|
Date (yyyy-mm-dd) |
Outlet | Title | Description |
|---|---|---|---|
| 2019-07-15 | GovMatters TV | GovLoop’s Talking Transformation: Cyber Trends | The U.S is on the cutting edge of technology. Find out what’s on the horizon from government and industry professionals. |
| 2017-05-16 | FedScoop TV | Red Hat’s Shawn Wells on Federal Cybersecurity | Television inteview during the Security Through Innovation Summit |
| 2016-05-25 | FedScoop TV | Red Hat’s Shawn Wells talks cyber policy and innovation | Shawn Wells, chief security strategist of the public sector for Red Hat, joins FedScoop TV to talk about the impact cybersecurity policy is having on innovation in the government. |
|
Date (yyyy-mm-dd) |
Outlet | Title | Description |
|---|---|---|---|
| 2015-05-19 | WTOP News | Secure Cloud Computing Progress & Best Practices | Federal Executive Forum Program on Secure Cloud Computing in Government on Federal News Radio, WFED, in Washington D.C. Moderated by Jim Flyzik (President, Flyzik Group), the panelists also included:
|
|
Date (yyyy-mm-dd) |
Event / Venue | Abstract | Download |
|---|---|---|---|
| 2022-12-08 | ServiceNow Federal Tech Day |
Zero Trust Architecture - Guidance for Federal Agencies REGISTRATION: https://carahevents.carahsoft.com/Event/Details/327186-accenture A zero trust architecture is not achieved by a single, out-of-the-box network security solution. It’s a strategy based on an agency’s cybersecurity plan that contains a collection of zero trust concepts. It requires multiple security solutions that cybersecurity teams need to orchestrate in their environment. Of course, introducing new tools and solutions can increase complexity, but federal agencies can simplify their zero trust architecture by including an enterprise platform strategy. Join in-person on Thursday, December 8th to hear from ServiceNow and government experts as they discuss zero trust. Discussion will include:
|
|
| 2022-08-09 | ATARC Zero Trust Summit |
Visionary Panel: Government Guidance on Zero Trust Event Webpage: https://atarc.org/event/8-9-22-zero-trust-summit/ To help Federal agencies convert their networks, systems and devices to a Zero Trust Security architecture, the White House has issued three new draft guidance documents. The documents, including the Federal Zero Trust Strategy from the Office of Management and Budget, and the Zero Trust Maturity Model and Cloud Security Technical Reference Architecture from the Cybersecurity and Infrastructure Security Agency, are meant to provide agencies with a roadmap and resources required to sustain a multiyear push towards Zero Trust. Listen in as topic experts dive into the Guidance, as well as the importance behind them. How will these guidance documents affect Zero Trust Security? Do these roadmaps present any challenges? How can agencies best leverage the guidance documents for successful security architecture implementation? Spoke on a panel with:
|
|
| 2022-06-08 | RSA Conference 2022 |
The Cyber Threat Landscape is Winnable but ONLY through Public-Private Collaboration REGISTRATION: https://humanatsfmoma.splashthat.com/ When we talk about cybersecurity public-private collaboration in the abstract, it may seem soft. It’s not just about sharing indicators of compromise (IOCs) or even actionable threat intelligence, although both are important elements of a fraud fighting partnership. True public-private collaboration is about engaging modern defense strategy powered by collective protection to make sure cybercriminals are disrupted and experience real costs and consequences. Spoke on a panel with:
|
|
| 2022-05-01 | Public Partner Webinar |
AFS Zero Trust Conversation Framework Public presentation given during AFS Zero Trust Partner Enablement webinar that discusses the key conversational topics for an AFS Zero Trust engagement. Outcomes were to help partners understand our strategy and our why behind the strategy. To collaborate and discuss together; together in order to ensure we understand our strategy the reasoning behind it, and the best ways we ca achieve it - TOGETHER. Covers four key conversations/capabilities:
|
|
| 2019-07-23 | Carahsoft FedRAMP Forum |
