Home > Blog > Archive

Author Archive

InDesign 3 — Designing e-publications

Saturday, December 20th, 2014

InDesign 3 — Designing e-publications
Event on 2015-05-23 13:00:00

Give your documents broader appeal and design them for a variety of digital devices, from Kindle to iPad, to online magazines like Issuu.

This workshop will take you through creating documents in InDesign for digital publication. You’ll learn how to configure your documents properly from the outset, and convert existing documents to a format appropriate for digital publication. Along the way you’ll cover navigation techniques, as well as InDesigns built in features to enhance your publication. For this workshop you’ll be using the latest version of Adobe, Creative Cloud.

To get the most out of this workshop you should have a good understanding of InDesign, its common tools and terminology. We highly recommend completing InDesign 1 and 2 prior to attending this workshop.

It's also helpful to be familiar with a Mac computer. If you are unfamiliar with Mac computers we recommend completing one of our Mac inductions, held monthly, before attending this workshop.

Workshops at The Edge are suitable for participants aged 15 and over, unless otherwise stated. For details on cancellations and refunds, exchanges, age requirements and waitlists please refer to our booking policy. In addition to the ticket price for this event your financial institution may also impose a processing fee.

at Edge Auditorium
State Library of Queensland
Brisbane, Australia

Running Conditioning & Biomechanics for Personal Trainers

Friday, December 19th, 2014

Running Conditioning & Biomechanics for Personal Trainers
Event on 2015-02-21 09:00:00

Running is an exercise which is easily accessible by all and is an activity which all personal trainers can easily perform with their clients. However, due to inexperience in the activity, biomechanical problems are often overlooked which may lead to injuries in the long term. Having a sound biomechanical understanding and the knowledge of how to write a periodised programme will allow your personal training clients to optimise their training potential and achieve new PB’s! At the end of the course you will be able to identify common biomechanical errors in running and suggest corrective drills through the utilisation of Ubersense Technology.

Course Content

  • Introduction to Running Conditioning & Biomechanics
  • When Running Has To Stop – Limiting Factors to Running Performance
  • Fitness Testing For Runners
  • Running Conditioning – The Science Behind The Training
  • Periodisation for Runners
  • Introduction to Biomechanics for Runners
  • Gait Analysis & Biomechanical Assessments for Runners
  • Analysis of Running Styles
  • Improving Running Economy
  • Corrective Running Drills

What do I need to bring on the day?
Pens, clipboards and notepads will be provided. An iphone or ipad with Ubersense in addition to a heart rate monitor will be advantageous however these will be provided to use on the day if required.

Are lunch and refreshments provided?
Lunch is not provided. Drinks and light refreshments will be provided on the day. There are a couple of eating establishments nearby, we will send more information nearer the date, however you may wish to bring your own lunch, snacks and drinks.

What if I need to cancel?
You must give 48 hours notice to receive a full refund. If you cancel with less than 24 hours you will be transferred to an alternative date. You can only transfer courses a maximum of one time.

Are there practical activities on the day?
Yes the course will involve physical activities related to the course content.

What should I wear?
Please wear clothing and footwear which is suitable for exercise. You may wish to bring a spare set of clothing.

Will there be any assessments on the course?
Yes you will be assessed at the end of Day 1 and Day 2. This will be through a verbal Q & A session with the course teacher. You will also be required to complete a case study which will be required to be submitted 2 weeks upon completing the course. You must pass this case study to pass the course.

Do I need any minimum qualifications to attend?
You need to be qualified to a minimum of Level 3.

at Motive8 Fitness Studio
Core B, Parade Building
Leeds, United Kingdom

3hr Beginner’s Photography Class (SF)

Thursday, December 18th, 2014

3hr Beginner’s Photography Class (SF)
Event on 2015-02-07 10:00:00
Become a better photographer and stop using your camera's "Auto" mode in 1 evening.

