Why Attend IT/Dev Connections?
- 130+ deep dive sessions built to directly address your everyday pain points
- Expert led training on the hottest topics and trends in IT
- Network with fellow Developers, DevOps and IT Pros during our various networking events
- The most knowledgeable and sought-after speakers in the industry & more
REAL-WORLD TRAINING ON TOPICS THAT MATTER MOST
We have 4 conference tracks covering all the technologies and platforms you use:
DEVELOPER PLATFORM CONFERENCE TRACK
Our Developer Platform conference track continues to be one of the most popular tracks at IT/Dev Connections. The developer track covers a mix of the latest and greatest development technologies, tools, and frameworks - and sessions are designed to help you stay on top of the latest trends in coding.
DATA PLATFORM CONFERENCE TRACK
Data is the cornerstone of today’s technologies. Our Data Platform conference track delivers deep-dives into approaches to today’s challenges and provides insights into the trends that will be business differentiators in coming years. Learn how to scale, manage, secure, and monitor database resources to ensure data integrity, business functionality, and accessibility from anywhere.
CLOUD PLATFORM CONFERENCE TRACK
< SPONSORED BY DATTO-BACKUPIFY >
The Cloud Platform conference track provides you with insights into the skills and tools needed to manage a hybrid cloud infrastructure. Our speakers understand the importance of threading cloud technologies into the existing infrastructure to ensure a reliable, and scalable platform that meets current and future needs.
SECURITY PLATFORM CONFERENCE TRACK
While security threads throughout all IT/Dev Connections sessions, the Security Platform conference track focuses on the methods and technologies available to better secure operations against intrusions and attacks. We highlight the security topics that are most important to hybrid infrastructures, allowing security engineers to go deeper, and general administrators to develop a more well-rounded understanding of security strategies.