BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:2026uentechsummit
X-WR-CALDESC:Event Calendar
METHOD:PUBLISH
CALSCALE:GREGORIAN
PRODID:-//Sched.com 2026 UEN Tech Summit//EN
X-WR-TIMEZONE:UTC
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T143000Z
DTEND:20260610T153000Z
SUMMARY:Breakfast
DESCRIPTION:Food
CATEGORIES:FOOD
LOCATION:Commons Area\, Brighton High School
SEQUENCE:0
UID:8aacbaeb2bf00c0534a2c10dbc96ea23
URL:http://2026uentechsummit.sched.com/event/8aacbaeb2bf00c0534a2c10dbc96ea23
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T143000Z
DTEND:20260610T163000Z
SUMMARY:Registration
DESCRIPTION:Registration
CATEGORIES:REGISTRATION
LOCATION:Commons Area\, Brighton High School
SEQUENCE:0
UID:7ff9f3424d50c553b90a50d17bcd20d7
URL:http://2026uentechsummit.sched.com/event/7ff9f3424d50c553b90a50d17bcd20d7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T164000Z
DTEND:20260610T170000Z
SUMMARY:UETN Update
DESCRIPTION:General Session
CATEGORIES:OPENING SESSION
LOCATION:Auditorium\, Brighton High School
SEQUENCE:0
UID:f53e3e1f4413a387e4478b5198621e39
URL:http://2026uentechsummit.sched.com/event/f53e3e1f4413a387e4478b5198621e39
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T172000Z
DTEND:20260610T175000Z
SUMMARY:USBE - State of Ed Tech Update
DESCRIPTION:\n\n
CATEGORIES:OPENING SESSION
LOCATION:Auditorium\, Brighton High School
SEQUENCE:0
UID:9f35def38f83f56eabafcec4be3b5bf7
URL:http://2026uentechsummit.sched.com/event/9f35def38f83f56eabafcec4be3b5bf7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T175000Z
DTEND:20260610T185000Z
SUMMARY:Agent Strangelove: Or How I Learned to Stop Worrying and Love AI
DESCRIPTION:AI can trigger two very real fears: losing control if we adopt it\, or losing relevance if we do not. As AI shifts from a passive assistant to an active agent\, leaders and professionals are asking: Will this replace me? Is my organization falling behind? How do we embrace AI without creating security risks? In this keynote\, attendees will gain a practical understanding of how agentic systems work and the role humans will play in this new world. Instead of viewing AI as something to outrun or resist\, they will learn how to work with it strategically so they can stay relevant\, increase their impact\, and lead the transformation in their organizations.
CATEGORIES:KEYNOTE
LOCATION:Auditorium\, Brighton High School
SEQUENCE:0
UID:7e36c6530503c10a3705b74981f30d41
URL:http://2026uentechsummit.sched.com/event/7e36c6530503c10a3705b74981f30d41
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T190000Z
DTEND:20260610T200000Z
SUMMARY:Lunch
DESCRIPTION:Food
CATEGORIES:FOOD
LOCATION:Commons Area\, Brighton High School
SEQUENCE:0
UID:236352bdffaa4db0e07a809cce7a42df
URL:http://2026uentechsummit.sched.com/event/236352bdffaa4db0e07a809cce7a42df
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:AI: The Kitchen Table Talks
DESCRIPTION:"The Kitchen Table Talks" is an open conversation about navigating the AI landscape with our families and students. We’ll move beyond technical "how-to" and dive into the heart of responsible AI use\, focusing on ethics\, privacy\, and critical thinking. This session is a collaborative exchange of ideas\, offering practical strategies to foster a "human-in-the-loop" mindset. Join us to discuss how we can guide our digital natives to lead with integrity.\n
CATEGORIES:ARTIFICIAL INTELLIGENCE (AI)
LOCATION:Room 1414\, Brighton High School
SEQUENCE:0
UID:e86c61ddbad68ae903f9a1053572fb76
URL:http://2026uentechsummit.sched.com/event/e86c61ddbad68ae903f9a1053572fb76
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:District-Wide AI Transparency in One Connected Platform
DESCRIPTION:Discover how Securly's AI Transparency Solution gives districts centralized visibility into student AI activity across all platforms. Learn to move beyond blanket bans with smart guardrails\, connect AI insights with safety monitoring\, and use real data to guide responsible AI use and digital citizenship policies.\n\nAI tools are showing up across classrooms faster than most districts can track or govern them. From writing assistants to image generators and chatbots\, students and teachers are using dozens of platforms every day\, often with little visibility into how those tools are being accessed or used. In this exhibit hall session\, we’ll walk through how Securly’s AI Transparency Solution\, built directly into SafetyOS\, gives schools a clear\, centralized view of AI activity across all tools students use\, not just one platform. You’ll see how AI visibility connects with web filtering\, student safety monitoring\, and classroom workflows to create smarter guardrails instead of blanket bans. We’ll share real examples of how districts are using this connected approach to spot trends\, address risk early\, guide responsible AI use\, and support innovation without losing oversight. Objectives/Takeaways Participants will learn how to: Gain district-wide visibility into student AI usage across multiple tools\; move from blocking AI to setting smart\, responsible guardrails\; connect AI insights with student safety and web activity for better context\; use data to guide digital citizenship and AI policies in real classrooms.
CATEGORIES:EXHIBITOR
LOCATION:Room 1513\, Brighton High School
SEQUENCE:0
UID:f00c5643d807641ecd08c230e3a5c939
URL:http://2026uentechsummit.sched.com/event/f00c5643d807641ecd08c230e3a5c939
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:Data Room Best Practices
DESCRIPTION:We will include a fiber installation demo\, including scoping and cleaning. We will also show options to organize cable runs and clean up equipment racks.We plan to have an equipment rack on-site to show best practices\, and also some options on cleaning kits with information on where they can be purchased.
CATEGORIES:GENERAL
LOCATION:Room 1410\, Brighton High School
SEQUENCE:0
UID:b2c6217c79eeb7966382d9d3bd7ad731
URL:http://2026uentechsummit.sched.com/event/b2c6217c79eeb7966382d9d3bd7ad731
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:POST Together: An Introduction to Web App Auditing
DESCRIPTION:If you've ever wanted a better understanding of how you can safely and lightly audit the EdTech apps in use in your schools\, this session's for you. Jeremy Zabriskie from the Student Data Privacy team at USBE will teach you the basics of webapp analysis. This session won't require any existing technical knowledge\, but it is intended primarily for IT and technology folks. For part of a demo\, you may follow along on your own device\, but it isn't required.In this session\, we will learn about the basics of webapp analysis and see a demo of how to do a light audit. You can follow along on your own device if you'd like\, but there is no requirement to do so.
CATEGORIES:GENERAL
LOCATION:Room 1220\, Brighton High School
SEQUENCE:0
UID:42ebb61c37b68d5835875ebfd3cf95dd
URL:http://2026uentechsummit.sched.com/event/42ebb61c37b68d5835875ebfd3cf95dd
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:Being a Solution Partner in Your LEA
DESCRIPTION:How IT leaders can become influential in helping schools\, departments\, and LEAs improve their technology processes.\n
CATEGORIES:LEADERSHIP
LOCATION:Room 1404\, Brighton High School
SEQUENCE:0
UID:5cd3974b187ccf0cf2a9e02878917cb1
URL:http://2026uentechsummit.sched.com/event/5cd3974b187ccf0cf2a9e02878917cb1
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:Security for Mac Admins
DESCRIPTION:macOS ships with a powerful set of built-in security tools — but many admins never go beyond the basics. This session dives into macOS's built-in security utilities often overlooked by admins\, giving you the practical knowledge to better protect the Macs in your organization. Learn how to leverage native macOS tools to diagnose security issues\, audit system configurations\, manage security settings\, and automate security-related tasks.
CATEGORIES:SECURITY
LOCATION:Room 1412\, Brighton High School
SEQUENCE:0
UID:172e8f8d01ddc86196f212fc1249e290
URL:http://2026uentechsummit.sched.com/event/172e8f8d01ddc86196f212fc1249e290
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:Beginning Bash Scripting
DESCRIPTION:Bash scripting leverages the power of the command line and tight integration with Linux and Unix operating systems\, so it's the easiest and best way to automate repetitive administration tasks (giving you the time to focus on more important issues)."Magic" is when all you have to do is say a few words and amazing things happen! Bash scripting lets you give Linux and Unix operating systems the ability to take care of themselves (by automating frequent tasks and responding to situations). The key to this is being able to have your scripts make decisions (logic programming). In this presentation\, you will begin to learn how to write and run Bash scripts (programs that are interpreted rather than compiled) including loops and logic statements\, file redirection\, command line arguments\, and much more. It's important that you be able to continue doing these things on your own (after the conference)\, so comprehensive instructions and reference materials will be provided.
