Welcome!

IBM Cloud Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan, Stefan Bernbo

News Feed Item

Top CIOs to Present at Computerworld's Mobile & Wireless World Conference, May 21-23, 2007 in Orlando

Peer-to-Peer Conference Will Focus on Strategic Deployment of Mobile and Wireless in the Enterprise

FRAMINGHAM, MA -- (MARKET WIRE) -- 04/25/07 -- Computerworld's Mobile & Wireless World Conference (MWW) announced today an illustrious roster of IT executives, industry leaders and analysts to address the upcoming conference, which will be held May 21-23 at the Ritz-Carlton Grande Lakes in Orlando, Fla (http://www.mwwusa.com).

MWW is a rare opportunity to gain insight on the way user companies deploy their mobile and wireless strategies in the enterprise. At Computerworld's Mobile & Wireless World Conference, IT executives join thought leaders, key solution providers, and their peers for a visionary overview of mobile and wireless platforms and solutions.

Featured presenters at Computerworld's Mobile & Wireless World Conference include:

Ira Winkler, CISSP, Bestselling Author of "Zen and the Art of Information Security," "Spies Among Us," and "Through the Eyes of the Enemy"; President, Internet Security Advisors Group

Winkler is president of the Internet Security Advisors Group. He is considered one of the world's most influential security professionals, and has been named a "Modern Day James Bond" by the media. He obtained this status by identifying common trends in the way information and computer systems are compromised. He did this by performing penetration tests and espionage simulations, where he physically and technically "broke into" some of the largest companies in the World, and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these penetration tests, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association. Ira is also author of the riveting, entertaining, and educational book, "Spies Among Us." He is also a regular contributor to Computerworld.com. Winkler will present "Zen and the Art of Information Security."

William E. Pence, Ph.D., Senior Vice President and Chief Technology Officer, Napster

In 1989, Pence joined the IBM Thomas J. Watson Research Center, where he held various technology management positions, overseeing basic research and commercialization of technology with IBM product divisions. Major programs under his direction included networking and communications technology, analog integrated circuit design, and digital media solutions. He guided pioneering work in 802.11 wireless LANs and wide-area wireless data technologies in the mid-1990s, and managed technology commercialization efforts with IBM Microelectronics and the IBM PC Company for Fibre-Channel and infrared communication components. In the software area, he was responsible for research and development activities in the emerging digital media space, including work in content management, internet media (streaming audio/video), and pattern recognition. After moving to the IBM Software Group, he managed product initiatives in the areas of web content management and integration of rich media support across a number of IBM products, including Lotus Notes and Domino and WebSphere. Pence will present "The Evolution and Challenges of Mobile Entertainment."

Joseph Ferra, Chief Wireless Officer, eBusiness, Fidelity Investments

Ferra is chief wireless officer of Fidelity eBusiness (FeB), a division of Fidelity Investments, the nation's largest mutual fund company and a leading provider of financial services. In his current role, Ferra is responsible for directing the business development and product management of Fidelity Anywhere, Fidelity's industry-leading innovation in wireless technology that allows investors to monitor the markets and manage their portfolios. Developed by Fidelity, this proprietary investing technology is among the most advanced of its kind, enabling wireless access to personalized investment information and trading via a number of wireless devices, including Internet-enabled mobile phones, BlackBerrys, and personal data assistants (PDAs). Ferra will present "The Wireless Business Case at Fidelity Investments: Building Fidelity Anywhere to Meet Customer Needs."

Roy Russell, Founding Chief Technology Officer, Zipcar

Russell is founding CTO of Zipcar, with over 25 years of experience in engineering and R&D management. He led the development of all the technology behind this popular car sharing service for the first six years of exponential growth. Zipcar's proprietary in-vehicle system and scheduling and back-office systems have won technology awards and much praise from the growing membership. Prior to joining Zipcar, Russell was the development manager in the healthcare solutions group at Lernout and Hauspie, responsible for leading development of hugely scalable automatic speech recognition systems for medical dictation. Russell will present "Building a More Sustainable Future: Zipcar Case Study."

Belinda Watkins, IT, VP, Network Computing and IT Operations, Federal Express

Watkins is vice president, IT of network computing and IT operations for Federal Express Services. She has responsibility for the network computing organization which develops, designs, and engineers network-based solutions in support of both strategic corporate projects and ongoing user requirements. She also has responsibility for IT operations for FedEx Ground and collaborative responsibility for IT operations for FedEx Freight, FedEx Kinko's and the Express International Regions. Watkins rejoined Federal Express in May of 2003 after five years of service with Sara Lee Corporation where she served as vice president, infrastructure support for Sara Lee Foods, a $3 billion plus division of Sara Lee Corporation, a global consumer packaged goods company with more than $20 billion in annual revenues. Prior to serving as VP, infrastructure support, Watkins served as vice president and chief information officer for Jimmy Dean Foods, a $600 plus million division of Sara Lee Foods, where she was responsible for the management of all the Jimmy Dean Foods information technology. Watkins will present "Vendor Optimization Trends - How to Manage All of Those Devices!"

Alan Lustiger, Security Architect, TD AMERITRADE

Lustiger is responsible for security architecture at TD AMERITRADE. He specializes in penetration testing, threat modeling, vulnerability management and DDoS defenses, and has over 20 years' experience in system administration and information security. Prior to his current position, Lustiger worked for AT&T as part of the "Tiger Team," focusing on penetration testing of corporate systems. He also worked as a subject-matter expert on firewalls, intrusion detection systems and secure network architecture. On the Ernst and Young Information Security Team, he performed security consulting and penetration testing for major Fortune 500 companies. Lustiger presented a two-day hacking and security course at Ernst and Young and has delivered many talks at security conferences -- such as NetSec, CSI, ISSA, ISACA and Computerworld's IT Executive Summit -- on various topics including Hacking 101, Password Cracking, Port Scanning and Mobile Security. He will present "A Holistic Approach to Wireless Security."

