...
Tip | ||
---|---|---|
| ||
See a consolidated view of presentations and notes for all topics |
Agenda:
Time | Activity | Session Leader |
---|---|---|
9:00AM | Convene |
|
9:00 to 9:15 AM | Welcome, logistics et al - Opening Remarks F2F2008 | Jim Phelps |
9:15 to 10:15 AM | Session 1 - Tools of the trade | Tom Barton |
| We'll showcase some of the tools, methodologies, artifacts, techniques, or tactics that we use to engender increased architectural coherence across the infrastructures and business & operational processes we're connected with. The session will help us to think about the range of ways in which we might influence others by use of the tools with which we engage them. |
|
10:15 to 10:30 AM | break |
|
10:30 to Noon | Session 2 - Case Studies: Architecture on Your Campus | Jim Hooper |
| This session will focus on Case Studies from several institutions including: Descriptions of ongoing Enterprise Architecture programs in your university. How, Who, What, and any impacts the program has had/is having on your IT environment. Descriptions of specific projects that have been significantly impacted (positively) by the Enterprise Architecture program. |
|
Noon to 1:00PM | Lunch |
|
1:00 to 2:30 PM | Hot Topics - Data Management | Klara Jelinkova |
| There is a rich set of metadata and middleware needed to support the data classification we are starting to put in place for at least business applications. And the need will become even greater once we develop the same classifications for all of our institutional data including research data. Institutions seem to have a pretty good handle at least theoretically on business data. But once we start to cross over to other assets such as data associated with research, teaching and learning most IT organizations seem to give up. That type of data is viewed by most IT organizations in our institutions as someone else's problem. However it is an important IT and security problem. With collaborative research taking place everywhere how do we classify the research data, protect it while the research is going on and then enable everyone to see after the research is published? How do we collaborate with the libraries on this one? How do we arrive at data management policies that cut across the whole institution? What are some of the examples of institutions doing it successfully today? |
|
2:30 to 2:45 | break |
|
2:45 to 3:45 | Hot Topics - Security Architecture | Steve Kellogg |
| I will present on Penn State's current and future strategies for Identity and Access Management along with our efforts to affect better security of the endpoints. I am looking for other presentations on topics related to enterprise security architecture. Suggested topics might be other's take on identity and access management, network security measures, multi-tiered service provisioning, social engineering, computer forensics, or any number of other topics that make up what we think of as components of a security architecture. |
|
3:45 to 4:00 | break |
|
4:00 to 4:45 | Hot Topics - Your items here | Jim Phelps |
4:45 to 5:00 | Closing Remarks | Jim Phelps |
...