ABC TV •
AETNA •
AIG •
American Red Cross •
Bank of NY •
Barnes & Noble •
Bear Stearns •
Bloomberg •
Bristol Myers Squibb •
Cablevision •
CBS •
Citigroup •
City of NY •
City of Philadelphia •
CNN •
Colgate Palmolive •
Comcast •
Con Edison •
Cornell Medical •
D&B; •
Deloitte & Touche •
Dept of Homeland Security •
Deutsche Bank •
Dow Jones •
EMI Music •
Ernst & Young •
ETrade •
ExxonMobile •
FBI •
FDNY •
Federal Reserve Bank •
GE •
Goldman Sachs •
Gov of Israel •
HBO •
IRS •
JP Morgan Chase •
J&J; •
Kraft Foods •
Lehman Bros •
Lockheed Martin •
Mastercard •
Merck •
NBC •
State of NJ •
NY Life •
NYU •
Newsweek •
NJ Transit •
Novartis •
NYPD •
PepsiCo •
Prudential •
Reuters •
Staples •
McGraw Hill •
TIME •
United Nations •
UPS •
US Army •
Verizon •
Viacom •
Warner Bros •
Wachovia •
Wired Mag •
Yale University
Key IT Topics
The Shifting Sands of Corporate Systems: Extracting ROI
The 2006 Conference Program is packed with evidence of change in the commercial and consumer computing models.
Obsessive connectivity, coupled with the re-emergence of thick-thin application models, rattled by security problems,
and kicked hard by new generation hardware performance new systems models are bringing both spectacular performance,
and a new rash of anxieties. Internationalization, a newly recharged economy, and the prospect of major IS/IT
expenditures now fuels new trends of thinking about the role of computing in this fast-paced corporate society.
Security
So many devices, so many cracks. Now that the majority of computing devices sold are portable—notebooks, PDAs,
and intelligent phones-- our dependency on them had mandated a metamorphosis in corporate security emphasis.
No longer are simple firewalls, passwords, and virus detectors able to do the job. New and sophisticated security
models are becoming de rigueur and mandatory in this litigation and regulatory-charged atmosphere. This track
examines the new models in organizational, location, and personal security policies, architectural models,
and systems/device protection methodologies.
Dynamic Systems
Corporate systems infrastructure now contains a mixture of static/backbone systems, coupled to highly-mutable,
rapidly-deployed platforms. This track examines the hot topics of server and process virtualization, virtualization
and systems/clustered systems management, and the impact of multi-core server architectures with the rise of
operating systems-enabled virtualizations
Controlling Storage
Whether a patchwork of Network Attached Storage Devices/NAS, truckloads of SAN devices, increasing availability of
storage systems, or the expansive regulatory needs of archiving and availability, storage is going out of control.
This track examines organizational/branch storage hierarchies, as well as the core issues surrounding storage security,
archiving mandates, storage system architectures, rapidly-extensible storage infrastructure, and storage assets control.
Personal-Corporate Computing Life
The computing relationship for individuals has evolved into a multi-level, and hopefully cohesive relationship with
corporate computing systems. The role of the individual and team has moved to a prominent and highly-visible position
within organizations. Collaborative applications, shared platforms, and high accessibility must meet the challenges of
security, document control, IP management, customer relations management, as well as both specific and general work
applied towards organizational goals. This track examines the policies, procedures, compliance needs, and business
process trends that relate the individual to their roles within organizations.
US-CCA Connected Community Program
The US-CCA’s C3Expo Program highlights broadband access as the fifth utility, and the infrastructure
needed to complete this task. Managed by the US-CCA organiztion
ISACA / Compliance
The Information Systems Audit and Control Association is pleased to announce that ISACA will hold its first annual Compliance
Conference as part of the C3 event in NYC June, 2006. This unique event will focus on how information technologies can be used to
solve compliance issues. ISACA is a recognized global leader in IT governance, control and assurance. In the three decades since
its inception, ISACA has become a pace setting global organization for information governance, control, security and audit
professionals. ISACA and its 47,000-plus members will add a very strong and qualified group of attendees to the already highly qualified C3 audience.
Wireless Everywhere
Between WiFi, WiMax, and other standards, organizations are building mobility into their organizations,
but not without risk. This track examines the issues behind system build-out, design alternatives,
security issues, and optimizing network infrastructure for new services, such as WiFi VoIP,
meshed networks, and new alternatives, such as MIMO, channel-bonded networks, and other issues.
RFID Real World Solutions™
Radio Frequency Identification (RFID) is driving the next wave of business process automation by making it possible to
wirelessly track and control the movement of goods from the assembly line to the store shelf. Around the globe, the
majorities of businesses in every market sector are either researching RFID or are in some stage of actual implementation.
Not only is RFID being used in the supply chain to comply with mandates, but RFID is used internally by many small and
mid-sized organizations to transform operations, improve customer service, expedite the launch of new products or comply
with regulatory guidelines. This program is entirely end-user driven and will cover both supply chain and so-called “closed-end loop”
applications in such areas as asset management and facility maintenance, repair and operations. In addition, specific
vertically-focused presentations will highlight the opportunities and challenges of RFID in such areas as specialty retailing,
the cold supply chain, manufacturing and food processing, as well as the business value of combining RFID with sensor technologies.
Untitled Document
Red Hat is a proud sponsor of the C3 Conference Program.