An Open Source Approach to FedRAMP Recent news headlines include how GSA took their ATO process from 6 months to 30 days, the Navy's "Compile to Combat in 24 hours" capability, or how ORock achieved FedRAMP Moderate in three months. These rapid ATO success stories sharply contrast to opinions that FedRAMP, FISMA, and broader initiatives like Controlled Unclassified Information (CUI) slow down innovation. Via NIST 800-53 the U.S. Government created a security control catalog. Could a response catalog be created, sharing prepopulated answers for common technologies like operating systems and container platforms? If we could create a control response catalog, could deployment specific ATO materials be dynamically generated? This talk steps through a joint industry/government initiative called OpenControl, which in partnership with GSA and NIST, is working to automate much of the ATO process. |
|
| 2018-11-13 | Defense in Depth Conference |
Keynote Presentation Given evolving adversarial threat models, what technologies are being developed by Intel and Red Hat to secure the underlying compute platforms? Co-presented with Steve Orrin, CTO of Intel Federal, on the joint Intel/Red Hat security roadmap. Discussed technologies such as Intel Boot Guard, Trusted Execution Technology (TXT), hardware accelerated cryptography (ADOX/ADX), and EXCITE (fuzzing for BIOS). |
|
| 2018-09-18 | OpenFirst DC |
OpenFirst DC: DevSecOps in Practice (Moderated Panel) Moderated a panel discussion on DevSecOps and how government agencies can integrate it into their security efforts. Panelests were:
|
|
| 2018-07-28 | GovLoop Webinar |
Aligning and Sharing Cybersecurity Practices Between Federal and State Government Many state CIOs and their teams have spent countless hours trying to create their own cybersecurity frameworks from scratch. Reflecting enormous amounts of research, planning and implementation, these bespoke cybersecurity frameworks distract from the state’s core mission of providing citizen services. Yet according to the Public Technology Institute, only 42 percent of local governments have successfully adopted a cybersecurity framework based on national standards and guidelines. That’s a missed opportunity. Indeed, state agencies could be saving themselves a lot of time, money and effort by looking toward their federal brethren, who are here to help. For decades, the federal government has painstakingly developed cybersecurity frameworks to thwart a rise in ransomware attempts, software vulnerabilities and other malicious actions by hackers and rogue states seeking to gain access to U.S. assets. This session, in partnership with GovLoop, reviews opportunities for aligning and sharing cybersecurity best practices between Federal and State government agencies. |
|
| 2017-11-16 | Red Hat Webinar |
Continuous Change and IT Security Teams tasked with IT security face mounting pressure due to rapid changes in IT infrastructure, the increasing number of high-profile vulnerabilities, the reality of hybrid cloud environments, and the need to deliver business value faster. IT operations and security teams must find innovative ways to keep up and new opportunities to get ahead. Join the Red Hat virtual event, Continuous change and IT security, on Nov. 16. You’ll learn how to address security concerns across an ever-changing IT landscape and the crucial role of automation, management, and open source technologies in assisting you. In this event, you’ll hear from experts on topics including: * Managing vulnerabilities. * Keeping up with compliance demands. * Improving security for deployments across complex, hybrid environments. |
|
| 2017-10-10 | AUSA Conference 2017 |
Repeatable DCO Platforms (Built in Partnership with ARCYBER) This session detailed the OpenShift-based Cyber DCO platform which was built with ARCYBER at Fort Gordon. |
|
| 2017-10-03 | Defense in Depth 2017 |
Defense in Depth 2017 Keynote Co-presenting with Steve Orrin (CTO, Intel Federal), discussed upcoming trusted computing technologies and initiatives from both Intel Corporation and Red Hat. |
|
| 2017-09-18 | IRS Mini Summit on OpenShift Security |
