a path to getting the skills needed to properly plan, deploy, manage, and secure wireless networks, and that path is accessible and affordable to technology professionals across the world. Started in 1999, CWNP (Certified Wireless Network Professional) is the industry leader for vendor neutral Wi-Fi certification and training. Carolina Advanced Digital, Inc. standardizes on CWNP certifications for its engineering and professional services team. The CWTS (Certified Wireless Technology Specialists) is the entry-level certification provided by CWNP and for many it’s the best first step in understanding the technical nuances of wireless. The CWTS certification is perfect for technologists entering the wireless field and for wired network administrators now finding themselves supporting a...
Read More
email email email email email email
profile iconPosted by cadinc

Company Update: IT Hot Topics Conference Technology and Security Trainings Announced

The dates have been announced for Carolina Advanced Digital’s IT Hot Topics Conference 2015, hosted at the Grandover Resort in Greensboro, NC. This year’s conference events commemorate Carolina Advanced Digital’s 30th year in business with new features including two days of certification trainings, a full two-day main conference event, the IT Hot Topics Golf Tournament, and a special Big 30th Year Anniversary Bash. New for 2015, two days of onsite certification training for attendees are available Monday-Tuesday, May 4th-5th. Trainings at the IT Hot Topics Conference offer a great value with affordable travel costs and deeply discounted rates, and options for taking certification tests onsite will be offered at no additional cost. Planned trainings feature classes from industry-leading partners such as CWNA for wireless technologies and (ISC)2 for information security. Training attendees will receive a free pass to attend the IT Hot Topics Conference, and will be recognized at the conference for completion of the courses. The main activities of IT Hot Topics Conference, one of the most prestigious security events in the area, will kick off two full days of keynotes and breakout sessions on Wednesday morning. An event that started as a technical user group, IT Hot Topics Conference has blossomed into an annual event with internationally-recognized speakers and top notch technical sessions. Attendees participate in the conference as part as Carolina Advanced Digital’s InfoSec Community Outreach Program. Through this program, industry professionals are given opportunities for networking and professional development. Topics for 2015 include mobile security, BYOD, virtualization and cloud, network security, management best practices, security policy and audit, application management and much more. In years...
Read More
email email email email email email
profile iconPosted by cadinc