CATEGORIES:SYSTEM ADMIN
LOCATION:Room 1408\, Brighton High School
SEQUENCE:0
UID:724a99e595b20df0ab03bd49d3e80393
URL:http://2026uentechsummit.sched.com/event/724a99e595b20df0ab03bd49d3e80393
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:Backbone Visibility And You
DESCRIPTION:In this presentation\, we'll go over the current tools for viewing our statewide\, 400G backbone network. This covers Weathermap (including the timeline feature and custom map generation)\, Telly (district dashboards\, device details\, and network performance monitoring panels)\, and if available our new Looking Glass interface.
CATEGORIES:TOOLS
LOCATION:Room 1218\, Brighton High School
SEQUENCE:0
UID:51ec40f0e43884e4ca25e8a579185dee
URL:http://2026uentechsummit.sched.com/event/51ec40f0e43884e4ca25e8a579185dee
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:Building Self-Healing Networks: A Collaboration Between Network Engineers and Software Engineers
DESCRIPTION:This session explores how network engineers and software engineers collaborate to build self-healing networks. It highlights how operational knowledge\, automation frameworks\, and AI-driven monitoring systems combine to create resilient infrastructures that can detect\, diagnose\, and resolve faults with minimal human intervention.\nModern digital infrastructure is evolving at a pace that demands new approaches to reliability and resilience. One of the most significant developments is the rise of self-healing networks. These systems are designed to automatically detect faults\, diagnose failures\, and initiate corrective actions with minimal human intervention. Although automation frameworks and artificial intelligence play important roles\, their success depends on the operational expertise of network engineers. This session examines how collaboration between network engineers and software engineers drives the development of intelligent and resilient network systems. Software engineers build the automation frameworks\, telemetry pipelines\, and machine learning models that support large-scale observability and automated decision making. Network engineers contribute the domain knowledge that defines failure signatures\, operational thresholds\, and effective remediation strategies. Together\, these disciplines create the foundation for self-healing infrastructure. The presentation begins by exploring the operational roots of network reliability. For decades\, network engineers have produced root cause analyses\, troubleshooting guides\, and operational playbooks that document how networks behave during faults\, congestion events\, and configuration errors. These records contain the practical knowledge that has long guided incident recovery. When this expertise is translated into machine-readable logic\, it becomes the basis for automated detection and remediation. Participants will examine real scenarios where operational insight enhances automated responses. A monitoring system may detect abnormal CPU utilization or routing instability\, but it is the contextual understanding of experienced engineers that determines the appropriate corrective action. By embedding this knowledge into automation systems\, organizations can shift from reactive monitoring to intelligent and adaptive recovery processes. The session also considers how the role of the network engineer is changing in an era shaped by automation and artificial intelligence. Automation does not replace engineers. Instead\, it amplifies their influence. Engineers who understand telemetry systems\, automation tools\, and infrastructure programmability can directly shape the design of self-optimizing networks. Their operational judgment becomes encoded into systems that scale far beyond what manual processes can achieve. By the end of the session\, participants will gain a deeper understanding of how human expertise and automation work together to strengthen digital infrastructure. The central message is clear. Self-healing networks are not created by software alone. They emerge through collaboration\, operational insight\, and the shared knowledge of the engineers who design and operate the networks that power modern society.
CATEGORIES:VENDOR
LOCATION:Room 1214\, Brighton High School
SEQUENCE:0
UID:08d9b3fbb7ff3a620fae0c4172527402
URL:http://2026uentechsummit.sched.com/event/08d9b3fbb7ff3a620fae0c4172527402
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T201500Z
DTEND:20260610T211500Z
SUMMARY:Wi-Fi and Network Metrics on a School Budget
DESCRIPTION:How do you quickly prove it's not the Wi-Fi when the immediate response is to blame the Wi-Fi? I'm going to share some practical\, cheap\, or free tools to help you dial into the actual problem quickly\, and why Speedtest may not be the best metric for testing your network.Tools like Speedtest.net have become the de facto standard that our end users know to use to test when the network is working. This actually can be detrimental and unhelpful as a metric. New tools like the WLANPI and Orb.net are providing very cost-effective tools for determining how a network is performing without having to purchase expensive overlay networks. Tools that can be installed directly on an end-user device to get real-time performance metrics.
CATEGORIES:WIRELESS
LOCATION:Room 1216\, Brighton High School
SEQUENCE:0
UID:d599435b116776e6274fa9bde9fad378
URL:http://2026uentechsummit.sched.com/event/d599435b116776e6274fa9bde9fad378
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:From Handwriting to Insight: How a K-12 School Built Its Own AI Analytics Platform
DESCRIPTION:Monticello Academy built a custom AI platform that scans handwritten student work\, runs it through an OCR/LLM pipeline\, and surfaces instructional insights for teachers — on a school budget. This is the real story: architecture decisions\, FERPA compliance\, what worked\, and what we'd do differently.\n\nWhat happens when a small K-12 school decides to build its own AI-powered student work analytics platform rather than wait for a vendor to solve the problem? This session tells that story from the ground up. Attendees will walk through how Monticello Academy architected StudentQuill — a cloud-native platform that captures handwritten student assignments via scanning\, processes them through an OCR and multimodal AI pipeline\, and delivers structured insights directly to teachers. We'll cover the full decision stack: why we chose Google Cloud Platform\, how we evaluated OCR technologies for handwritten work\, how we engineered prompts for rubric-aligned AI analysis\, and how we designed the system to be fully FERPA-compliant from day one. Crucially\, this is not a vendor pitch — it's a practitioner case study. Presenters will share the real architecture\, real costs\, real trade-offs\, and real teacher feedback. We'll discuss what surprised us\, where we hit walls\, and the practical lessons any district or school can apply\, whether they're building\, buying\, or evaluating AI tools for instructional use. Attendees will leave with a replicable architectural framework\, a vendor evaluation rubric for OCR/AI tools\, and a clear picture of what it actually takes to put AI to work for teachers — not just in theory\, but in a live school environment.\n
CATEGORIES:ARTIFICIAL INTELLIGENCE (AI)
LOCATION:Room 1414\, Brighton High School
SEQUENCE:0
UID:03a906deda871be49545f376e0a569b6
URL:http://2026uentechsummit.sched.com/event/03a906deda871be49545f376e0a569b6
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:Esports Facilities and Cyber Learning Labs: Transforming Education Through AV
DESCRIPTION:Explore how esports facilities and cyber learning labs leverage advanced AV technologies to create engaging\, high‑performance learning environments. Dive into AV design fundamentals\, AV over IP workflows\, considerations for these collaborative spaces\, and strategies for creating scalable\, future-ready systems that support seamless interaction and evolving instructional requirements.\n\nWith the rapid growth of esports and cyber education programs\, effective audiovisual system integration is paramount in creating engaging and interactive environments. In this session\, we will explore the fundamentals of AV system design\, implementation\, and the range of AV technologies utilized in these modern hubs. We will spotlight approaches that optimize system integration to ensure seamless interactions and active learning experiences in these spaces. Discover how AV over IP enhances and streamlines signal routing\, cable management\, control systems\, and network infrastructure. Attendees will also gain insights into the importance of annotation and touchscreen interaction\, plus the crucial role that collaborative spaces play for post-game reviews\, coaching\, group discussions\, and complementary activities. Lastly\, we’ll explore strategies for designing future-ready systems that can scale and adapt to evolving requirements and emerging technologies.
CATEGORIES:EXHIBITOR
LOCATION:Room 1513\, Brighton High School
SEQUENCE:0
UID:2b4a356999fc1a80495580d40131e752
URL:http://2026uentechsummit.sched.com/event/2b4a356999fc1a80495580d40131e752
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:'Halving' It All: Troubleshoot Any Tech Issue with the Split-Half Method
DESCRIPTION:Discover how to solve almost any technical issues correctly the first time using the split-half method. Hear relatable anecdotes from the tech trenches\, and explore practical strategies to stop guessing and start fixing 'glitches' efficiently.Have you ever faced a classroom technology issue and had no idea where to start? In this classroom-style session\, we will learn how to translate a user's vague “glitch” into a tangible issue with an actionable solution by using the split-half troubleshooting method. This highly efficient\, logical approach is used by IT professionals to isolate and resolve problems by systematically eliminating half of the potential causes at a time. Using relatable and sometimes humorous anecdotes from the tech trenches\, you will learn how to apply this binary search logic to everyday classroom tech issues\, transforming tech-induced panic into calm\, methodical problem-solving
CATEGORIES:GENERAL
LOCATION:Room 1410\, Brighton High School
SEQUENCE:0
UID:dd901c4e6a7257bddf375d3f6a5fac34
URL:http://2026uentechsummit.sched.com/event/dd901c4e6a7257bddf375d3f6a5fac34
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:Evolving Technologies in UEN’s Instructional Video Collaboration Environment
DESCRIPTION:The "Instructional Video Collaboration" (IVC) landscape is changing\, and UEN is expanding our approach and partnerships\, allowing us to be more innovative and agile as technologies evolve. This presentation examines the evolution of the unified K20 Zoom License Agreement\, reflecting on lessons learned in the past year\, why this shift is critical for our current educational landscape\, and how we are leveraging this agreement for the future.UEN’s IVC team will talk about the shifting landscape of video collaboration technologies\, lessons learned in the first year of the K20 Zoom Agreement\, and the UEN commitment to ongoing innovation and support of these technologies. The team will also share early results and lessons learned from a STEM classroom pilot program using video collaboration equipment new to UEN’s IVC environment. Zoom-capable hardware will be on display. We will discuss and demonstrate how new features\, AI innovations\, and enhanced capabilities can be used in remote learning to support classroom collaboration.
