SHARE Atlanta Call for Presentations
DevOps in the Enterprise New and Innovative Workloads for z Systems Security in the Enterprise Mobile and Social Networking in the Enterprise Cloud as a Disruptive Technology Big Data - Big Analytics - Big Needs SHARE, itís not an acronym; itís what we do!
Sunday, July 31, 2016 - Friday, August 5, 2016
Suggested Hot Topics for SHARE Atlanta
A set of application development and operational practices that brings together all aspects of a business working towards the goal of delivery of business value. These practices stress communication, collaboration, integration, automation, and measurement of cooperation between software developers, data center operations, the business community and all other information-technology (IT) professionals needed to implement a solution. Processes such as Continuous Integration, Continuous Delivery, and Shift Left Testing are examples of the associated practices. SHARE will focus on how these practices impact the traditional systems of record in the enterprise and the professionals that support them.
Have you heard the myth that the mainframe is a "one trick dinosaur"? That the mainframe is dying off because it can't run the newer workloads of the 21st century? Well, the presentations in this track will explode those myths and more. Speakers will tell you about what the modern mainframe is doing and where it is going in the future.
In todayís extended compute[r] environment of big business data, increased usage of mobile devices and incorporation of social into the business environment the potential security threats and increased need for having the ultimate security protection of data and transactions is the top of the list for businesses. The cloud computing model offers some security, often at one size fits all, with unknown risks typically borne by the organization. The ability to control access points according to corporate policy and in compliance with governmental policies is changing the way corporations set up their systems and prepare for audits. Consider including security disciplines ranging from intrusion detection, data access and protection, user identification and authentication, encryption, key management, auditing and compliance, and more!
Mobile devices and social networking have taken off at an astonishing rate, and that trend is only going to continue. This explosion is certainly making its presence felt in the corporate world. IT needs to take control of the situation quickly. But what exactly should we be concerned about? Security? Performance? Capacity? What policies need to change? What automation options are available?
Cloud computing has all the markings of a disruptive technology as it proposes to change the enterprise IT environment of traditional on-premise hosted applications and infrastructure. Cloud computing promises greater scalability, utility-based pricing, fewer IT technical skills required by the consumer (your enterprise), quick provisioning and ubiquity among applications, consumers and potentially among cloud computing vendors. The drawbacks in a public or hybrid cloud include security and data privacy, compliance, open standards, integration with existing business processes and enterprise IT control. Private cloud hosting, on the other hand, is a single-tenant environment where the hardware, storage and network are dedicated to a single client or company but is often located at a hosting site. Cloud computing may also drastically change the application development and delivery environment. The enterprise must find ways to integrate these capabilities into its own suite of services, perhaps through changes to IT business models.
We have seen the opportunities to manage Big Data and derive benefits never before realizable. But do we comprehend the underlying requirements for bandwidth, processing capacity and storage capacity? Do we have a plan to manage those as well as the inherent security, compliance and privacy issues? Do you have any plan to manage personally identifiable information (PII) in that environment? With all that accomplished, now how do we deliver the data to the processes that will analyze it? What parts of our business would benefit most if we manage to solve these issues?
Submitting a Session
Please click on the arrow next to each session type below to read full Program descriptions and to access the submission links for each session type. Unless you are familiar with the Program structure of SHARE, please select 'Hot Topics' as the topic for your submission.
DevOps in the Enterprise
New and Innovative Workloads for z Systems
Security in the Enterprise
Mobile and Social Networking in the Enterprise
Cloud as a Disruptive Technology
Big Data - Big Analytics - Big Needs
SHARE, itís not an acronym; itís what we do!
The deadline for submitting a session is Friday, April 15, 2016.
To Login to an Existing Session
If you have already submitted a Session and you wish to VIEW, RESUME, EDIT or WITHDRAW that submission, then log in below using the Session ID Number and Password already provided to you:
Lost Password? Click here and we will send you another email with a link to your submission.