IRS Mini Summit on OpenShift Security With several co-presenters, and sponsored by the IRS, this session delivered an overview of the OpenShift architecture, IRS’ DevOps vision, RHEL and Container Security, OpenSCAP, OpenShift S2I (Source-to-Image), Atomic Scan, and how to use OpenControl to automated security authorization packages. |
|
| 2017-09-14 | AFCEA Ft Knox / AFCEA Gold Vault Chapter |
DevOpsSec: Building CI/CD with Security Teams Session stepped through how continuous monitoring techniques can be applied to Linux-based containers. Live demo of the ComplianceAsCode and OpenShift Compliance Operator, which showed how known vulnerability scanning and misconfiguration detection can be embedded into CI/CD pipelines. |
|
| 2017-07-12 | GovLoop Gov Security in the Digital World Virtual Summit |
New Era of Digital Security As citizens demand digital access and more software is delivered as a service, government organizations need new technologies to offer these services. But adopting them makes security and regulatory compliance more difficult. In addition, securing devices and infrastructure that are outside of your environment is a key challenge. This means IT teams must manage and secure a continuously evolving landscape. New vulnerabilities emerge regularly, from external attacks and internal issues caused by human error or malice. However, organizations can often view security teams as blockers to rapid productivity, rather than supporters. How can this be flipped to enable innovation? To discuss how government can better do this, GovLoop and Shawn Wells, Chief Security Strategist, U.S. Public Sector Red Hat spoke as part of GovLoop and Red Hat’s Gov Security in the Digital World Virtual Summit in Wells’s session, New Era of Digital Security. GovLoop Article: https://www.govloop.com/new-era-digital-security/ |
|
| 2017-07-11 | GovLoop Webinar |
Changing the Open Hybrid Cloud Game: Deploying OpenShift to Azure Building secure environments and ensuring adherence to FedRAMP authorization requirements can be complex and cumbersome. Red Hat’s OpenShift Container Platform provides a secure, government-ready platform for containers and DevOps. In GovLoop’s Gov Security in a Digital World Virtual Summit, Harold Wong, Cloud Architect at Microsoft and Shawn Wells, Chief Security Strategist in Red Hat’s Public Sector, teamed up to provide architectural guidance on deploying Red Hat OpenShift Container Platform in Azure Government, which is a hybrid cloud solution. GovLoop landing site: https://www.govloop.com/changing-open-hybrid-cloud-game/ |
|
| 2017-02-21 | AFCEA West |
DevOpsSec: Building CI/CD with Security Teams As presented at AFCEA West 2017. |
|
| 2017-02-14 | RSA Conference 2017 |
Integrated Solutions for Trusted Clouds and SDI Commercial and government organizations are looking to reduce network complexity and cost while simultaneously increasing flexibility and agility. Additionally, new security challenges must be considered along with all the benefits that a software-defined IT infrastructure provides. Intel and Red Hat have teamed up to help solve software defined cloud environment challenges. |
|
| 2016-11-18 | OpenSCAP Workshop |
OpenSCAP Workshop: Hands-on Labs to explore Scanning, Reporting, Remediation
|
|
| 2016-10-27 | FBI Mini Summit |
Live Demos @ FBI Mini Summit Slides used at the FBI Mini Summit. |
|
| 2016-08-29 | Air Force Information Technology and Cyberpower (AFITC) Conference |
Security Automation: RHEL7 DoD STIG Update Co-presented with Ted Brunell (Red Hat’s DoD Chief Architect) on the current state of the Red Hat Enterprise Linux STIG. Additionally discussed security automation development initiatives between Red Hat + NSA + NIST. |
|
| 2012-07-18 | Red Hat Webinar |
Red Hat Enterprise Virtualization for Desktops 3.0 Why virtualize your desktop? Who benefits? This presentation answered those questions while introducing the SPICE adaptive protocol for VDI. |
|
| 2012-04-18 | MADFW Program Review |
MADFW Program Review Copresenting with the projects SETA, detailed the MSD Application Development Framework (MADFW) hosting capabilities. Session reviewed the architecture and system capabilities for potential mission customers. |
|
| 2012-02-08 | NSA Red Hat Symposium |