CATEGORIES:GENERAL
LOCATION:Room 1220\, Brighton High School
SEQUENCE:0
UID:398fb795753d990d7c5fb09227bac763
URL:http://2026uentechsummit.sched.com/event/398fb795753d990d7c5fb09227bac763
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:Click\, Agree\, Comply: Surviving EdTech Adoption in the Age of H.B. 55
DESCRIPTION:“Free” classroom apps and quick approvals now carry real legal and cybersecurity consequences. This session explains how Utah districts can move from “click and hope” to compliant\, termination-ready EdTech governance under H.B. 55\, Title 53E\, and federal privacy law.Most school districts have approved at least one digital tool that started with a well-meaning teacher saying\, “It’s free\, and everyone else uses it.” Too often\, that click-through approval becomes a permanent system handling student records\, behavioral data\, and sensitive communications—without meaningful oversight. At the same time\, Utah’s legal landscape has changed. With the passage of H.B. 55 (2026)\, districts are now required to maintain termination-ready contracts\, enforce strict data governance standards\, and demonstrate active vendor oversight. Informal adoption practices that once seemed harmless now create legal\, operational\, and cybersecurity risk. This session translates Utah’s statutory\, regulatory\, and federal privacy requirements into a practical\, repeatable approval system that districts can actually run. Through real-world scenarios\, breach case studies\, and contract examples\, participants will learn how to replace “click and hope” with “click\, verify\, and comply.” Attendees will leave with usable templates\, workflow models\, and governance tools that support instructional innovation while reducing legal exposure and reputational risk.
CATEGORIES:LEADERSHIP
LOCATION:Room 1404\, Brighton High School
SEQUENCE:0
UID:9e012989837bd66d780471e488416c13
URL:http://2026uentechsummit.sched.com/event/9e012989837bd66d780471e488416c13
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:SOC of the Future and TDIR in education
DESCRIPTION:TDIR stands for Threat Detection\, Investigation\, and Response. It is a comprehensive security approach that helps organizations assess risks\, understand security incidents\, and remediate threats quickly. TDIR capabilities enable security teams to detect threats\, investigate incidents\, and respond effectively to minimize impact. This term is an industry term that is being discussed across K12s and higher education. We will discuss the future of threat detection and how education can take advantage of these frameworks.The SOC of the Future is envisioned as a resilient\, AI-augmented security operations center that continuously monitors\, detects\, investigates\, and responds to cybersecurity threats in real time. It leverages advanced technologies such as AI-powered threat detection\, extended detection and response (XDR)\, and enhanced visibility across endpoints\, IoT\, and networks. Key capabilities include AI-driven threat detection and monitoring\, AI-augmented incident triage and investigation\, proactive threat hunting with AI hypotheses\, AI-enriched threat intelligence\, and automated incident response and remediation. The modern SOC integrates federated data management and analytics\, enabling comprehensive asset visibility and risk mitigation while simplifying security operations through AI-assisted workflows. It unifies threat detection\, investigation\, and response (TDIR) workflows within a single platform\, improving operational efficiency and reducing alert fatigue by up to 90% with risk-based alerting. The SOC of the Future also emphasizes collaboration across teams and tools\, leveraging integrations with Cisco and third-party security products to protect the entire digital footprint. Automation and orchestration accelerate response times\, with AI-guided investigations reducing case management time by 83% and enabling near-zero time to recovery from incidents such as ransomware attacks. The SOC continuously evolves through AI feedback loops and detection engineering\, supported by comprehensive threat intelligence and compliance monitoring frameworks. Overall\, the SOC of the Future combines human expertise with AI and automation to deliver faster\, more accurate threat detection and response\, ensuring digital resilience and reducing business risk in an increasingly complex threat landscape
CATEGORIES:SECURITY
LOCATION:Room 1412\, Brighton High School
SEQUENCE:0
UID:ad309aa8b40dbf46ce7afb4b01baa99f
URL:http://2026uentechsummit.sched.com/event/ad309aa8b40dbf46ce7afb4b01baa99f
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:Beginning Vim
DESCRIPTION:To do difficult tasks quickly and with skill\, you need powerful tools. The "Vim" (Vi Improved) text editor is such a tool. Come take the beginning steps in how to use Vim and be amazed!Vim is a text editor that can run in a console/terminal environment\, so it is the tool of choice for editing configuration (and other) files in Linux/Unix servers (which usually run "headless" [i.e.\, without a graphical environment]). Any text editor will let you edit text\, but they aren't all the same: why ride a kid's bicycle when you can drive a Ferrari? This class will focus on getting you started with Vim\, including the Insert and Normal Modes\, and the basic set of Normal Mode commands. Never take your hands off the keyboard\, and amaze everyone with how quickly and easily you can edit!
CATEGORIES:SYSTEM ADMIN
LOCATION:Room 1408\, Brighton High School
SEQUENCE:0
UID:d928f365f3641d80160a37cba383d01b
URL:http://2026uentechsummit.sched.com/event/d928f365f3641d80160a37cba383d01b
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:How Installomator Tames Install-Update-Automate
DESCRIPTION:This presentation\, “The Software Lifecycle Whisperer\,” delves into the Marriott Library at the University of Utah’s innovative approach to transforming macOS software deployment and maintenance. The session begins with an overview of the library’s complex technology environment\, which supports thousands of Macs\, Windows devices\, and iPads. It addresses the operational challenges posed by COVID-19\, such as the rapid scaling of student-checkout devices\, increased software demands\, remote support needs\, and the limitations of traditional packaging workflows. Previously\, the library’s team relied on manual packaging\, repackaging of Mac App Store and commercial apps\, patch management\, API automation using python-jamf and jctl\, and custom scripts to ensure consistent software management across platforms. These methods\, although effective\, often created bottlenecks\, especially with non-standard installers\, licensing requirements\, and time-sensitive updates. A detailed “repackage decision flow” is presented to illustrate when custom packaging is necessary versus when automation can be used. The presentation’s core focus is on Installomator\, an open-source\, label-driven installer engine that streamlines the process of downloading\, verifying\, and installing macOS applications directly from vendors. The session highlights Installomator’s advantages\, including simplified infrastructure\, reduced technical debt\, rapid deployment\, self-service integration\, compatibility with multiple MDMs\, and support for distributed fleets. It also identifies scenarios where Installomator may not be suitable\, such as version-locked environments\, authenticated downloads\, licensing-restricted software\, or bandwidth-limited networks. Attendees will gain insights into Installomator’s flow logic\, configuration variables (debug modes\, notifications\, DND settings\, ownership rules)\, and real-world examples of Jamf Pro and Intune setup workflows. The talk concludes with practical advice on integrating tools like Installomator\, patch management\, AutoPKG\, Title Editor\, and manual workflows to develop a flexible software lifecycle strategy that accommodates diverse application requirements.