Have you ever wondered why after spending hundreds of dollars on the latest cameras you still can't get photos you're really proud of? We're not talking about the party snapshots you post on Facebook, but stunning landscapes that can be considered fine art and grab attention for longer than 5 seconds.Learn to capture beautiful photos and never miss a memory again.

This 3 hour class is a crash course in digital photography. Taught in our San Francisco studio (in groups of 20-25 students), you'll learn what all those knobs and dials on your DSLR do, the settings to use in any lighting condition, and even what kind of camera to buy if you don't already have one. You'll understand concepts like exposure, aperture, depth of field and shutter speed, and probably never want to use the "automatic mode" again.

No prior experience or camera equipment is necessary to attend. Just a desire to improve your photography skills. Take this class for yourself or gift it to a friend who's got a photographic itch to scratch.Frequently Asked Questions

  1. What's the class schedule?
    This is a 3 hour class held most Saturdays and Sundays from 10am-1pm, and some weeknights from 6:00pm-9:00pm. The dates are scheduled approximately 1 month in advance, and more dates are added every few weeks.

  2. What's the format of this class?
    It's a group class held in an indoor classroom setting in groups of around 20 students.

  3. I already have some photography experience from high school, or just from playing with my camera. Will this class be useful for me?
    Yes, it could be a good refresher for you to consolidate all the bits and pieces of knowledge you've picked up over the years. You'll also find plenty of inspiration (in the form of some beautiful photos) to get back into photography if you haven't done it in a while. You get to ask any burning questions to a professional photographer. And it's a great way to spend an afternoon in the company of other beginners and amateurs. However, if you already have a good handle on things like shutter speed, aperture, ISO and manual mode, this class is probably going to be too basic for you.

  4. What kind of camera do I need to attend this class?
    Bring whichever camera you currently own. No need to buy anything special or fancy for this class. We explain the differences between simple point & shoot cameras and DSLRs, so you'll be better informed about what kind of camera to buy, should you decide to upgrade your current one.

  5. What else should I bring to class?
    Anything you need to take notes on (pen, paper, iPad, laptop etc) and a snack or drink.

Have more questions? Please shoot us an email for a quick response (faster than calling, leaving a voicemail and waiting to hear back).

at Citizen Space
425 Second Street #300
San Francisco, United States

iPad Class 5: Get eMagazines with Zinio (Evening)

Wednesday, December 17th, 2014

iPad Class 5: Get eMagazines with Zinio (Evening)
Event on 2015-02-11 19:00:00

Use the iPad to download and read free eMagazines using Zinio and your library card! Topics include: downloading the Zinio app, accessing eMagazines, changing font size, and more!

Advanced registration is required per class. Register online, in person, or by phone. No charge. Bring your own iPad or use a Library iPad. 

Please review the Eventbrite Privacy Policy before registering.

at Clarington Public Library, Bowmanville Branch
163 Church St
Bowmanville, Canada

Introduction to Twitter for Business

Tuesday, December 16th, 2014

Introduction to Twitter for Business
Event on 2015-02-09 10:00:00

PNE Enterprise helps people to start up and grow their own businesses around the North East.

We are running a workshop to give you and your staff a brief introduction on how to use Twitter to promote your business effectively!

Want to know if twitter could be useful?
Want to know the kind of content to post to attract more business?
Want to learn about # @ and more?

Book a free place on our 2.5 hour workshop, which will help you get started on how to use this social media, for you and your business.

This is very much an introductory session – more avdanced classes are coming soon.

Ideally in this course you would bring your own mobile phone, ipad or equivalent, laptop etc to 'play around' with twitter while you are in this class – please let us know if this is going to be a problem (we will provide free wifi)

at the beacon
Westgate Rd
Newcastle upon Tyne, United Kingdom

Michelle Miller Harrington as seen on Nickelodeon’s “Moms night out” with Bob Lauver

