Home
|
General
What is Catalyst?
Who Attends Catalyst
Conference Format
Conference Elements
Fees/Refund Policy
Travel and Hotel
Testimonials
Request Info
Catalyst Archive
|
Attendees
Register
Topics
Agenda
Tutorials
|
Speakers
About
Submit Application
Check ApplicationStatus
Dates to Remember
Speaker FAQ
|
Hospitality Suites
About
Submit Application
Dates to Remember
Attendee Demographics
Hosting Benefits
Hospitality Suite FAQ
|
Media
Media Registration
Industry Announcements
Press Releases
|
About Burton Group
CONFERENCE TOPICS
Application Architecture and Development
Click for overview
Related Cross-Cutting Concerns
RELATED CROSS-CUTTING CONCERNS
Application Security: Deter, Detect and Prevent
SUMMARY
As application systems become more distributed, inter-dependent, and virtualized, security risks multiply and network-based security protections can’t keep up. Developers must start building security protections into the applications and data resources themselves in order to thwart attackers, prevent fraud, and deter, detect or prevent insider threats.<
more
>
Leverage Services Infrastructure for Improved Business Results
SUMMARY
An application’s user interface is more than just a pretty picture. The quality of the user experience can significantly affect customer satisfaction and employee productivity, and therefore can impact sales and costs. How can organizations leverage the services infrastructure to build more compelling and efficient systems? <
more
>
Reusable Services: Burton Group Infrastructure Services Model
SUMMARY
The trend of centralized “servers” morphing into distributed “services” has made infrastructure functionality more accessible to applications and business processes. These services which enable SOA and IdM will be discussed in detail in this Cross-Cutting Concern.<
more
>
Vision, Reality and Benefits of Business Process Modeling
SUMMARY
The vision of business analysts quickly and easily assembling and reassembling pre-built services into new business processes brings great hope to the industry, but will it ever become a reality? With this, user provisioning is also a growing trend, but how effective is it and will it benefit enterprise IT? <
more
>
Data Center Consolidation, Virtualization and Management
SUMMARY
A greater need for more efficient management of processing, storing and network capacity is needed, which is leading to data center consolidation <
more
>
Is the Evolving Internet Architecture in Sync with What We Need?
SUMMARY
As the Internet rapidly expands, infrastructure is critical for business, consumer, and social activities. In addition, commercial and government interests are often at odds with the interests of both individuals and enterprises. The question is, what kind of Internet do we want and need? <
more
>
Collaboration and Content
Click for overview
Related Cross-Cutting Concerns
RELATED CROSS-CUTTING CONCERNS
Leverage Services Infrastructure for Improved Business Results
SUMMARY
An application’s user interface is more than just a pretty picture. The quality of the user experience can significantly affect customer satisfaction and employee productivity, and therefore can impact sales and costs. How can organizations leverage the services infrastructure to build more compelling and efficient systems? <
more
>
New Realities in Content Control
SUMMARY
In today’s enterprise, measures need to be taken to prevent the leakage of confidential or sensitive information from all collaboration workspaces and communication channel contexts. At the same time, organizations must address the creeping infestation of malware through every available collaboration and communications channel. <
more
>
Is the Evolving Internet Architecture in Sync with What We Need?
SUMMARY
As the Internet rapidly expands, infrastructure is critical for business, consumer, and social activities. In addition, commercial and government interests are often at odds with the interests of both individuals and enterprises. The question is, what kind of Internet do we want and need? <
more
>
Converged and Contextual Communication: Architectural and Business Implications
SUMMARY
As enterprises move toward integration of voice with presence, there is an array of multimedia, collaboration tools and applications that offer great potential, but where do you start? <
more
>
Identity and Privacy Management
Click for overview
Related Cross-Cutting Concerns
RELATED CROSS-CUTTING CONCERNS
Application Security: Deter, Detect and Prevent
SUMMARY
As application systems become more distributed, inter-dependent, and virtualized, security risks multiply and network-based security protections can’t keep up. Developers must start building security protections into the applications and data resources themselves in order to thwart attackers, prevent fraud, and deter, detect or prevent insider threats. <
more
>
Leverage Services Infrastructure for Improved Business Results
SUMMARY
An application’s user interface is more than just a pretty picture. The quality of the user experience can significantly affect customer satisfaction and employee productivity, and therefore can impact sales and costs. How can organizations leverage the services infrastructure to build more compelling and efficient systems? <
more
>
Reusable Services: Burton Group Infrastructure Services Model
SUMMARY
The trend of centralized “servers” morphing into distributed “services” has made infrastructure functionality more accessible to applications and business processes. These services which enable SOA and IdM will be discussed in detail in this Cross-Cutting Concern. <
more
>
Vision, Reality and Benefits of Business Process Modeling
SUMMARY
The vision of business analysts quickly and easily assembling and reassembling pre-built services into new business processes brings great hope to the industry, but will it ever become a reality? With this, user provisioning is also a growing trend, but how effective is it and will it benefit enterprise IT? <
more
>
Is the Evolving Internet Architecture in Sync with What We Need?