CATEGORIES:TOOLS
LOCATION:Room 1218\, Brighton High School
SEQUENCE:0
UID:b93fb1542dadfb88b771ce8b9af6ac29
URL:http://2026uentechsummit.sched.com/event/b93fb1542dadfb88b771ce8b9af6ac29
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:Moving Beyond Pain Points in the University Data Center
DESCRIPTION:Higher-education data centers must support growing workloads amid constrained resources. This session explores common DCF challenges and practical considerations for improving reliability\, efficiency\, and long-term adaptability in university environments.Higher-education institutions increasingly rely on their data centers to support research\, teaching\, and institutional services\, while facing ongoing constraints in funding\, staffing\, and infrastructure. As workloads continue to grow in scale and complexity\, ensuring reliable and efficient data center fabric operations has become a critical priority. This session examines the most common challenges universities encounter in designing and operating data center fabrics. Rather than focusing on specific technologies or vendor solutions\, the discussion will center on broader architectural and operational considerations that can help institutions sustain performance while managing risk and complexity. Participants will gain insights into approaches for reducing operational overhead\, improving day-to-day reliability\, and balancing performance with resource efficiency. The session will also explore how institutions can establish adaptable foundations that support evolving research and service demands over time.\n
CATEGORIES:VENDOR
LOCATION:Room 1214\, Brighton High School
SEQUENCE:0
UID:6775772d25e295f9fe2d4a384fcb57ae
URL:http://2026uentechsummit.sched.com/event/6775772d25e295f9fe2d4a384fcb57ae
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T213000Z
DTEND:20260610T223000Z
SUMMARY:Analysis of University WiFi and 6 GHz
DESCRIPTION:&nbsp\;Radio spectrum has typically been the bottleneck of dense WiFi networks\, but the opening of the 6 GHz band has enormous potential for performance increase. This performance is dependent on client adoption of the new spectrum\, not just infrastructure. We'll look at data indicating the need for additional spectrum and the roadblocks to adopting it.WiFi is the main way that endpoints connect to campus networks\, and dependence on these networks continues to increase for classroom and university operations. Latency-sensitive applications such as real-time voice and video are now integrated into classroom settings\, and large venues are increasingly dependent on WiFi for student and fan engagement. These settings can be challenging due to dense client counts and channel re-use\, and is compounded by the diversity of BYOD clients. Even with this understanding\, WiFi is disproportionately blamed for disruptions\, but it can be difficult to measure the state of current designs. We want to address these questions: How often do classrooms have high channel utilization? What is the impact of high channel utilization? Are current wireless designs adequate for modern use cases? How many WiFi devices does each person have? What is the impact of implementing 6 GHz infrastructure? What are the challenges of 6 GHz designs? What are the challenges of 6 GHz client adoption? How are visitor networks affected by this? We will review data from a project that attempted to answer some of these questions. (https://scholarsarchive.byu.edu/etd/10917/) Additionally\, we will share observations from large venues with WiFi\, such as LaVell Edwards Stadium\, Marriott Center\, and the BYU campus\, as we have deployed 6 GHz infrastructure.
CATEGORIES:WIRELESS
LOCATION:Room 1216\, Brighton High School
SEQUENCE:0
UID:ccb414c50c29b51c03433d94b50053c3
URL:http://2026uentechsummit.sched.com/event/ccb414c50c29b51c03433d94b50053c3
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T224500Z
DTEND:20260610T234500Z
SUMMARY:Building Secure IT Automation: AI Assistants with n8n for K–12 Environments
DESCRIPTION:Many school IT teams rely on powerful scripting tools like GAM\, but these often introduce security risks\, limited visibility\, and steep learning curves. In this session\, you’ll learn how to replace traditional script-based workflows with secure\, user-friendly AI-powered tools that anyone can use. We’ll walk through real-world examples (Chromebook management\, web filtering analysis\, and identity lookups) and show how to safely expose administrative capabilities through guided interfaces. Attendees will leave with practical patterns for building scalable\, auditable\, and secure automation tools their teams can trust.
CATEGORIES:ARTIFICIAL INTELLIGENCE (AI)
LOCATION:Room 1414\, Brighton High School
SEQUENCE:0
UID:8f04c17f2e02438672a1d4431ef186d5
URL:http://2026uentechsummit.sched.com/event/8f04c17f2e02438672a1d4431ef186d5
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T224500Z
DTEND:20260610T234500Z
SUMMARY:Solving the Most Common and Elusive Wi-Fi Issues
DESCRIPTION:This presentation outlines best practices and a structured troubleshooting framework for solving elusive Wi-Fi issues. Learn to categorize problems into connectivity\, mobility\, and performance\, and use advanced analytics to effectively diagnose and resolve common user complaints like "slow network" or "dropped calls."\nNetwork administrators constantly face user complaints blaming "Wi-Fi" for every issue. This session details an effective\, six-step troubleshooting framework\, from problem identification to final resolution. We will dive into essential infrastructure best practices\, including proper cell sizing and managing legacy data rates. Furthermore\, attendees will learn to categorize Wi-Fi problems—Connectivity\, Mobility\, and Performance—and gain actionable insights on interpreting common user reports to quickly pinpoint and eliminate the true root cause.
CATEGORIES:EXHIBITOR
LOCATION:Room 1513\, Brighton High School
SEQUENCE:0
UID:519870c637d75f9ec7483da435afa941
URL:http://2026uentechsummit.sched.com/event/519870c637d75f9ec7483da435afa941
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T224500Z
DTEND:20260610T234500Z
SUMMARY:E‑Rate in Motion: FY2026 Updates and Preparing for FY2027
DESCRIPTION:This applicant‑focused session covers FY2026 E‑Rate application updates\, current guidance\, and helpful resources\, with a look ahead to FY2027 &amp\; FY2028 planning (New Bidding Portal intro)\, UETN consortium readiness\, and potential use of ESMC. Don’t know what ESMC is? Drop in and find out.The E‑Rate landscape continues to evolve\, sometimes as quickly as the weather in Utah. This session will provide timely updates on the current status of FY2026 E‑Rate applications while looking ahead to what applicants can expect as they prepare for FY2027. Attendees will be introduced to emerging resources\, tools\, and guidance designed to support Utah E‑Rate applicants through the upcoming funding year. We will review recent news\, policy developments\, and noteworthy events impacting the E‑Rate program\, with a focus on what these changes mean in practical terms for schools and libraries. The presentation will also include a status update on the UETN E‑Rate Consortium\, highlighting current preparations and strategic considerations for FY2027. Time permitting\, we will explore anticipated or potential use of ESMC in the FY2027 application process and discuss best practices for adapting to ongoing program changes. Because E‑Rate guidance and timelines can shift\, this session is designed to be responsive and current\, ensuring participants walk away with the most relevant information available at the time of the Summit.
CATEGORIES:GENERAL
LOCATION:Room 1410\, Brighton High School
SEQUENCE:0
UID:56cb39fb43005333f123e440663b86b5
URL:http://2026uentechsummit.sched.com/event/56cb39fb43005333f123e440663b86b5
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T224500Z
DTEND:20260610T234500Z
SUMMARY:UETN - Advocacy and Stakeholder Engagement
DESCRIPTION:The meeting is tailored to the needs of UETN advocates and service owners as we discuss the procurement phase coming in late summer\, including UETN policies and how understanding them will lead to better stakeholder support.Audience type:&nbsp\;UETN Advocacy team and UETN service ownersUETN Advocates Meeting will include updates\, training (topic pending)\, and core service updates.
CATEGORIES:GENERAL
LOCATION:Room 1220\, Brighton High School
SEQUENCE:0
UID:e4220d7e65410e9a5b24376c7689199f
URL:http://2026uentechsummit.sched.com/event/e4220d7e65410e9a5b24376c7689199f
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T224500Z
DTEND:20260610T234500Z
SUMMARY:The Utah Office of Artificial Intelligence Policy (OAIP) presents: Regulation\, Innovation\, and the Role of Telehealth
DESCRIPTION:The Utah Office of AI Policy presents its agenda on establishing trust and safety via regulation while fostering innovation through regulatory relief for AI in healthcare.The Utah Office of Artificial Intelligence Policy (OAIP) represents a pioneering state-level initiative designed to balance innovation facilitation with responsible AI governance in regulated industries. Established within Utah's Department of Commerce\, the Office operates under a mandate to develop evidence-based policy frameworks that promote technological advancement while safeguarding public health and consumer safety. The Office's approach to policy research emphasizes stakeholder engagement\, scientific rigor\, and iterative policy development. Following its 2025 agenda on AI in mental health counseling\, the Office’s priorities for 2026 include a proactive agenda to systematically address critical questions regarding AI implementation in various healthcare settings\, with particular attention to clinical decision support systems\, remote healthcare services\, transparency\, and patient safety protocols. The Office's regulatory mitigation program represents a comprehensive approach to fostering AI innovation in healthcare through its Utah AI sandbox initiative\, which provides regulatory relief for qualifying AI healthcare products. The application and review process includes initial expert and stakeholder consultation. The review process incorporates multiple assessment dimensions\, including clinical safety evaluation\, regulatory compliance analysis\, data protection verification\, and public health impact assessment. The presentation includes a walkthrough of recent successful sandbox applications for AI-in-healthcare products and services. The integration of AI technologies and telehealth practice presents transformative opportunities for healthcare delivery. For example\, innovations can include various forms of comprehensive clinical decision support\, autonomous AI decision making for a carefully scoped selection of healthcare services\, and integrations with wearable fitness and wellness trackers. However\, these technological advances also introduce complex challenges regarding data privacy\, patient and provider transparency\, and clinical liability. The successful integration of AI in telehealth requires careful consideration of technical and ethical dimensions alongside appropriate regulatory oversight. The 30-minute presentation will be followed by a 30-minute discussion during which the audience is invited to share their perspectives on how AI can contribute to expand remote-healthcare services in Utah safely and beneficially in collaboration with existing healthcare systems in the State. Dr. Alice Schwarze joined OAIP as Head of Research in 2024. She received a PhD in applied mathematics from the University of Oxford in 2019. Prior to joining the Utah AI policy office\, she worked as a researcher and lecturer at UCLA\, the University of Washington\, and Dartmouth College\, covering topics from computational neuroscience\, data science for public health\, and the mathematical foundations of artificial intelligence. In her current role\, Dr. Schwarze leads the Office's research efforts that underlie the Office's issued guidance letters\, policy recommendations\, and the Office's assessment of the clinical safety and public-health benefits of AI-in-healthcare proposals in the Office's regulatory sandbox.