Tuesday, December 16th, 2014

Michelle Miller Harrington as seen on Nickelodeon’s “Moms night out” with Bob Lauver
Event on 2015-01-09 19:30:00
Michelle was born is a small town in North Carolina where she made others laugh as soon as she could talk. She found any way she could to entertain people, from teaching large dog training classes at a local pet store to being a literal clown. Michelle’s talent has taken her around the world, but her southern roots still remain strong. Michelle can be seen on Nickelodeon's NickMom Night Out, FOX, and on radios stations across the country for her comedic style. Her sweet Southern charm and quick wit are quickly becoming a favorite across the country.  Michelle was featured on the New Comedy Revolution DVD, and voted one of America's funniest comedians.  

at Bonkerz Comedy Club – Crystal River
1590 S. Suncoast Blvd
Homosassa, United States

Habitudes Intensive – Dallas – February 6-7, 2015

Monday, December 15th, 2014

Habitudes Intensive – Dallas – February 6-7, 2015
Event on 2015-02-06 12:00:00
Join us to become a certified facilitator for Habitudes.

This train-the-trainer experience prepares you to effectively use the Habitudes curriculum to teach, mentor and coach the emerging generation.  Past participants have included those facilitating Habitudes small groups, faculty teaching the Habitudes Course, coaches using the Habitudes for Athletes System with their athletic teams and student development staff training young leaders.  In short, this day enables you to make the most of teaching with images.

During this interactive training event, you receive:

  • A Train-the-Trainer experience enhancing your creativity and productivity as a facilitator
  • Habitudes DVD Media Kit (Including Training DVDs, PowerPoint and teaching notes)
  • Habitudes Teacher’s Guide (Including detailed lesson plans, creative ideas, and activities)
  • Wholesale discount on future Habitudes resources (40% off retail) for 24 months following the event
  • A monthly email giving tips and advice on connecting with the next generation and teaching with images
  • A certificate designating you as a Habitudes facilitator for your organization

This day-and-a-half  intensive training event is the ideal preparation for you to teach content from all of the books in the Habitudes series within your organization. Our goal is to prepare effective facilitators to use Habitudes on their campus or within their organization.

Note: This training event is not intended for people who would want to teach the material as a paid vendor. In addition, in order to receive certification, you must stay for the entire event.

at TBD
Dallas, United States

Little Rock January 12

Sunday, December 14th, 2014

Little Rock January 12
Event on 2015-01-12 07:30:00

Program Description:
This comprehensive seminar, including a full hot lunch, covers the increasingly related topics of security/compliance, storage/backup and cloud/sdn. Angelbeat coordinates expert speakers from VMware, Microsoft, HP, Dell, Check Point, AT&T and other top firms – scroll down to see the agenda – who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.

Watch Angelbeat CEO Ron Gerber on Youtube discuss why you should attend. Meals, self-parking and Wi-Fi are provided at no charge, with drawings for an HP tablet, gift cards and other prizes at the end. Given the recent Sony attack/breach and Russian hackers stealing one billion passwords, you definitely want to attend and learn how to protect your confidential data, stored onsite or in the cloud, accessed via wired or wireless network, from any device, against the latest threats.

Join your peers from UALR, State of Arkansas, Crafton Tull, Arkansas Blue Cross, Harrison Energy, Southwest Power Pool, City of Little Rock and many more organizations who are confirmed attendees.

7:30 – 8:40: Registration, Coffee Break/Snacks, Exhibit Area Open, Peer Networking, Product Demonstrations

8:40 – 8:55: Protection against Phishing Attacks with Kaspersky
Kaspersky is the world’s largest privately held, and among the top four security vendors, operating in 200 countries and protecting 300 million users. Its mission is to provide the world's most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target organization's critical IT infrastructure with potentially catastrophic consequences. Their talk will focus on protecting your IT infrastructure and confidential data against the latest and most sophisticated phishing attacks.

8:55 – 9:15: 2014 Year-End Check Point Security Report: Lessons Learned, Recommendations for 2015
Check Point will highlight the 2014 Security Report which provides major security events and current malware trends. The data included in this report is based on collaborative research and in-depth analysis of 200,000+ hours of monitored network traffic from 996 organizations of various industries. Basically, what happened last year, how can you learn from security breaches/attacks at Sony, Chase, Home Depot, etc., and what should you do in 2015 to secure your IT infrastructure and confidential/sensitive data.