Red Hat Update Invited by the Government contrating officer of Red Hat's enterprise agreement with NSA to speak to NSA about the latest Red Hat technologies. Topics included an update on the Red Hat Enterprise Linux lifecycle, RHEL 6 updates, security topics, and Red Hat Virtualization technologies/roadmap. |
|
| 2011-12-08 | Cisco Webinar |
Red Hat Enterprise Virtualization (RHEV) with Cisco UCS Spoke about Red Hat Enterprise Virtualization on Cisco UCS hardware. Detailed recent RHEV-D features, performance and scalability results, and details of the underlying SPICE technology. |
|
| 2011-11-03 | U.S. Intelligence Community Cloud Users Group |
Red Hat Virtualization Overview Invited by TMA to speak at the first meeting of the U.S. Intelligence Community's Cloud Users Group. Spoke about the latest happenings in open source virtualization (Aeolus, CloudForms, KVM) and Red Hat Enterprise Virtualization. |
|
| 2011-08-10 | In-Q-Tel (IQT) Technology Focus Day |
Trends & Observations in Open Source Cloud Computing Invited by In-Q-Tel, the venture capital firm of the U.S. Intelligence Community, to speak at their Technology Focus Day to discuss how the open source movement competes against proprietary companies in the cloud space. |
|
| 2011-03-15 | Lockheed Martin Briefing Center |
Red Hat Portfolio Overview Invited by Lockeed Martin to their Gaithersburg facility to brief technical staff within IS&GS on various Red Hat topics. Discussed Red Hat Enterprise Linux, MRG, Red Hat Network Satellite, Red Hat Enterprise Virtualization, JBoss, and various cloud technologies. |
|
| 2010-11-08 | Red Hat Technical Symposium at NSA Research & Engineering |
Red Hat Technical Symposium After closing an agency-wide enterprise licensing agreement, invited by the Government Contracting Officer to brief all of NSA at an in-person event at the NSA Research & Engineering Symposium Center at Fort Meade, MD. Topics covered included a Red Hat Enterprise Linux 6 update, Red Hat in a Virtualized Environment, and Security topics. Co-presented with Chris Runge (Technical Director) and Gunnar Hellekson (Red Hat Federal CTO). |
|
| 2010-09-24 | Dell Executive Briefing |
Dell / Red Hat Alliance in the U.S. Intelligence Community Invited by Dell to speak at their U.S. Intelligence Community Executive Briefing. Outlined joint corporate initiatives, Red Hat Enterprise Virtualization (RHEV), and performance benchmarks on the recently released Dell R710 hardware. |
|
| 2010-08-05 | DoDIIS Industry Day |
NexGen Desktop Concept Architecture, Phase 2 Asked by the U.S. Government to present at a second DoDIIS Industry Day, gave a live system demonstration of how Red Hat technology could lay the foundation for a cross-domain virtual desktop environment. Using native technologies available in Red Hat Enterprise Linux and Red Hat Enterprise Virtualization, demonstrated virtual desktops of differing classification levels connecting through a single thin client. |
|
| 2010-05-21 | DoDIIS Industry Day |
DoDIIS NexGen Desktop Concept Architecture Delivered conceptual overview of how Red Hat technology could lay the foundation for a cross-domain virtual desktop environment. Using native technologies available in Red Hat Enterprise Linux and Red Hat Enterprise Virtualization, demonstrated virtual desktops of differing classification levels connecting through a single thin client. |
|
| 2010-03-30 | U.S. Intelligence Community Identity Management Working Group |
Red Hat Identity Management & Certificate System Technical Overview Invited to speak at the Identity Management working group of the United States Intelligence Community. Provided an overview of PKI, Red Hat Certificate System, and a deep dive into several requested technical topics (token innovations, scalability and performance concerns, high-availability deployment models, tools and SDKs, NSS crypto libraries, and new features). |
|
| 2010-01-28 | National Security Agency Open Source Software User Group (NSA OSSUG) |
Current & Future Linux on Sysetm z Technology Deep Dive Invited to speak at the Open Source Software user group at the National Security Agency. Discussed the latest Linux on System z technology and capabilities, the Red Hat Enterprise Linux release roadmap, RHEL 5.4, and upcoming Intel NEHALEM support for the x86 platform. |
