ITANA Face 2 Face 2008 Registration now open.
NOTE: The hotel block closes May 18, 2008.
Please use the Registration Form to sign up. You should receive a confirmation email within 24 hours. Space is limited so sign up early.
Join us in Minneapolis, Minnesota for the ITANA Face 2 Face 2008 meeting. Join with your peers in an intimate day-long meeting and discuss a rich agenda of current topics. See you in Minneapolis – Jim Phelps, Chair.
Date: June 18, 2008
Time: 9AM to 5PM
Location: Hilton Minneapolis
Hotel registration information will be sent upon receipt of your registration request.
|9:00 to 9:15 AM||Welcome, logistics et al||Jim Phelps|
|9:15 to 10:15 AM||Session 1 – Tools of the trade||Tom Barton|
|We’ll showcase some of the tools, methodologies, artifacts, techniques, or tactics that we use to engender increased architectural coherence across the infrastructures and business & operational processes we’re connected with. The session will help us to think about the range of ways in which we might influence others by use of the tools with which we engage them.|
|10:15 to 10:30 AM||break|
|10:30 to Noon||Session 2 – Case Studies: Architecture on Your Campus||Jim Hooper|
|This session will focus on Case Studies from several institutions including: Descriptions of ongoing Enterprise Architecture programs in your university. How, Who, What, and any impacts the program has had/is having on your IT environment. Descriptions of specific projects that have been significantly impacted (positively) by the Enterprise Architecture program.|
|Noon to 1:00PM||Lunch|
|1:00 to 2:30 PM||Hot Topics – Data Management||Klara Jelinkova|
|There is a rich set of metadata and middleware needed to support the data classification we are starting to put in place for at least business applications. And the need will become even greater once we develop the same classifications for all of our institutional data including research data. Institutions seem to have a pretty good handle at least theoretically on business data. But once we start to cross over to other assets such as data associated with research, teaching and learning most IT organizations seem to give up. That type of data is viewed by most IT organizations in our institutions as someone else’s problem. However it is an important IT and security problem. With collaborative research taking place everywhere how do we classify the research data, protect it while the research is going on and then enable everyone to see after the research is published? How do we collaborate with the libraries on this one? How do we arrive at data management policies that cut across the whole institution? What are some of the examples of institutions doing it successfully today?|
|2:30 to 2:45||break|
|2:45 to 3:45||Hot Topics – Security Architecture||Steve Kellog|
|I will present on Penn State’s current and future strategies for Identity and Access Management along with our efforts to affect better security of the endpoints. I am looking for other presentations on topics related to enterprise security architecture. Suggested topics might be other’s take on identity and access management, network security measures, multi-tiered service provisioning, social engineering, computer forensics, or any number of other topics that make up what we think of as components of a security architecture.|
|3:45 to 4:00||break|
|4:00 to 4:45||Hot Topics – Your items here||Jim Phelps|
|4:45 to 5:00||Closing Remarks||Jim Phelps|
NOTE: This conference is jointly sponsored by EDUCAUSE and Internet2. Thank you sponsors.