Antonio R. Caesar, Chief Information Officer, Head USA, Inc.

Caesar started his career working for corporate consulting company servicing the banking industry. Caesar enhanced his career by quickly learning to write application programs in Cobol, RPG, CL and Basic programming languages. These experiences lead him to the consulting world, where he took on a position with a company that serviced and wrote software for the nonprofit business sector. After a year in this position, Caesar accepted a position with Head USA as their MIS director. He served this role until HTM, Head USA's parent company, purchased Penn International and formed Head USA, Inc. and Head/Penn Racquet Sports, where he transitioned to the position of IT director for HTM east coast. After two years as regional IT director, Caesar was promoted into his current position of chief information officer for North America. He will present "Improving Operational Efficiencies and Increasing Customer Satisfaction with Warehouse Automation."

Robert Logan, Vice President for Enterprise Infrastructure Services, Science Applications International Corporation

Logan joined Science Applications International Corporation in 2004 as the vice president for enterprise infrastructure services. His team of engineers, operators and project managers are responsible for round-the-clock operations of enterprise computing and network services supporting over 44,000 employees at 250 locations worldwide. In addition to implementing ITIL best practices, new SOX 404 controls, and infrastructure upgrades involving server virtualization, WAN bandwidth improvements, multi-zoned security architectures, greener data centers, and new disaster recovery sites, his team during 2006 had the unique opportunity to support the company as it transitioned from 36 years as a private, employee-owned company to a public one. For those contributions Logan was named one of Computerworld's Premier 100 IT Leaders. He will present "Transitioning WiFi from Experiment to Enterprise: A Retrospective."

Michael Theis, Chief, Cyber Counterintelligence, National Reconnaissance Office

Theis began working for the National Reconnaissance Office (NRO) as a counterintelligence special agent and the chief of the first-ever Cyber Counterintelligence (Cyber-C1) program, in November 2003. As the chief of Cyber-CI, Theis provides management and oversight for the counterintelligence aspects of information systems that support NRO programs and activities, including detecting and deterring the insider threat. He will present "Facing and Overcoming the Challenges of Securing a Large, High-Volume Wireless Network."

Neil Schubert, Vice President, IT Strategy, Marriott International, Inc.

Schubert is the vice president, IT strategy for Marriott International, Inc. As part of Marriott's IT strategy team, he plays a major role in determining which technologies and applications will be used across Marriott's enterprise beyond the traditional three-year technology planning horizon. He joined Marriott's Information Resources division in 1996 after having worked for eight years with Renaissance Hotels. Schubert has 25 years of hospitality technology industry expertise, having held a variety of roles in IT leadership, application development, network and operations support. He will present "Inbuilding Wireless for the Hotel Industry - the Final Frontier for Mobile Communications."

Ben Berry, Chief Information Officer, Oregon Department of Transportation

Berry serves as ODOT's chief information officer, providing overall leadership, planning, development, and delivery of information technology services for ODOT and several other non-transportation organizations. At this second-largest state agency in Oregon, he is responsible for systems supporting highways, bridges, rail service, right-of-way determinations, DMV and Motor Carrier Commercial Trucking inspections and licensing throughout the state. Berry was formerly the chief technology officer of Providence Health System, supporting the Oregon service area of seven hospitals and 33 clinics. He has held executive and management positions in industries such as state and local government, healthcare, telecommunications, aerospace/defense, and airport transportation. Berry will present "Wrestling with 21st Century Issues in the Wireless Strategic Plan Framework."

For more information, go to http://www.mwwusa.com. To register for this event, please call 1-800-883-9090 or email mwwreg@computerworld.com.

About Computerworld

Computerworld is the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning weekly publication, Computerworld.com Web site (www.computerworld.com), focused conference series and custom research form the hub of the world's largest (40+ edition) global IT media network. In the past five years alone, Computerworld has won more than 100 awards, including Folio Magazine's 2006 Gold EDDIE Award for the best technology/computing magazine, the 2004 and 2006 Magazine of the Year Award, and 2006 Best Overall Web Publication from the American Society of Business Publication Editors (ASBPE). Computerworld leads the industry with a print audience of 1,252,000 readers each week (IntelliQuest CIMS Spring 2006) and an online audience of over 2 million unique monthly visitors (Omniture).

Computerworld is a business unit of International Data Group (IDG), the world's leading technology media, research and events company. A privately held company, IDG publishes more than 300 magazines and newspapers, including CIO, CSO, Computerworld, GamePro, InfoWorld, Network World and PC World. The company features the largest network of technology-specific Web sites, with more than 400 around the world. IDG is also a leading producer of more than 170 computer-related events worldwide, including Storage Networking World®, Premier 100®, LinuxWorld Conference & Expo®, Macworld Conference & Expo, DEMO® and IDC Directions. IDC provides global market research and advice through offices in 50 countries. Company information is available at http://www.idg.com.

Add to DiggBookmark with del.icio.usAdd to Newsvine

MEDIA CONTACTS:

Bill Wrinn
Topaz Partners
781-404-2414
Email Contact

Duncan Newell
Computerworld
508-271-8029
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...