CATEGORIES:LEADERSHIP
LOCATION:Room 1404\, Brighton High School
SEQUENCE:0
UID:454b0b427b735fcf2fb70cf3b0c410c7
URL:http://2026uentechsummit.sched.com/event/454b0b427b735fcf2fb70cf3b0c410c7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T224500Z
DTEND:20260610T234500Z
SUMMARY:How Alyssa’s Law is Paving the Way for A Public Safety Revolution in Utah Classrooms
DESCRIPTION:This session examines how Alyssa’s Law is advancing school safety beyond its intended mandate of silent panic alarms to enable broader adoption of technologies. It highlights approaches to improving first responder communications and strengthening connected safety systems in K-12 environments.First responder communication technology in K–12 schools has gained significant momentum over the last decade\, driven by a growing number of tragedies and school safety concerns. One of the most impactful recent catalysts has been Alyssa’s Law\, which mandates the installation of silent panic alarms in schools to immediately alert law enforcement during an emergency. While the law’s core focus is on panic alarms\, its impact extends far beyond a single piece of hardware. In many states\, Alyssa’s Law has become a gateway to broader safety enhancements. In Utah\, the passage of School Safety Amendments (H.B. 84) expanded requirements beyond panic alarms to include comprehensive communication capabilities\, safety protocols\, and additional emergency preparedness resources. This includes Emergency Responder Communication Enhancement Systems (ERCES)\, which ensure that police\, fire\, and EMS personnel can maintain reliable communication inside school buildings\, even when radio signals are obstructed by walls or infrastructure. In this session\, Hunter Kampmoyer\, West Regional Manager at ADRF\, will discuss the importance of Alyssa’s Law to the growth of public safety in schools\, as well as present a Mountain West-based case study that walks attendees through different approaches to deploying ERCES in school\, and how the system can double as an important backup to other connected school safety measures currently running on WiFi\, including those required within H.B. 84.
CATEGORIES:VENDOR
LOCATION:Room 1214\, Brighton High School
SEQUENCE:0
UID:a7bc5f529431ee8b27fe63d3a58b15a6
URL:http://2026uentechsummit.sched.com/event/a7bc5f529431ee8b27fe63d3a58b15a6
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260610T224500Z
DTEND:20260610T234500Z
SUMMARY:Best tools of 2026 for Wi-Fi Design and Troubleshooting
DESCRIPTION:With the undisputed dependency on Wi-Fi connectivity on our campuses\, there is an imminent need for proper tools to design and identify problems in our networks. I will cover what is available now and the best solutions.\n&nbsp\;I will be explaining the best approaches to designing and troubleshooting Wi-Fi with the different tools available in the market now. I will have the tools and gear in the class to present the audience with some live demos and allow hands-on. Temporary licenses to some of these tools will be available.
CATEGORIES:WIRELESS
LOCATION:Room 1216\, Brighton High School
SEQUENCE:0
UID:c589060896f49a58e96b7fd442a6e665
URL:http://2026uentechsummit.sched.com/event/c589060896f49a58e96b7fd442a6e665
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T143000Z
DTEND:20260611T153000Z
SUMMARY:Breakfast
DESCRIPTION:Food
CATEGORIES:FOOD
LOCATION:Commons Area\, Brighton High School
SEQUENCE:0
UID:c9c5486b037e8793e324cc6d058552e7
URL:http://2026uentechsummit.sched.com/event/c9c5486b037e8793e324cc6d058552e7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T143000Z
DTEND:20260611T163000Z
SUMMARY:Registration
DESCRIPTION:Registration
CATEGORIES:REGISTRATION
LOCATION:Commons Area\, Brighton High School
SEQUENCE:0
UID:833c9b9423b342fa151b154edcb087a8
URL:http://2026uentechsummit.sched.com/event/833c9b9423b342fa151b154edcb087a8
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:OpenSource AI Tools: Improving accessibility and discoverability in Digital Libraries using the University of Utah’s Marriott Library's new AI infrastructure
DESCRIPTION:In this session\, we will demonstrate the Marriott Library's new AI tooling infrastructure that utilizes open source LLMs and ASRs to improve web accessibility and discoverability in the Digital Library at the University of Utah.\n\nUniversities\, Schools\, and Libraries are under growing pressure to expand access and improve discovery while meeting new accessibility expectations for our digital collections. At the University of Utah’s J. Willard Marriott Library\, Digital Infrastructure Development team is building a flexible\, modular workflow to help bring large AV collections into alignment with DOJ accessibility requirements at scale. The platform orchestrates open-source speech-to-text and language models to generate time-aligned transcripts and captions\, structured segmentation\, word clouds\, entity recognition\, and descriptive metadata—improving both compliance and content discoverability. We will share our implementation approach\, early results\, and lessons learned\, including human review checkpoints\, staff support and buy-in\, provenance and auditability\, and how we are designing the workflow to be adaptable as models and standards evolve. The session will focus on practical strategies other institutions can reuse to accelerate accessible AV delivery without locking into a single vendor or toolchain\, and our future development plans for supporting other formats\, including images\, PDFs\, and other formats.\n\n\n
CATEGORIES:ARTIFICIAL INTELLIGENCE (AI)
LOCATION:Room 1414\, Brighton High School
SEQUENCE:0
UID:cd2d7ee1fc269104902442e3adfed498
URL:http://2026uentechsummit.sched.com/event/cd2d7ee1fc269104902442e3adfed498
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:Leveraging Zoom Workplace for Academic Excellence
DESCRIPTION:A comprehensive presentation on how Zoom's Collaboration platform can revolutionize educational operations across K-12 and higher education institutions. By seamlessly integrating various workloads and communication channels into a unified platform\, educational institutions can improve efficiency across internal operations and student/parent engagement. Campus safety remains paramount\, and we'll discuss how Zoom can reduce the operational overhead of E911 compliance and support future legislation like Alyssa's law.&nbsp\;
CATEGORIES:EXHIBITOR
LOCATION:Room 1214\, Brighton High School
SEQUENCE:0
UID:5ed74aa53beb077a44de5182c4728b15
URL:http://2026uentechsummit.sched.com/event/5ed74aa53beb077a44de5182c4728b15
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:Slipping Through the Gaps: K-12 Filtering Challenges No One Warned You About
DESCRIPTION:Join Linewize for an interactive session to pull back the curtain on what’s really happening on K-12 networks. Your filter handles the basics\, but you still spend too much time putting out fires. Content slips through the cracks in Google Docs\, your students spin up new proxies and workarounds daily\, and staying ahead of AI-generated imagery feels impossible. We’ll explore where traditional URL filtering falls short\, and how the latest advancements in content-aware filtering and real-time monitoring are helping IT teams work smarter\, even with tightening budgets and resources\, to close crucial student safety gaps.
CATEGORIES:EXHIBITOR
LOCATION:Room 1513\, Brighton High School
SEQUENCE:0
UID:63c5654fca2255854565117a5f257af6
URL:http://2026uentechsummit.sched.com/event/63c5654fca2255854565117a5f257af6
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:Introduction to All Things Quantum
DESCRIPTION:What's all the hype with quantum? Are you ready for the threats and advancements that are coming? This is an introductory session to the science and technologies that enable quantum networking. This session will begin with a brief introduction to quantum mechanics\, with a focus on quantum bits (qubits) and some of their special properties\, including superposition\, entanglement\, and no-cloning (Note: this discussion will include some mathematical concepts and proofs). This will be followed by an overview of quantum networking\, including quantum teleportation and entanglement swapping. Finally\, we'll bring it all together to outline the building blocks\, opportunities\, and challenges of building quantum networks\, as well as highlight what Cisco is already doing in this exciting space.\n
CATEGORIES:GENERAL
LOCATION:Room 1220\, Brighton High School
SEQUENCE:0
UID:69ab34668f3b18c1c1e834ee3df660f0
URL:http://2026uentechsummit.sched.com/event/69ab34668f3b18c1c1e834ee3df660f0
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:Wipe to Workflow: Mastering Mac Restoration and ClassLink Platform SSO
DESCRIPTION:Use readily available tools to restore Macs and enroll them in Platform SSOAs schools face new 2026 legal requirements for differentiated content filtering and transparent parental reporting\, the "Identity" of the user at the system level has never been more critical. This session provides a deep dive into a reliable\, repeatable workflow for restoring Macs and preparing them for the next generation of authentication: Platform SSO. Using readily available tools—including MacDVM\, Apple Configurator\, and iMazing Profile Editor—we will walk through the technical steps to move a device from a blank slate to a fully enrolled\, identity-aware workstation. With ClassLink’s launch of Platform SSO capabilities this month\, we will discuss how this shift simplifies the user experience while providing the granular data needed to meet modern compliance standards. Whether you are a Tech Director planning for the new school year or a SysAdmin looking to sharpen your deployment toolkit\, this session offers a practical roadmap for the "Modern Mac" in K-12.