To protect against today's evolving threat landscape, while supporting high-demanding IT infrastructures, customers are considering dynamic security architectures. Check Point will introduce a brief description of Software Defined Protection architecture, which provides operational resilience and real-time, proactive protection.

9:15 – 9:30: Protecting your network while navigating social media, with Barracuda
Social media and Web 2.0 applications enable rich user interaction and collaboration, they also open the door to a variety of threats like social media scams, identity theft, Trojans, phishing attacks, botnets, advanced persistent threats, cyberbullying, and data leakage.

During the early years of social media most organizations blocked access to these sites in the workplace because of their adverse impact on productivity. However, today's IT administrators have the dual challenge of providing access to selected Web 2.0 resources, while ensuring the network security and user safety. This is particularly difficult because of the mashed content on social media portals. For example, an organization may want to use Facebook or Twitter for viral marketing campaigns but prevent employees from playing games on Facebook or leaking confidential information through Twitter. This is problematic with traditional content filtering solutions since they either completely block or allow unrestricted access to these types of content and applications.

The Barracuda Web Filter provides extremely granular control over Web 2.0 sites and applications. Administrators can also configure the Barracuda Web Filter to archive outbound social media communications, like Facebook posts, tweets, and web-based email to a message archiving solution, such as the Barracuda Message Archiver. These messages can be indexed and then mined for forensic analysis.

9:30 – 9:45: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis
The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data – that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level.

Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.

Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.

9:45 – 10:05: Detecting and Stopping Advanced Persistent Threats (APT) with LogRhythm
Advanced Persistent Threats, or APTs, are a growing concern in the security industry. APTs differentiate themselves from other types of hacking activities by targeting a specific organization (such as Sony) for a specific target, often extremely high pay-off data. APTs are “advanced” in that the attackers often write customized zero-day malware and exploits specific to their target organization. They will also frequently launch specifically targeted “phishing” attacks in an attempt to exploit user systems. In effect, APTs will harness the full spectrum of logical, physical and social attack vectors – with extreme sophistication and capability.

APTs are “persistent” in that they are extremely patient and methodical in their approach to reconnaissance, target compromise, and data exfiltration. An APT doesn’t care if it takes a week or a year to reach their objective – just so long as they eventually do. There is no single attack vector used by APTs, no single activity pattern, and thus no easy way for an organization to protect itself from an APT. A defense-in-depth strategy across logical, physical, and social boundaries is fundamental.

LogRhythm is able to collect log data from multiple “touch points” as the APT works through the layers of defense; context is provided along with cross-phase correlation and corroboration to determine what is taking place, how and when. While no two APTs are the same, most follow a common lifecycle in which reconnaissance is performed against a target organization, an initial compromise of a host is accomplished and credentials are stolen, tools are installed to maintain access, lateral movement to the target data occurs, and ultimately the target data is exfiltrated. Although this activity is generally done “low and slow,” often utilizing custom malware and/or legitimate credentials to avoid detection, activity at each phase leaves a footprint in the log trail.

LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

10:05 – 10:20: Primary Storage and Flash Technology with Tegile
Tegile is pioneering a new generation of flash-driven enterprise storage arrays that balance performance, capacity, features and price for virtualization, file services and database applications. Its hybrid arrays are significantly faster than legacy arrays and significantly less expensive than all solid-state disk-based arrays. Featuring both NAS and SAN connectivity, these virtual data storage systems are easy-to-use, fully redundant, and highly scalable, plus come with built-in snapshot, replication, near-instant recovery, and virtualization management features.

10:20 – 10:40: Dell Backup/DR/Data Protection for Physical, Virtual, Cloud Platforms
Disaster Recovery/Business Continuity is vitally important in today's always-on world. But when data can be at rest, in use or in motion – and stored on physical, virtual and/or private/public/hybrid clouds – a cost-effective and manageable solution can be very challenging.