SUMMARY
As the Internet rapidly expands, infrastructure is critical for business, consumer, and social activities. In addition, commercial and government interests are often at odds with the interests of both individuals and enterprises. The question is, what kind of Internet do we want and need? <
more
>
Real World Success Strategies for Roles and Access Control
SUMMARY
In today’s enterprise, authorization or access management is a vital part of an infrastructure, but few are doing more than patchwork on systems in order to get by. But, there are several developments in this arena that will be analyzed, discussed and reviewed. <
more
>
IT Security
Click for overview
Related Cross-Cutting Concerns
RELATED CROSS-CUTTING CONCERNS
Application Security: Deter, Detect and Prevent
SUMMARY
As application systems become more distributed, inter-dependent, and virtualized, security risks multiply and network-based security protections can’t keep up. Developers must start building security protections into the applications and data resources themselves in order to thwart attackers, prevent fraud, and deter, detect or prevent insider threats. <
more
>
Leverage Services Infrastructure for Improved Business Results
SUMMARY
An application’s user interface is more than just a pretty picture. The quality of the user experience can significantly affect customer satisfaction and employee productivity, and therefore can impact sales and costs. How can organizations leverage the services infrastructure to build more compelling and efficient systems? <
more
>
Reusable Services: Burton Group Infrastructure Services Model
SUMMARY
The trend of centralized “servers” morphing into distributed “services” has made infrastructure functionality more accessible to applications and business processes. These services which enable SOA and IdM will be discussed in detail in this Cross-Cutting Concern. <
more
>
New Realities in Content Control
SUMMARY
In today’s enterprise, measures need to be taken to prevent the leakage of confidential or sensitive information from all collaboration workspaces and communication channel contexts. At the same time, organizations must address the creeping infestation of malware through every available collaboration and communications channel. <
more
>
Is the Evolving Internet Architecture in Sync with What We Need?
SUMMARY
As the Internet rapidly expands, infrastructure is critical for business, consumer, and social activities. In addition, commercial and government interests are often at odds with the interests of both individuals and enterprises. The question is, what kind of Internet do we want and need? <
more
>
Are Self-Defending Networks Defensible and/or Desirable?
SUMMARY
Trying to keep all your security products as well as other business application and operating systems up-to-date? Often times, these efforts result in complex and costly solutions. Is there a better way with a so-called self-defending network? <
more
>
Real World Success Strategies for Roles and Access Control
SUMMARY
In today’s enterprise, authorization or access management is a vital part of an infrastructure, but few are doing more than patchwork on systems in order to get by. But, there are several developments in this arena that will be analyzed, discussed and reviewed. <
more
>
Networks and Telecommunications
Click for overview
Related Cross-Cutting Concerns
RELATED CROSS-CUTTING CONCERNS
Leverage Services Infrastructure for Improved Business Results
SUMMARY
An application’s user interface is more than just a pretty picture. The quality of the user experience can significantly affect customer satisfaction and employee productivity, and therefore can impact sales and costs. How can organizations leverage the services infrastructure to build more compelling and efficient systems? <
more
>
Data Center Consolidation, Virtualization and Management
SUMMARY
A greater need for more efficient management of processing, storing and network capacity is needed, which is leading to data center consolidation <
more
>
Is the Evolving Internet Architecture in Sync with What We Need?
SUMMARY
As the Internet rapidly expands, infrastructure is critical for business, consumer, and social activities. In addition, commercial and government interests are often at odds with the interests of both individuals and enterprises. The question is, what kind of Internet do we want and need? <
more
>
Are Self-Defending Networks Defensible and/or Desirable?
SUMMARY
Trying to keep all your security products as well as other business application and operating systems up-to-date? Often times, these efforts result in complex and costly solutions. Is there a better way with a so-called self-defending network? <
more
>
Converged and Contextual Communication: Architectural and Business Implications
SUMMARY
As enterprises move toward integration of voice with presence, there is an array of multimedia, collaboration tools and applications that offer great potential, but where do you start? <
more
>