|
| 2009-12-04 | New York City System z Executive Council |
Red Hat on the Mainframe: The Reasons Are Compelling Invited to speak at the NYC System z Executive Council meeting. Shared Red Hat updates, which included publicly speaking about the libVirt project -- an attempt to unify x86 virtualization with s390x and z/VM through a consolidated API. |
|
| 2009-11-23 | Red Hat Webinar |
Announcing the IBM Enterprise Linux Server and the System z Solution Edition for Enterprise Linux With Linux on System z growth globally, partnered with IBM to announce a 'System z Solution Edition' that pre-bundled Linux subscriptions at a highly discounted price for System z customers. Co-presented with Reed Mullen, the System z Consolidation and Virtualization Leader at IBM. |
|
| 2009-11-05 | Red Hat Webinar |
Red Hat System z Partner Program Review With Red Hat's System z marketshare growing, third party software providers were looking to port their software to Red Hat Enterprise Linux on System z. Co-presenting with Michael Fremder (Red Hat ISV Program Manager), discussed current market trends and resources for Red Hat ISVs to join the Linux on System z market. |
|
| 2009-10-15 | Forrester Analyst Relations Call |
System z Update Covered the release of RHEL 5.4, tentative roadmap of RHEL 6 for IBM System z, an update on CMM2/CMMA via the CMM-Lite technology, and future-looking discussion regarding the joint IBM and Red Hat development initiatives. |
|
| 2009-10-07 | IBM System z Expo (IBM zExpo) |
Session zQV31: Current & Future Linux on System z Technology (RHEL 5.4 and beyond) Covered the release of RHEL 5.4, tentative roadmap of RHEL 6 for IBM System z, an update on CMM2/CMMA via the CMM-Lite technology, and future-looking discussion regarding the joint IBM and Red Hat development initiatives. |
|
| 2009-09-24 | Get the Hype on System z Webinar |
Current & Future Linux on System z Technology (RHEL 5.4 and beyond) Covered the release of RHEL 5.4, tentative roadmap of RHEL 6 for IBM System z, an update on CMM2/CMMA via the CMM-Lite technology, and future-looking discussion regarding the joint IBM and Red Hat development initiatives. |
|
| 2009-08-24 | SHARE Denver |
The Linux Audit Subsystem: Deep Dive Why is Linux auditing needed? What can it do for me? How does it work? How do events get audited? How do I make sense of all the data? What is the difference between Linux's syslog and audit facilities? |
|
| 2009-08-24 | SHARE Denver |
Session 9204: Managing your Red Hat Enterprise Linux Guests with RHN Satellite What is Red Hat Network? What are the modules? What are the deployment architectures? How's it run on IBM System z? |
|
| 2009-07-28 | System z Press and Industry Analyst Webinar |
System z Update - Analyst Call Delivered to press and industry analysts such as Gartner, Forrester, and IDC, delivered
the Red Hat corporate overview, System z revenue growth, updated marketshare, and other
business statistics/data.
|
|
| 2009-06-17 | Chicago Area VM (and Linux) Enthusiasts (CAVMEN) |
System z Update Invited to return and speak at the Chicago Area VM (and Linux) Enthusiats meetup. Session delivered an update about the latest Red Hat Enterprise Linux technical updates; namely, the Sistina GFS filesystem, LVM2, sVirt's integration of Mandatory Access Control, Fedora for System z, and libvirt. |
|
| 2009-06-17 | Chicago Area VM (and Linux) Enthusiasts (CAVMEN) |
Red Hat Network Satellite (On System z) Invited to return and speak at the Chicago Area VM (and Linux) Enthusiats meetup. This session discussed how Linux on System z administrators can automate Linux updating, monitoring, provisioning, and overall system management, with Red Hat Network Satellite. |
|
| 2009-06-15 | System z Summer Series at Marist College |
Red Hat Solutions for System z Invited to return to Marist College for their 2009 summer series. Spoke about Red Hat's
Open Source University (OSU) program. Our goal was to enable thousands of colleges
and universities around the world to teach open source principles, programming,
and system administration, to hundreds of thousands of students.