Dell will discuss how organizations of all sizes can meet this challenge, through its broad portfolio of scalable solutions that protect data and deliver rapid recoverability across physical, virtual and cloud environments. Its automated processes for validating and verifying the integrity of data helps ensure the success of every recovery. They will also cover:
- Trends in data protection/DR/backup and how cloud, offsite hosting, big data, security/compliance requirements and an increasingly mobile workforce affects business continuity plans
- The value of a common data protection/DR/backup platform that seamlessly and consistently covers legacy physical servers plus data stored on virtual/cloud platforms

10:40 – 11:20: Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction

11:20 – 11:40: HP: Simplify Your Network with Software Defined Networks (SDN)
Software-defined networking (SDN) is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today’s applications. This architecture decouples the network control and forwarding functions, enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services.

In this session, you will learn about the layers of the SDN architecture, how a hybrid SDN deployment can enable you to slowly adopt SDN without the need to “rip and replace,” and how HP has developed an open SDN ecosystem that ensures choice and flexibility. You’ll see how SDN can lower your costs, improve availability and scale, and enable you to deliver services faster.

11:40 – 12:00: Wide Area Network (WAN)/Fiber Optic Infrastructure Configuration/Redundancy from Telecomp and AT&T
The exponential growth of cloud-based applications, many of which are bandwidth intensive such as video, places much greater emphasis/importance on an organization's Wide Area Network (WAN)/Fiber Optic Infrastructure. With mission-critical programs such as Email, ERP, CRM, eCommerce and others now hosted (versus on-site/local installation), IT professionals must pay very close attention to configuration of their WAN infrastructure, to meet the QoS/performance requirements of end users and support DR/BC objectives.

Arkansas-based Telecomp, one of AT&T's largest partners in the United States, will provide valuable insights on how they utilitize technology/services from AT&T and others to configure WAN architectures for their clients.

12:00 – 12:30 Microsoft: Azure Cloud and Infrastructure Services
Microsoft Azure is an open and flexible cloud platform that enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any language, tool or framework. And you can integrate your public cloud applications with your existing IT environment. Here are some of the major features that will be discussed during this informative session:

- Always On: 99.95% monthly SLA enables you to build and run highly available applications without focusing on the infrastructure.
- Open: Use any language, framework, or tool to build applications. Features and services are exposed using open REST protocols. The Windows Azure client libraries are available for multiple programming languages, and are released under an open source license.
- Unlimited Servers and Storage: Easily scale your applications to any size. It is a fully automated self-service platform that allows you to provision resources within minutes. Elastically grow or shrink your resource usage based on your needs. You only pay for the resources your application uses. Windows Azure is available in multiple datacenters around the world.
- Powerful Capabilities: Azure is a flexible cloud platform that can satisfy any application need. It enables you to reliably host and scale out your application code within compute roles. You can store data using relational SQL databases, NoSQL table stores, and unstructured blob stores, and optionally use Hadoop and business intelligence services to data-mine it.
- Security, Identity and Access Management: Azure Active Directory delivers an enterprise ready cloud identity service enabling a single sign-on experience across cloud and on-premises applications. It allows multi-factor authentication for added security and compliance.

FULL HOT LUNCH, Exhibit Area Open, Peer Networking, Product Demonstrations

1:10 – 1:30: BYOD Bring Your Own Device, High-Speed 802.11n/ac WiFi, Access Point Architecture, the "Internet of Things", with Aruba and Promas
During the first weekend of sales, Apple sold over 10 million iPhone 6's. For 2014, there will be sales of ~100 million iPad's and ~400 million Android-powered smartphones and tablets. These devices are often employee-owned and are rapidly making their way to the workplace – the Bring-your-own-Device (BYOD) revolution – creating a new set of security and management challenges for IT departments. Plus each device creates exponential growth in network traffic and data – the Internet of Things.