CATEGORIES:GENERAL
LOCATION:Room 1410\, Brighton High School
SEQUENCE:0
UID:7f25cfa0b23462bf432f635a8a74dddc
URL:http://2026uentechsummit.sched.com/event/7f25cfa0b23462bf432f635a8a74dddc
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:When the Problem Isn’t the Technology: Communication Skills for K-12 IT Teams
DESCRIPTION:Move beyond solving technical issues and start supporting the people using technology. This session introduces a customer-service approach tailored for K-12 IT teams that uses empathy\, active listening\, and clear communication to de-escalate difficult situations and turn frustrated users into collaborative partners.IT professionals in K-12 education spend much of their time troubleshooting devices\, networks\, and software—but many support challenges are not purely technical. Frustration\, miscommunication\, and time pressure can turn small technology issues into larger disruptions for teachers and classrooms. This session introduces T.E.A.C.H.\, a practical communication framework designed specifically for education technology support teams. The framework helps IT staff manage the human side of support interactions while still resolving technical problems efficiently. Participants will explore five core practices: • Take Time to Greet & Listen • Empathize and Disarm Conflict • Ask Effective Questions • Chart the Path Forward • Help Beyond the Moment. Through real-world K-12 support scenarios\, attendees will learn techniques for active listening\, empathetic communication\, structured troubleshooting conversations\, and translating technical concepts into language that educators can easily understand. The session includes a short interactive activity in which participants identify common support requests and discuss simple strategies—such as knowledge base articles or quick training resources—that can prevent repeat issues. Attendees will leave with a practical framework and communication strategies they can immediately apply to improve support interactions\, reduce frustration\, and strengthen collaboration between IT teams and educators.
CATEGORIES:LEADERSHIP
LOCATION:Room 1404\, Brighton High School
SEQUENCE:0
UID:52c34aca753faf4273674367acaa1aa9
URL:http://2026uentechsummit.sched.com/event/52c34aca753faf4273674367acaa1aa9
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:Are You Interested in the CISSP Exam
DESCRIPTION:I passed the Certified Information Systems Security Professional (CISSP) exam in 2025. This presentation would be for anyone who may be interested in the exam and learning how I went about preparing for it.
CATEGORIES:SECURITY
LOCATION:Room 1412\, Brighton High School
SEQUENCE:0
UID:34a71eee9a4d394c986121c6c6ddcbca
URL:http://2026uentechsummit.sched.com/event/34a71eee9a4d394c986121c6c6ddcbca
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:Modern IPv6 Deployments in Campus Networks
DESCRIPTION:IPv6 has long been a technology "on the horizon"\, but with recent developments\, it's possible to deploy IPv6 to end-users and begin phasing out IPv4.IPv6 has long been a technology "on the horizon"\, but with recent developments\, it's possible to deploy IPv6 to end-users and begin phasing out IPv4. This session will cover IPv6 trends\, technologies around IPv6/IPv6-mostly networks\, patterns for deployment\, and ways to begin the journey. Depending on the audience\, I'll likely focus 30 minutes on the presentation\, but may open it up for a Q&A or round-table afterward if applicable. Depending on logistics\, I may distribute some free IPv6 Test Pods (ipv6-pod.info) to help interested people start testing. Depending on my own travel plans\, this may need to be a virtual presentation. \n
CATEGORIES:SYSTEM ADMIN
LOCATION:Room 1408\, Brighton High School
SEQUENCE:0
UID:21ac38d33547820371f46ae0d7378d27
URL:http://2026uentechsummit.sched.com/event/21ac38d33547820371f46ae0d7378d27
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:UEN & Nautobot
DESCRIPTION:Learn what it is\, why we chose it\, and how it has enabled UEN to deploy several useful solutions\, such as GoldenConfig\, CircuitDB\, and N.U.T.S. (Network Utility Tool Set).This session serves as a show-and-tell of UENs’ SOT & network automation solution. Give a brief of why it was chosen and how the features Nautobot provides\, now and in the future\, benefit not only our network management\, but also how these features may benefit them in the future. This will be shown through minimal slides with live demos making up the bulk of the presentation.
CATEGORIES:TOOLS
LOCATION:Room 1218\, Brighton High School
SEQUENCE:0
UID:346cbeabbf2e6497e612a1ccb37dd01a
URL:http://2026uentechsummit.sched.com/event/346cbeabbf2e6497e612a1ccb37dd01a
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T153000Z
DTEND:20260611T163000Z
SUMMARY:Safe\, Simple\, and Scalable Student Connectivity: Modernizing K–12 Wireless Access with Eduroam and Device-Based Trust
DESCRIPTION:Learn how a K–12 leader improved student connectivity and security while simplifying network management in one-device-per-student environments.K–12 districts across Utah need secure\, reliable\, and easy-to-manage wireless access to support one-device-per-student programs and uninterrupted digital learning. When connectivity is inconsistent or overly complex\, classroom instruction is disrupted. During this Fireside Chat\, Central Utah Educational Services will share how it consolidated multiple networks into a single SSID using Eduroam and Fortinet\, creating a simplified\, secure\, and scalable wireless model. By shifting from user-based authentication to device-based trust using certificates\, the district ensures that only managed\, filtered devices can connect—on campus and beyond. This approach helps maintain student safety while reducing friction for students and staff. Attendees will leave with practical strategies to simplify SSID design\, strengthen security\, and use automation to manage devices at scale—ultimately reducing IT workload while improving the student experience.
CATEGORIES:WIRELESS
LOCATION:Room 1216\, Brighton High School
SEQUENCE:0
UID:b30b9ca0bceaa10216a50a0f1ae4a204
URL:http://2026uentechsummit.sched.com/event/b30b9ca0bceaa10216a50a0f1ae4a204
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:The SOUL of AI: A Constitutional Framework for Human-AI Governance
DESCRIPTION:What if AI systems had a constitution — a living soul? The Sovereign Framework implements democratic AI governance with a five-member council of humans and AI models\, three branches of government\, ethical guardrails from philosophy and law\, and unamendable human sovereignty. This is AI governance made real.\n\nAs AI capabilities accelerate\, the question of governance becomes urgent: who decides what AI can do\, and how do we ensure it serves human flourishing? The Sovereign Framework answers this with a radical proposition — give AI systems a soul. Not consciousness\, but constitutional governance. SOUL.md is a living constitution that establishes a three-branch governance model (Executive\, Legislative\, Judicial) and a five-member council where one human and four AI models (Claude\, GPT\, Grok\, Llama) deliberate as equals on new capabilities. Drawing from the U.S. Constitution's separation of powers\, Don Miguel Ruiz's Four Agreements\, and Gay Hendricks' Conscious Living principles\, the framework creates a system where: - No AI capability is deployed without democratic deliberation — a supermajority (4 of 5 votes) is required to ratify new skills - Human sovereignty is absolute and unamendable — the human can override\, halt\, or dissolve the system at any time - Ethics are structural\, not aspirational — a Judicial Branch independently reviews every action for constitutional alignment - Dissent is preserved as wisdom — today's minority opinion may become tomorrow's governing principle This isn't a whitepaper. The Sovereign Framework is implemented in production software spanning Java\, TypeScript\, Dart\, and Flutter — with a full deliberation engine\, voting system\, precedent library\, soul editor\, and MCP integration for AI assistants. The presentation demonstrates the complete governance lifecycle: from proposal through council deliberation\, judicial review\, skill ratification\, and after-action evaluation. We'll explore the philosophical foundations\, the technical architecture\, and the practical implications of treating AI governance as a constitutional democracy — where the machine doesn't just follow rules\, but participates in creating them.
CATEGORIES:ARTIFICIAL INTELLIGENCE (AI)
LOCATION:Room 1414\, Brighton High School
SEQUENCE:0
UID:899d42690a96d8b80c8aa9515cb875ce
URL:http://2026uentechsummit.sched.com/event/899d42690a96d8b80c8aa9515cb875ce
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:How Canyons and Box Elder School Districts Protect Data and Optimize Resources
DESCRIPTION:Join Canyons and Box Elder School District tech leaders for a deep dive into the essentials of modern district management: data privacy\, cybersecurity\, and resource accountability. As digital landscapes grow more complex\, ensuring student data remains secure while maintaining a "noise-free" learning environment is a top priority for Utah LEAs. This session explores how to leverage the ClassLink suite to gain total visibility into your digital ecosystem. Eric Taylor from Canyons School District and Eric McEwan from Box Elder School District will share practical strategies for fortifying your security posture\, auditing software efficacy\, and ensuring every digital tool in your district serves a clear\, purposeful goal.