|
|
| 2009-05-11 | IBM Executive Customer Briefing |
Red Hat Solutions for System z Focusing primarily on the business benefits of Linux on System z, covered a recent design win within the U.S. Government. This agency saved >$5M in virtualization costs, and >$8M in Oracle Database licensing, by converting from x86/VMWare to Linux on System z. |
|
| 2009-05-05 | Red Hat Webinar |
A Customer's Perspective on Making Enterprise Linux Deployable, Scalable, and Manageable Discussed management challenges facing IT organizations with large Enterprise
Linux fleets. Provided an overview of Red Hat Network Satellite, Red Hat's system
management tool, and how Salt River Project implemented it at scale.
|
|
| 2009-04-17 | IBM Linux Technology Center - India |
Red Hat on IBM System z Invited to visit IBM's Linux Technology Center in India. Over the course of multiple days, presented at technical interlock meetings with IBM kernel developers, support engineers, and kernel test engineers. |
|
| 2009-04-14 | IBM Webinar |
Current & Future State of Linux on System z Session delivered a Red Hat System z business update, RHEL 5.3 updates (released 45-60 days prior to this event), and future technology development efforts. Technical updates included accelerated in-kernel crypto algorithms for IBM z10, SELinux per-package access controls, nv_conntrack subsystem, and other kernel topics such as address space randomization. |
|
| 2009-03-18 | IBM Go Green |
Taking "Green" Beyond the Hardware When thinking "Green Datacenters," most individuals only consider hardware.
This session delivered content to expand that thinking to tunables provided
within the Linux operating system to optimize system power consumption.
|
|
| 2009-03-03 | Red Hat Webinar |
Current & Future State of Linux on System z Session delivered a Red Hat System z business update, RHEL 5.3 updates (released 45-60 days prior to this event), and future technology development efforts. Technical updates included accelerated in-kernel crypto algorithms for IBM z10, SELinux per-package access controls, nv_conntrack subsystem, and other kernel topics such as address space randomization. |
|
| 2009-03-03 | Atlanta System z Council |
Current & Future State of Linux on System z Invited to deliver 2009-03-03 IBM SHARE conference presentation to the
IBM Atlanta System z council.
|
|
| 2009-01-20 | Red Hat Webinar |
RHEL 5.3 Update for IBM System z Technical presentation of the latest s390x/IBM System z related features delivered in Red Hat Enterprise Linux 5.3. |
|
| 2009-01-14 | IBM Destination z |
Red Hat System z Update Invited to speak at the IBM Destination z event. Provided an overview of Red Hat's System z business, Red Hat partner programs, and updated customer success/public references. |
|
| 2008-12-02 | IBM ISV Community Call |
Red Hat System z Update Asked by IBM to present on their System z ISV community call, with over 150 software companies in attendance. Discussed the overall IBM/Red Hat relationship, current campaigns/programs, quick technical overview of Red Hat's System z capabilities, and new customer references to share. |
|
| 2008-11-13 | Chicago Area VM (and Linux) Enthusiasts (CAVMEN) |
Red Hat Deep Dive Sessions: Linux on System z Invited to speak at the Chicago Area VM (and Linux) Enthusiats meetup. Led a discussion about the current Linux for System z development process, what s390x features were delivered in the latest releases of Linux, provisioning and patching via Red Hat Network Satellite, and several security updates (SELinux, audit, etc). |
|
| 2008-10-15 | IBM System z Expo (zExpo) |
Session ID zLS01: Red Hat Update for IBM System z Why do we need SELinux? What are the principal concepts? Session discussed SELinux type enforcement, available policies, and how to write your own SELinux policy. Covered SELinux from the perspective of a system user and system administrator. Performed live demo of creating an SELinux policy based on errors in syslog. |
|
| 2008-10-14 | IBM System z Expo (zExpo) |
Session ID zLP07: Managing your Red Hat Enterprise Linux Guests with RHN Satellite Presented on Red Hat Network Satellite. Discussed the available modules, deployment
architectures, and how RHN Satellite can be deployed on System z. Performed live
demo at the end.
