SHARE - Call For Presentations

SHARE in Seattle Call for Presentations

SHARE in Seattle 2015
Sunday, March 1, 2015 - Friday, March 6, 2015
Seattle, WA

Share |

Suggested Hot Topics for SHARE in Seattle

Security in the Enterprise
In today's extended compute environment of big business data, increased usage of mobile devices and incorporation of social into the business environment the potential security threats and increased need for having the ultimate security protection of data and transactions is the top of the list for businesses. The cloud computing model offers some security, often at one size fits all, with unknown risks typically borne by the organization.. The ability to control access points according to corporate policy and in compliance with governmental policies is changing the way corporations set up their systems and prepare for audits. Consider including security disciplines ranging from intrusion detection, data access and protection, user identification and authentication, encryption, key management, auditing and compliance, and more!

Mobile and Social Networking in the Enterprise
Mobile devices and Social Networking have taken off at an astonishing rate, and that trend is only going to continue. This explosion is certainly making its presence felt in the corporate world. IT needs to take control of the situation quickly. But what exactly should we be concerned about? Security? Performance? Capacity? What policies need to change? What automation options are available?

Cloud as a Disruptive Technology
Cloud computing has all the markings of a disruptive technology as it proposes to change the enterprise IT environment of traditional on-premise hosted applications and infrastructure. Cloud computing promises greater scalability, utility-based pricing, fewer IT technical skills required by the consumer (your enterprise), quick provisioning and ubiquity among applications, consumers and potentially among cloud computing vendors. The drawbacks in a public or hybrid cloud include security and data privacy, compliance, open standards, integration with existing business processes and enterprise IT control. Private cloud hosting, on the other hand, is a single-tenant environment where the hardware, storage and network are dedicated to a single client or company but is often located at a hosting site. Cloud computing may also drastically change the application development and delivery environment. The enterprise must find ways to integrate these capabilities into its own suite of services, perhaps through changes to IT business models.

The Dark Side of Virtualization
We all understand the efficiencies that can be realized with virtualization such as reduction of power needs, reduction of space needs and improved reliability. But do we understand the issues that virtualization may introduce in terms of management complexity, security, performance and privacy. For example, when you create a virtual LAN to connect virtual systems, how do you do intrusion detection or provide some service like firewall? Now that we have hundreds of guest servers, how are we going to perform maintenance on the hosting system?

Big Data - Big Analytics - Big Needs
We have seen the opportunities to manage Big Data and derive benefits never before realizable. But do we comprehend the underlying requirements for bandwidth, processing capacity and storage capacity? Do we have a plan to manage those as well as the inherent security, compliance and privacy issues? Do you have any plan to manage personally identifiable information (PII) in that environment? With all that accomplished, now how do we deliver the data to the processes that will analyze it? What parts of our business would benefit most if we manage to solve these issues?

SHARE, it’s not an acronym; it’s what we do!




Submitting a Session

Please click on the arrow next to each session type below to read full Program descriptions and to access the submission links for each session type. Unless you are familiar with the Program structure of SHARE, please select 'General Submissions' as the topic for your submission.

The deadline for submitting a session is Friday, October 24, 2014.


Application Architecture Development

Enterprise Data Center

General Submissions

Information Management

Linux & VM

MVS

SHARE-wide



To Login to an Existing Session

If you have already submitted a Session and you wish to VIEW, RESUME, EDIT or WITHDRAW that submission, then log in below using the Session ID Number and Password already provided to you:

Session ID#        Password        

Lost Password? Click here and we will send you another email with a link to your submission.