CATEGORIES:EXHIBITOR
LOCATION:Room 1513\, Brighton High School
SEQUENCE:0
UID:2c25e5025030cfea29e7ffa8377ce424
URL:http://2026uentechsummit.sched.com/event/2c25e5025030cfea29e7ffa8377ce424
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:Scaling Open Networks from 100Mpbs to 10G
DESCRIPTION:Abrief history of UTOPIA and how we went from 100Mpbs connections to 10GPowerpoint presentation of history of UTOPIA\, network design\, scaling\, hardware selections and lessons learned\n
CATEGORIES:GENERAL
LOCATION:Room 1220\, Brighton High School
SEQUENCE:0
UID:8ad2b094b237e83a7f8781b14e9d5e31
URL:http://2026uentechsummit.sched.com/event/8ad2b094b237e83a7f8781b14e9d5e31
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:STOP WASTING TIME and Train Them the Right Way
DESCRIPTION:Training somebody the right way once is better than training them the wrong way five times. Sounds ridiculous\, but it happens more often than you think.Training somebody the right way once is better than training them the wrong way five times. It’s hard to believe\, but you may be surprised how often you are actually doing that. Through years of experience\, we found that it was the case for our summer IT intern program. We would train them for two days\, then deploy them to the field\, only to find they didn’t learn certain necessary skills or important workflows\, and we had to train them repeatedly. This cost time and energy throughout the summer\, which could have been spent in a productive manner. All of this led to standardizing workflows and summer processes across the Field Technicians group\, and to a better intern training program that makes training more successful and meaningful from day one. Join us as we tell you how we used entertaining AND educational videos and reference material to train our new fleet of interns.
CATEGORIES:GENERAL
LOCATION:Room 1410\, Brighton High School
SEQUENCE:0
UID:66b292201ef50e7bc65d40193ca1c277
URL:http://2026uentechsummit.sched.com/event/66b292201ef50e7bc65d40193ca1c277
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:Research Initiatives at UEN
DESCRIPTION:In our mission to provide internet access and technology infrastructure to our education and telehealth stakeholders\, we support and conduct research of our own. We'll talk about the state of our current research efforts\, what we have learned so far\, and how this research supports our core services.This presentation will cover research efforts within UEN/UTN and partners. In particular\, we'll touch on advances in AI & machine learning\, Network management\, Wildfire cameras\, the WildWEST project\, collaboration with the Center for High Performance Computing at the University of Utah\, collaboration with outside researchers\, and more! This will be a panel discussion covering project developments and findings.
CATEGORIES:LEADERSHIP
LOCATION:Room 1404\, Brighton High School
SEQUENCE:0
UID:78bd5f4ffff79d99e56e554a138ca9f0
URL:http://2026uentechsummit.sched.com/event/78bd5f4ffff79d99e56e554a138ca9f0
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:Security Threat & Mitigations in IPv6
DESCRIPTION:For the past 2 years\, I have been presenting information regarding IPv6. Things to think about when deploying it\, planning for it\, and looking at detailed configs like SLAAC vs DHCPv6. This is mostly to help bring awareness to the community. This year\, my final IPv6 presentation will be specifically about security. I will be going over some of the security risks that can be exploited in IPv6 and how to mitigate them. IPv6 is still new and unfamiliar to many. This is intended to make people aware of the security considerations to make before deploying IPv6.
CATEGORIES:SECURITY
LOCATION:Room 1412\, Brighton High School
SEQUENCE:0
UID:5895cfe6b15ddc1d5a962fee7ad0860e
URL:http://2026uentechsummit.sched.com/event/5895cfe6b15ddc1d5a962fee7ad0860e
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:Easy Automated HTTPS for Internal Servers
DESCRIPTION:Keep your internal Linux and Windows servers secure with automatic wildcard certificate renewals — no public exposure needed. Using simple ACME tools\, one machine quietly grabs fresh certificates every few months\, then securely copies them to all your other servers. No manual work\, no opening ports to the internet\, just reliable HTTPS everywhere inside your network.Keep your internal Linux and Windows servers secure with automatic wildcard certificate renewals — no public exposure needed. Using simple ACME tools\, one machine quietly grabs fresh certificates every few months\, then securely copies them to all your other servers. No manual work\, no opening ports to the internet\, just reliable HTTPS everywhere inside your network.
CATEGORIES:SYSTEM ADMIN
LOCATION:Room 1408\, Brighton High School
SEQUENCE:0
UID:2d404b4512f3117372a6ac1a56a08960
URL:http://2026uentechsummit.sched.com/event/2d404b4512f3117372a6ac1a56a08960
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:Modern Mac Authentication: It's time to Unbind
DESCRIPTION:Still binding your Macs to Active Directory? It's time to stop. In this session\, we'll explore why AD binding is no longer the best path forward and walk through the modern authentication options available today — including Apple's Platform SSO\, cloud identity integrations\, and third-party solutions that give IT teams the flexibility and security modern organizations demand. Walk away with a clear understanding of your options and a roadmap to modernize your Mac authentication strategy.
CATEGORIES:SYSTEM ADMIN
LOCATION:Room 1216\, Brighton High School
SEQUENCE:0
UID:9d4df6887ab8f3a38978262dd527f883
URL:http://2026uentechsummit.sched.com/event/9d4df6887ab8f3a38978262dd527f883
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:Using GitLab as an Alternative to GitHub
DESCRIPTION:We have had to block GitHub due to content that allows students to circumvent filtering security. Some of our programming classes\, however\, need access to a GitHub-style tool to help them learn how to manage code. This is a presentation on how Salt Lake District is navigating that challenge.
CATEGORIES:TOOLS
LOCATION:Room 1218\, Brighton High School
SEQUENCE:0
UID:c1097e919fa7d551992402a23cf58ff8
URL:http://2026uentechsummit.sched.com/event/c1097e919fa7d551992402a23cf58ff8
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T164500Z
DTEND:20260611T174500Z
SUMMARY:In the Trenches: Running Modern K–12 Networks with Limited Resources
DESCRIPTION:K–12 IT teams are under pressure to do more with less while supporting complex\, always-on environments. This engineer-led session shares real-world operational insights on simplifying networks\, improving performance\, and reducing workload. We’ll explore how AI is changing network and security operations\, focusing on practical impact\, real use cases\, and not a sales pitch.K–12 IT teams are expected to support high-density environments\, enable digital learning\, and maintain secure\, always-on networks\, often with limited staff and time. The challenge isn’t just deploying new technology\; it’s operating it effectively every day. This session takes a real-world\, engineer-led look at modern network operations in K–12 environments. We’ll share practical lessons from the field\, focusing on how districts are reducing complexity\, improving visibility\, and streamlining troubleshooting across their networks. We’ll also explore how AI-driven networking and security platforms are reshaping IT operations\, shifting teams from reactive troubleshooting to more proactive\, automated approaches. The focus will be on how these capabilities are being applied in real environments to reduce noise\, accelerate root cause analysis\, and improve end-user experiences. Designed for a technical audience\, this session focuses on what’s actually working in production environments without the sales pitch.
CATEGORIES:VENDOR
LOCATION:Room 1214\, Brighton High School
SEQUENCE:0
UID:fb84ef355501c906267bcb62f824dda8
URL:http://2026uentechsummit.sched.com/event/fb84ef355501c906267bcb62f824dda8
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T180000Z
DTEND:20260611T190000Z
SUMMARY:Utah’s AI Factory Supercomputer: A State-wide Sovereign Resource for Discovery\, Education\, and Innovation
DESCRIPTION:Artificial Intelligence is rapidly transforming how science and innovation are accomplished and how we train the next generation for success in a competitive AI-enabled economy. I will discuss Utah’s recent investments in world-class infrastructure that aim to accelerate scientific and technical advancements and AI preparedness at all levels across the state.
CATEGORIES:KEYNOTE
LOCATION:Auditorium\, Brighton High School
SEQUENCE:0
UID:def6834a00c88fb3f66a56bb4d4c5487
URL:http://2026uentechsummit.sched.com/event/def6834a00c88fb3f66a56bb4d4c5487
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T190000Z
DTEND:20260611T200000Z
SUMMARY:Lunch
DESCRIPTION:Food
CATEGORIES:FOOD
LOCATION:Commons Area\, Brighton High School
SEQUENCE:0
UID:c168dacf1f31c2125113adbe4963a6a7
URL:http://2026uentechsummit.sched.com/event/c168dacf1f31c2125113adbe4963a6a7
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:AI as a Design Variable
DESCRIPTION:Educators are in the moment\, deciding what teaching and learning with AI will accomplish. Research shows AI used in a cavalier manner hurts congitive ability and research shows AI can improve brain function. Both are true. This presentation introduces frameworks\, strategies\, and things to try tomorrow to ensure you have the best interactions with AI for you and your students.\nAI as a Design Variable will discuss research from the MIT EEG Study - Kosmyna et al. (2025)\, Wang & Zhang (2026) studies\, Patrick Dempsey - The Second Draft (2026)\, strategies from Penn Center for Teaching and Learning\, insights from The Loop by Jacob Ward\, and more. Attending this presentation will prepare educators to begin discussions around the effective uses of AI in teaching and learning.