|
|
| 2008-10-14 | IBM System z Expo (zExpo) |
Session ID zQV18: Red Hat Update for IBM System z Technical update for Red Hat Enterprise Linux on IBM System z. Stepped through plans for
RHEL 5.2, future RHEL 5.3 updates, and upstream Fedora activities. Covered topics such as
skb scatter-gather support for kernel memory management, CPU affinity, ETR support, and other
kernel development topics.
|
|
| 2008-09-09 | IBM Interaction Conference |
Red Hat Update for System z Red Hat technology update covering Enterprise Linux, long-range virtualization plans, and security/MLS/common criteria updates. Discussed kernel updates such as high resolution timers introduced in 2.6.16, updated I/O schedules in 2.6.10, filesystem updates to ext3, and several other kernel-related topics. |
|
| 2008-08-14 | IBM SHARE Orlando |
Managing your Red Hat Enterprise Linux Guests with RHN Satellite Reviewed Red Hat Network Satellite, Red Hat's modular web-based Linux
management platform. Stepped through how to perform system updates,
enterprise fleet management, provisioning, and system monitoring.
|
|
| 2008-08-12 | IBM SHARE Orlando |
SELinux: A Key Component in Secure Infrastructures Why do we need SELinux? What are the principal concepts? Session discussed SELinux type enforcement, available policies, and how to write your own SELinux policy. Covered SELinux from the perspective of a system user and system administrator. Performed live demo of creating an SELinux policy based on errors in syslog. |
|
| 2008-07-30 | IBM Teach the Teacher (BM T3) |
Red Hat Update for System z 45 minute update on Red Hat. Spoke about the upstream-to-downstream development model, contextualized for s390x kernel development, Red Hat Enterprise Linux 4 (RHEL4) and RHEL5 updates. Introduced audience to Security Content Automation Protocol (SCAP). |
|
| 2008-07-15 | System z New Technology Program (IBM zNTP) |
Red Hat Enterprise Solutions for System z 30 minute update on Red Hat System z announcements, ISV partnerships, Red Hat Enterprise Linux 5 (RHEL5) for System z update, and talk through how to manage Linux on System z instances with Red Hat Network Satellite. |
|
| 2008-06-25 | System z Summer Series at Marist College |
Red Hat Enterprise Linux & System z: How Red Hat uses System z Invited to the System z Summer Series at Marist College to share and discuss how Red Hat uses System z infrastructure internally. Spoke about Red Hat's usage of an IBM zSeries 2094 (z9), zSeries 2084 (z990), and Shark storage, and how those systems contribute to the development of Enterprise Linux. |
|
| 2008-04-08 | Lockheed Martin Security Seminar |
Red Hat Technology and Roadmap Invited to speak at Lockheed Martin San Jose to their U.S. Department of Defense customers. Topics covered Red Hat security -- from the hypervisor, to APIs, to cryptography and PKI. |
|
| 2008-03-06 | Harris Corporation IT Security Seminar |
Red Hat Security Seminar Invited to return to Harris Corporation and re-deliver the 23-JAN-2008 session to a wider audience. Topics included Red Hat security roadmap, covering Red Hat's implementation of the Xen hypervisor, libVirt API, security certifications, and SElinux. |
|
| 2008-02-25 | Federal Aviation Administration IT Conference |
Remember when we just sold Linux? Intro to Red Hat Middleware Invited to speak at an IT conference at the Federal Aviation Administration (FAA). Session introduced audience to Red Hat's middleware portfolio, named JBoss. |
|
| 2008-01-23 | CUNY Information Managers Forum |
Red Hat Overview Topics included incident response, SELinux, and
Red Hat Enterprise Linux 5 security.
|
|
| 2008-01-22 | Harris Corporation Security Seminar |
Red Hat Security Roadmap Red Hat security roadmap, covering Red Hat's implementation of the Xen hypervisor, libVirt API, security certifications, and SElinux. |
|