Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Data Management - set up a survey, working with the Data Administrators CG, on data management
  • Case Studies - set up a series of pod-casts case studies on "How Architecture is Implemented on Your Campus"
  • Selling Points - develop a selling points document, pod-casts, white paper on selling points for implementing and supporting an EA/IT Architecture group
  • Business Rules Repository - post a set of links and documents that talk about what a Business Rule Repository is and its function in the enterprise
  • As ITANA Grows - develop a plan for the future as ITANA grows
Tip
titleAll Topics

See a consolidated view of presentations and notes for all topics

Agenda:

Time

Activity

Session Leader

9:00AM

Convene

 

9:00 to 9:15 AM

Welcome, logistics et al - Opening Remarks F2F2008

Jim Phelps

9:15 to 10:15 AM

Session 1 - Tools of the trade

Tom Barton

 

We'll showcase some of the tools, methodologies, artifacts, techniques, or tactics that we use to engender increased architectural coherence across the infrastructures and business & operational processes we're connected with. The session will help us to think about the range of ways in which we might influence others by use of the tools with which we engage them.

 

10:15 to 10:30 AM

break

 

10:30 to Noon

Session 2 - Case Studies: Architecture on Your Campus

Jim Hooper

 

This session will focus on Case Studies from several institutions including: Descriptions of ongoing Enterprise Architecture programs in your university. How, Who, What, and any impacts the program has had/is having on your IT environment. Descriptions of specific projects that have been significantly impacted (positively) by the Enterprise Architecture program.

 

Noon to 1:00PM

Lunch

 

1:00 to 2:30 PM

Hot Topics - Data Management

Klara Jelinkova

 

There is a rich set of metadata and middleware needed to support the data classification we are starting to put in place for at least business applications. And the need will become even greater once we develop the same classifications for all of our institutional data including research data. Institutions seem to have a pretty good handle at least theoretically on business data. But once we start to cross over to other assets such as data associated with research, teaching and learning most IT organizations seem to give up. That type of data is viewed by most IT organizations in our institutions as someone else's problem. However it is an important IT and security problem. With collaborative research taking place everywhere how do we classify the research data, protect it while the research is going on and then enable everyone to see after the research is published? How do we collaborate with the libraries on this one? How do we arrive at data management policies that cut across the whole institution? What are some of the examples of institutions doing it successfully today?

 

2:30 to 2:45

break

 

2:45 to 3:45

Hot Topics - Security Architecture

Steve Kellogg

 

I will present on Penn State's current and future strategies for Identity and Access Management along with our efforts to affect better security of the endpoints. I am looking for other presentations on topics related to enterprise security architecture. Suggested topics might be other's take on identity and access management, network security measures, multi-tiered service provisioning, social engineering, computer forensics, or any number of other topics that make up what we think of as components of a security architecture.

 

3:45 to 4:00

break

 

4:00 to 4:45

Hot Topics - Your items here

Jim Phelps

4:45 to 5:00

Closing Remarks

Jim Phelps

...