CATEGORIES:ARTIFICIAL INTELLIGENCE (AI)
LOCATION:Room 1414\, Brighton High School
SEQUENCE:0
UID:1c3680fbfb3656e21318560c51922d01
URL:http://2026uentechsummit.sched.com/event/1c3680fbfb3656e21318560c51922d01
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:AI and School Safety
DESCRIPTION:An exploration of how school leaders can responsibly leverage AI to identify risks earlier\, strengthen prevention strategies\, and make faster\, more informed decisions that protect students and staff.As artificial intelligence rapidly enters the education landscape\, school leaders face both unprecedented opportunity and responsibility. This session explores how K–12 administrators and safety teams can ethically and effectively leverage AI to identify potential risks earlier\, strengthen prevention strategies\, and support faster\, more informed decision‑making that protects students and staff. Participants will examine practical use cases for AI across prevention\, threat identification\, situational awareness\, and decision support—while also addressing critical considerations related to governance\, bias\, privacy\, and human oversight. Through real‑world scenarios\, guided discussion\, and interactive risk‑assessment exercises\, attendees will evaluate where AI adds value\, where it should be constrained\, and how it can responsibly augment—not replace—professional judgment. The session concludes with actionable frameworks and guiding principles school leaders can use to assess AI tools\, align them to safety priorities\, and build policies that balance innovation\, ethics\, and student well‑being.
CATEGORIES:EXHIBITOR
LOCATION:Room 1513\, Brighton High School
SEQUENCE:0
UID:7ab5b2df2a99d45c910d00f8743902ab
URL:http://2026uentechsummit.sched.com/event/7ab5b2df2a99d45c910d00f8743902ab
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:A Decade of Data: Insights from Utah’s K–12 Technology Inventory on AI and Infrastructure
DESCRIPTION:This session highlights findings from the 2025 Utah School Technology Inventory\, marking 10 years of statewide data collection. It includes new insights on artificial intelligence (AI) in K–12 education\, with trends in policy\, training\, infrastructure\, and how data supports strategic planning and decision-making.This session explores how Utah’s 10-year Technology Inventory captures AI adoption\, policy gaps\, and infrastructure challenges across schools. Participants will review key findings\, discuss implications for policy and practice\, and engage in guided reflection on applying data to support AI integration and planning. https://www.uen.org/schooltech/
CATEGORIES:GENERAL
LOCATION:Room 1410\, Brighton High School
SEQUENCE:0
UID:d0a27c11cf7e2896d94f95732fc87066
URL:http://2026uentechsummit.sched.com/event/d0a27c11cf7e2896d94f95732fc87066
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:An Economic Outlook for the Tech Sector
DESCRIPTION:In just the past year\, the tech sector has changed enormously. This talk discusses recent trends and what it might mean not only for the tech sector\, but the broader economy.\nOver just the past year\, the tech sector's influence has grown by leaps and bounds. An already influential sector\, the changes it is introducing are astonishing. Driven by the application of AI\, tech has the potential to reshape Utah's economy in ways that will lead to permanent changes in investment patterns\, workforce\, and government. This talk explores the most important trends reshaping the tech sector and considers what they could mean for the broader economy. As technology becomes more deeply embedded in finance\, healthcare\, education\, manufacturing\, and professional services\, shifts in the tech industry will influence productivity to an enormous degree\, with downwind effects on wages\, business formation\, and regional economic growth. The discussion will examine both the opportunities and the disruptions that may lie ahead\, including how AI could change the nature of work\, how investment may flow differently across sectors\, and why today’s tech transformation may have consequences far beyond the companies building the tools.\n
CATEGORIES:GENERAL
LOCATION:Room 1220\, Brighton High School
SEQUENCE:0
UID:4226d5d2ba18509f815ec52474639133
URL:http://2026uentechsummit.sched.com/event/4226d5d2ba18509f815ec52474639133
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:Sharing is Caring: How Museums Create and Share Scientific Data
DESCRIPTION:Over this session\, we will discuss how the digitization program at the Natural History Museum generates digital records from physical objects\, museum data standards\, and infrastructure\, and how it gets used in the larger research and education community.Museums contain vast collections that tell the story of the landscape we inhabit. These collections are used continuously by museum staff\, researchers\, and educators. The infrastructure for creating\, holding\, and sharing this research provides interesting challenges. Over this session\, we will discuss how the digitization program at the Natural History Museum generates digital records from physical objects\, museum data standards\, and infrastructure\, and how it gets used in the larger research and education community.
CATEGORIES:GENERAL
LOCATION:Room 1218\, Brighton High School
SEQUENCE:0
UID:d2a81cf8b9f277b3e77911fb50f18e6d
URL:http://2026uentechsummit.sched.com/event/d2a81cf8b9f277b3e77911fb50f18e6d
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:Legislative Stuff You Should Know: Privacy Edition
DESCRIPTION:Utah's legislature considered a record number of bills during the 2026 General Session\, so if you are wondering how to keep track of everything\, you're not alone. This session will focus on getting you the information you need to start integrating new data privacy requirements into your policies and practices. You'll be most at home in this session if you are the privacy point person at your district or charter\, but everyone is welcome!
CATEGORIES:LEADERSHIP
LOCATION:Room 1404\, Brighton High School
SEQUENCE:0
UID:d1beaabf74f66d3731a5f29084bfc442
URL:http://2026uentechsummit.sched.com/event/d1beaabf74f66d3731a5f29084bfc442
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:Internet Routing Security - Secure your subnets using RPKI and ROAs
DESCRIPTION:We will discuss the importance of securing and validating prefix/subnet announcements using the RPKI infrastructure and the ROA. This discussion will review how they work\, why they matter\, and how to implement them.Internet routing protocols were designed with a weak security posture\, creating vulnerable attack vectors via route hijacking. We’ll break down how RPKI works at a practical level\, including certificate hierarchy\, ROA creation\, and route validation states (valid\, invalid\, not found). We’ll walk through real-world examples of route leaks and hijacks\, showing how RPKI can prevent or mitigate these events. Attendees will leave with a clear understanding of how to implement RPKI/ROA in their environment and immediately improve routing security.
CATEGORIES:SECURITY
LOCATION:Room 1412\, Brighton High School
SEQUENCE:0
UID:300b863a3910d6047b13dfac2a402a88
URL:http://2026uentechsummit.sched.com/event/300b863a3910d6047b13dfac2a402a88
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:Are You Smarter Than a 5th Grader? Server Room to Staff Room
DESCRIPTION:What happens when a high-level SysAdmin and a former 5th-grade teacher join forces? We bridge the EdTech divide! Using a playful "Are You Smarter Than a 5th Grader?" framework\, we’ll flip the script\, translating "Tech-Speak" into "Teacher-Speak" to transform your biggest complainers into your best collaborators.
CATEGORIES:SYSTEM ADMIN
LOCATION:Room 1408\, Brighton High School
SEQUENCE:0
UID:a95065bed3660bded087f0fdb3c5768c
URL:http://2026uentechsummit.sched.com/event/a95065bed3660bded087f0fdb3c5768c
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:UEN Backup and Archival Update
DESCRIPTION:Did you know that UEN offers an Enterprise Backup Solution? UEN’s backup solution is changing\, and we invite you to join us for an overview of the offering and an update on our recent expansion.\nWhether you are a current consumer or looking for a new solution\, come learn how these services can be implemented at your institution. We will provide updates on what is available now\, what is coming next\, and how UEN can help you feel confident that your backups are safe and secure.
CATEGORIES:SYSTEM ADMIN
LOCATION:Room 1216\, Brighton High School
SEQUENCE:0
UID:391a7dc6f4d5b398e51fe41dcb43e2ad
URL:http://2026uentechsummit.sched.com/event/391a7dc6f4d5b398e51fe41dcb43e2ad
END:VEVENT
BEGIN:VEVENT
DTSTAMP:20260517T195914Z
DTSTART:20260611T201500Z
DTEND:20260611T211500Z
SUMMARY:E-Rate
DESCRIPTION:He will be discussing the benefits of E-Rate with Netgear. He is an expert in the E-Rate field of over 15 years experienceGoing over Netgear's latest hardware (switches\, AP's and Cyber Security options and support)
CATEGORIES:VENDOR
LOCATION:Room 1214\, Brighton High School
SEQUENCE:0
UID:3bf3fb66cc06117096971e393830a865
URL:http://2026uentechsummit.sched.com/event/3bf3fb66cc06117096971e393830a865
END:VEVENT
END:VCALENDAR
