Face 2 Face 2008 – Register Now

Authors

ITANA Face 2 Face 2008 Registration now open. Registration is limited to two people from each institution so you should talk amongst yourselves and figure out who will attend. Additional people will be allowed if space permits. Please use the Registration Form to sign up. You should receive a confirmation email within 24 hours. Space is limited so sign up early. See you in Minneapolis – Jim Phelps, Chair.Join us in Minneapolis, Minnesota for the ITANA Face 2 Face 2008 meeting. Join with your peers in an intimate day-long meeting and discuss a rich agenda of current topics. This conference is jointly sponsored by EDUCAUSE and Internet2.

Date: June 18, 2008

Time: 9AM to 5PM

Location: Hilton Minneapolis

Hotel registration information will be sent upon receipt of your registration request.  

&nbsp

Agenda:

Time Activity Session Leader
9:00AM Convene  
9:00 to 9:15 AM Welcome, logistics et al Jim Phelps
9:15 to 10:15 AM Session 1 – Case Studies: Architecture on Your Campus Hebert Diaz-Flores
  This session will focus on Case Studies from several institutions including: Descriptions of ongoing Enterprise Architecture programs in your university. How, Who, What, and any impacts the program has had/is having on your IT environment. Descriptions of specific projects that have been significantly impacted (positively) by the Enterprise Architecture program.  
10:15 to 10:30 AM break  
10:30 to Noon Session 2 – Tools of the trade Tom Barton
  We’ll showcase some of the tools, methodologies, artifacts, techniques, or tactics that we use to engender increased architectural coherence across the infrastructures and business & operational processes we’re connected with. The session will help us to think about the range of ways in which we might influence others by use of the tools with which we engage them.  
Noon to 1:00PM Lunch  
1:00 to 2:15 PM Session 3 – Artifacts and Templates Jim Phelps
  We all create a variety of Artifacts for our work. Share those artifacts and templates that you have found exceptionally useful in your work. Do you have something that seemed like a great idea but failed miserably? Tell us about why it failed and what you learned.  
2:15 to 2:30 break  
2:30 to 3:30 Session 4 – Data Management Working Group Klara Jelinkova
  There is a rich set of metadata and middleware needed to support the data classification we are starting to put in place for at least business applications. And the need will become even greater once we develop the same classifications for all of our institutional data including research data. Institutions seem to have a pretty good handle at least theoretically on business data. But once we start to cross over to other assets such as data associated with research, teaching and learning most IT organizations seem to give up. That type of data is viewed by most IT organizations in our institutions as someone else’s problem. However it is an important IT and security problem. With collaborative research taking place everywhere how do we classify the research data, protect it while the research is going on and then enable everyone to see after the research is published? How do we collaborate with the libraries on this one? How do we arrive at data management policies that cut across the whole institution? What are some of the examples of institutions doing it successfully today?  
3:30 to 3:45 break  
3:45 to 4:45 Session 5 – Security Architecture Hot Topics Steve Kellogg
  There are many elements that make up security Architecture. The actual measures available and/or employed by the various institutions to secure our online applications make for interesting discussions. In this session, I plan to present on topics of what we are doing and are planning to do at Penn State with regards to identity management, access control, and securing endpoints. Others may present on topics of network security measures, multi-tier service provisioning, social engineering, computer forensics, logging and log analysis, their respective take on ID and access management, and anything else they feel is relevant to security architecture.  
4:45 to 5:00 Closing Remarks Jim Phelps

Technorati Tags: , , , ,

%d bloggers like this: