Call For Presentations
Cloud in the Enterprise Data Center Modernization Responsibly Architected Application Solutions The Dark Side of Virtualization Big Data - Big Analytics - Big Needs SHARE, it’s not an acronym; it’s what we do!SHARE in Atlanta
Sunday, March 11, 2012 - Friday, March 16, 2012
Atlanta, GA
Suggested Hot Topics for 2012
Cloud computing is not just vaporware anymore. IT organizations are adopting cloud as a service paradigm that has supporting infrastructure and software technologies. They are deploying private clouds in order to manage access, security and reliability. How does a business choose between build vs buy? How might they use cloud as a resource for disaster recovery, business continuity or business resilience?
This is hard to do, but really needed. If you are fortunate enough to be funded to improve your data centers and infrastructure, the fun is just beginning. How do you deal with the prior use of the ground you might build on? How do you deliver green computing instead of just greenhorn computing? What should the data center of the future look like? Expectations are that doing all this will reduce cost of delivering services from your mainframe as well as other servers. Is that true, or must we address this expectation? Assuming we meet all the previous requirements, what is your plan to deal with the pending shortage of qualified IT employees?
We are all faced with issues and opportunities that extend beyond the server infrastructure. Not only are we expected to deliver application solutions that perform their assigned tasks efficiently and correctly, they also are expected to be resilient (bullet proof) and secure. Organizations are expected to do this whether you develop you solutions in house or integrate purchased solutions. How are we going to do all that?
We all understand the efficiencies that can be realized with virtualization such as reduction of power needs, reduction of space needs and improved reliability. But do we understand the issues that virtualization may introduce in terms of management complexity, security, performance and privacy. For example, when you create a virtual LAN to connect virtual systems, how do you do intrusion detection or provide some service like firewall? Now that we have hundreds of guest servers, how are we going to perform maintenance on the hosting system?
We have seen the opportunities to manage Big Data and derive benefits never before realizable. But do we comprehend the underlying requirements for bandwidth, processing capacity and storage capacity? Do we have a plan to manage those as well as the inherent security, compliance and privacy issues? Do you have any plan to manage personally identifiable information (PII) in that environment? With all that accomplished, now how do we deliver the data to the processes that will analyze it? What parts of our business would benefit most if we manage to solve these issues?
Submitting a Session
Please click on the arrow next to each session type below to read full Program descriptions and to access the submission links for each session type. Unless you are familiar with the Program structure of SHARE, please select 'General Submissions' as the topic for your submission.
The deadline for submitting a session is Friday October 14th, 2011.
To Login to an Existing Session
If you have already submitted a Session and you wish to VIEW, RESUME, EDIT or WITHDRAW that submission, then log in below using the Session ID Number and Password already provided to you:
Lost Password? Click here and we will send you another email with a link to your submission.