CEDPA Logo Conference Central

Main Speakers
Breakout Sessions
Technology Center Sessions
Technology Sessions Schedule
Technology Center
Vendor Exhibits
Past Conferences
CEDPA Conference Central
        Riviera Resort & Raquet Club

The 42nd Annual Conference
Was on October 16-18, 2002 at the
Riviera Resort & Raquet Club
Palm Springs, California 92262

If you weren't at this conference, you missed out on the best resource of the year for k-12 educational technologists.  You will have another chance to meet up with your colleagues by attending our Mini Conference held on May 1, 2003 in Long Beach at CSU Chancellors Office.

If your looking for a PowerPoint or other materials on a session you attended, click here for a quick list of presentations we have online.  We will post the presentations as we receive them along with a session description.

Breakout Sessions
Breakout sessions to be offered at this year's conference include:
  • No Data Left Behind - State Wide Data Collection - Bob Friedman, Russ Brawn
  • Unifying PC's and Mac's under Active Directory - George Kardasopoulos
  • Digital Lockers - Warren Williams
  • Web-based Help Desks for K-12 School Districts - Scott Vanderlip, Kitty Peterson
  • Innovative Approaches to Erate Discounts - Joyce Stanbrough
  • Effectively Monitoring and Managing Inappropriate Use of School Networks - Dori Hicks
  • Public Key Infrastructure - Chris Hall
  • CTAP:Assisting with the Data Collection Process - Marianne Pack
  • Netware 6 Server Clustering and SAN Implementation Project - Tim Templeton
  • Control Bandwidth Hogging Applications - Stan Trevena, Harold Rhodes - Download Presentation
  • How to Fulfill K-12 Technology Plans - Al Foytek
  • Implementing 802.1X wireless security in schools - Kerry Johnson
  • School Provisioning Using SIF - Rick Kempton
  • The Extraordinary Benefits of IT Enterprise Service Management - John Wilkenson
  • Fill the Identifier Bill - Martha Friedrich
  • Managing Window 2000 in K-12 Environments - Alan Preis
  • Who Done It? Using Forensic Technology to Conduct Computer Investigations - Andy Prestage
  • Creating Wireless Metropolitan Networks - Al Pfeltz
  • Strategies for Maximizing Your E-rate Discounts - Wayne Shizmu
  • Use of Different Technologies to Maximize Resources - Dr. George Araya
  • Secure and Optimize your Wlan - Paul Parson
  • Converged Network: A Success Story - Rob Chambers
  • Exchange 2000 Migration - Microsoft Presenter
  • CMAS - Maximize Your Purchasing Dollar - Robert Riviera
  • Next Generation MAN's - Bill Kelly
  • Incidents Happen: Disasters Optional - Maureen Beekman
  • Integrating Mac OS X in Novell Netware - Dan Sinema
  • How to Keep Recreational Traffic from Crippling your Network - Steve Marks
  • When Network Vandals Attack - Ed Lamaster
  • Video-on-Demand - Chris Riegel
  • Deploying 3500 Wireless Laptops For 4th Through 12th Grade Students In One Year. - Art Cipriano
  • Build a Comprehensive Enterprise Information Portal (EIP) - Leana Benson