Attendees will learn about best practices for supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality? What is the best approach for providing guest access to visitors on my corporate network, without any performance degradation or security risks? How can you create an integrated WiFi/cellular strategy that provides for secure and speedy access over any wireless network?

Every tablet and smartphone shares a common feature – they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. For instance, attendees will learn about rf antennae design and controller architecture, and why different vendor's access points, even if they all operate under the same 802.11 standard, nonetheless may have vastly different performance.

1:30 – 2:00: VMware Software Defined Data Center (SDDC) and Cloud Offerings
VMware will outline its strategy/offering/platform for private/public clouds and the software defined data center (SDC), which leverages its core expertise in virtualization in exciting new ways.

Enterprises worldwide have used VMware vSphere to significantly improve IT efficiency and performance, yet the mobile cloud era presents new challenges. To meet this challenge, organizations need to virtualize the rest of the data center so all infrastructure services become as inexpensive and easy to provision and manage as virtual machines. The answer is the software-defined data center (SDDC): the ideal architecture for private, public, and hybrid clouds. Pioneered by VMware and recognized by the industry and analysts alike, SDDC extends the virtualization concepts you know – abstraction, pooling and automation – to all data center resources and services.

VMware cloud solutions improve IT efficiency, agility and reliability, while helping drive innovation. They deliver everything an organization needs to build, operate, rent and manage their cloud, even beyond the data center. IT executives get the freedom and flexibility to move workloads seamlessly and securely between an onsite data center/ internal private cloud to a hybrid and/or public cloud. Leveraging cloud services from VMware and/or a certified VMware vCloud service provider, you can run your applications onsite, offsite or both, without compromise.

End of Event, Raffle Prize Drawings for an HP Tablet, Gift Cards and other great items!


What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.

However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.

If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.

Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.

As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.

All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.

What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self-parking at the venue.

What is the dress code
Suggested dress is business casual.

What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.

at Clarion Hotel Medical Center
925 S University Ave
Little Rock, United States

Gary Owen

Saturday, December 13th, 2014

Gary Owen
Event on 2015-01-04 18:30:00
Jan. 2-4 **Special Event** Ticket Price: .00 Fri/Sat/Sun Gary Owen has been entertaining America for more than a decade with his side-splitting comedy. Having performed to sold-out audiences in all the major comedy clubs and theatres across the country, Owen is one of America’s most loved comedians. Gary most recently starred in the Screen Gems blockbuster film “Think Like A Man” which opened at #1 at the box office this spring. His hit one-hour Showtime special “True Story” is now available on DVD. Gary is also the new host of the Shaquille O’Neal “All-Star Comedy Jam” which is touring the country. He can also be seen this fall in the funny video/sketch show “Upload” which he co-hosts with Shaquille O’Neal for TruTV.

at Comedy Club Stardome
1818 Data Drive
Birmingham, United States

AromaTouch – Maricopa, AZ

Friday, December 12th, 2014

AromaTouch – Maricopa, AZ
Event on 2015-01-10 10:00:00


doTERRAs AromaTouch Technique is a clinical approach to applying essential oils along energy meridians and visceral contact points of the back and feet to help stimulate and balance sympathetic and para-sympathetic nervous systems of the body. The AromaTouch technique improves well-being by reducing physical and emotional stressors and by supporting healthy autonomic function. The technique is simple and intuitive and uses doTERRAs Certified pure Therapeutic Grade essential oils for an unparalleled grounding experience. 

Pre-register as space is limited and will fill up. Cost: 9. Covers 6 Hours of Instruction, Training DVD, Training Manual, 8 doTERRA CPTG Oils, Demonstration and hands on training, Certification from doTERRA

What to bring: Notebook, Pen, doTERRA ID, Comfortable clothes, Button up the front shirt or robe, Water & Snacks. We will have a 30 minute lunch break & would recommend bringing a lunch. 


Trainer Contact: Allison Huish, allison.innerbrilliance@gmail.com

Please e-mail for more details or questions. 

at TBA
42498 W. Monteverde Drive
Maricopa, United States