SHARE - Call For Presentations

SHARE in Orlando Call for Presentations

SHARE in Orlando 2015
Sunday, August 9, 2015 - Friday, August 14, 2015
Orlando, FL

Share |

Suggested Hot Topics for SHARE in Orlando

New z13 and z Systems
In January 2015, IBM made major new hardware and software announcements in the z Systems (formerly System z) space. The new z13 processor family is the first mainframe designed for the mobile economy. It can handle up to up to 2.5 billion transactions per day with embedded analytics, capable of delivering real-time transaction insights for fraud detection and similar needs, along with real-time encryption of all transactional data at any scale. In addition, the z13 provides a robust, secure, fully-virtualized platform for industrial-strength cloud computing while continuing to deliver on IBM's promise of upward compatibility and significantly better performance for existing production workloads with each new processor hardware generation.

Security in the Enterprise
In today's extended compute environment of big business data, increased usage of mobile devices and incorporation of social into the business environment the potential security threats and increased need for having the ultimate security protection of data and transactions is the top of the list for businesses. The cloud computing model offers some security, often at one size fits all, with unknown risks typically borne by the organization.. The ability to control access points according to corporate policy and in compliance with governmental policies is changing the way corporations set up their systems and prepare for audits. Consider including security disciplines ranging from intrusion detection, data access and protection, user identification and authentication, encryption, key management, auditing and compliance, and more!

Mobile and Social Networking in the Enterprise
Mobile devices and Social Networking have taken off at an astonishing rate, and that trend is only going to continue. This explosion is certainly making its presence felt in the corporate world. IT needs to take control of the situation quickly. But what exactly should we be concerned about? Security? Performance? Capacity? What policies need to change? What automation options are available?

Cloud as a Disruptive Technology
Cloud computing has all the markings of a disruptive technology as it proposes to change the enterprise IT environment of traditional on-premise hosted applications and infrastructure. Cloud computing promises greater scalability, utility-based pricing, fewer IT technical skills required by the consumer (your enterprise), quick provisioning and ubiquity among applications, consumers and potentially among cloud computing vendors. The drawbacks in a public or hybrid cloud include security and data privacy, compliance, open standards, integration with existing business processes and enterprise IT control. Private cloud hosting, on the other hand, is a single-tenant environment where the hardware, storage and network are dedicated to a single client or company but is often located at a hosting site. Cloud computing may also drastically change the application development and delivery environment. The enterprise must find ways to integrate these capabilities into its own suite of services, perhaps through changes to IT business models.

Big Data - Big Analytics - Big Needs
We have seen the opportunities to manage Big Data and derive benefits never before realizable. But do we comprehend the underlying requirements for bandwidth, processing capacity and storage capacity? Do we have a plan to manage those as well as the inherent security, compliance and privacy issues? Do you have any plan to manage personally identifiable information (PII) in that environment? With all that accomplished, now how do we deliver the data to the processes that will analyze it? What parts of our business would benefit most if we manage to solve these issues?

SHARE, it’s not an acronym; it’s what we do!




Submitting a Session

Please click on the arrow next to each session type below to read full Program descriptions and to access the submission links for each session type. Unless you are familiar with the Program structure of SHARE, please select 'General Submissions' as the topic for your submission.

The deadline for submitting a session is Friday, April 10, 2015.


Application Architecture Development

Enterprise Data Center

General Submissions

Information Management

Linux & VM

MVS

SHARE-wide



To Login to an Existing Session

If you have already submitted a Session and you wish to VIEW, RESUME, EDIT or WITHDRAW that submission, then log in below using the Session ID Number and Password already provided to you:

Session ID#        Password        

Lost Password? Click here and we will send you another email with a link to your submission.