Speakers
Easily the best part of IMPACT is our community as they share their expertise with others. Our call for sessions is OPEN.
We want to feature sessions that cover key topics in enterprise IT including:
Cloud Computing | Mainframe | System Engineering | Machine Learning/AI/Deep Learning | Scalability and Resilience
Infrastructure Design | Performance and Capacity Planning | Strategic Vision | DevOps | On-Call Strategies | Managing IT Teams
Continuous Delivery | Security | Monitoring and Instrumentation | Performance and Debugging | Backup and Recovery
Solving the Customer Experience
We look forward to your submission.
About Speaking at IMPACT 2021
CMG will be accepting speaker submissions on a rolling basis.
2021 Speakers will receive free conference admission
Speakers will be required to participate in a practice session and pre-record their session for our video archive.
Sessions are typically 40 minutes without Q&A
Speakers are asked to engage in live verbal or chat-based Q&A sessions after their session broadcast.
Questions? Contact [email protected]
See our Terms and Conditions for speakers
We will be accepting sessions on a rolling basis with these general deadlines. If you are interested in speaking, you are highly encouraged to submit early!
- September 25: First Round Deadline
- October 16: Second Round Deadline
- November 6: Third Round Deadline
- November 27: Fourth Round Deadline
- December 11: Final Submission Deadline
2020 IMPACT Sessions
The #1 Challenge of Digital Transformation. It’s NOT what you think.
From customer experience to data integration, to business intelligence and beyond, digital transformation has come to represent true modern business. However, though the world has now firmly rooted...
Bitcoin Mining & The Capacity Planning Stack
Bitcoin mining is one of the ways to make money from the Bitcoin cryptocurrency. Mining calculators are available that enable you to estimate your earning potential. This presentation will show...
The role of the CISO in an Ever-Changing World – Elena Seiple, MGM Resorts International
The role of the Chief Information Security Officer has continued to evolve since it first arose in the mid-90's after a Russian cyber attack on Citigroup lead the bank to create the world’s first...
Real World DevOps - Abel Wang
It is now 2020 and good DevOps practices are no longer just nice to have. It is absolutely necessary to continuously deliver value to our end users. Yet this isn't easy to do right. Unfortunately,...
Four Recent Advances in AI and Machine Learning for IT Organizations - James McCaffrey
Dr. James McCaffrey is a senior research scientist engineer in the artificial intelligence group at Microsoft Research. James will describe four recent advances in machine learning and AI that have...
Save MSUs and Reduce Run-Times for Analytics and MXG Reporting - Paul Massengill
The mainframe team of a Fortune 500 Transportation Provider was tasked with conflicting goals: (1) increase the frequency and variety of reporting and analytics, and (2) avoid an upgrade of their...
Self-Healing Trifecta – Earlier Warning, Faster RCA, Automated Resolution
Machine Learning and Big Data Analytics are changing the way enterprises manage their IT operations by helping to automatically find hidden insights and data relationships faster. But by itself,...
What’s that VM/Server Doing? - Debbie Sheetz
Server/VM-level measurements notify the capacity/performance analyst of resource usage patterns during (1) capacity threshold breaches (2) SLA breaches (3) other significant changes, but not how/why...
Self-Healing Trifecta - Earlier Warning, Faster RCA, Automated Resolution
Instead of repeated firefighting & chasing symptoms get proactively alerted hours BEFORE critical system issues & within minutes identify root cause & resolve automatically. Discover how...
ITIL Version 4 Capacity and Performance Management in an Agile Container World
The advent of agile DevSecOps code development questions the validity of traditional capacity planning and performance management techniques. Many think ITIL is no longer valid in today's...
z/OS Performance and Capacity Fundamentals
Are you new to the mainframe and interested in what makes a mainframe tick from a performance perspective? Confused about why certain capacity decisions are made? Not sure about what the different...
Computing System Congestion Management Using Exponential Smoothing Forecasting
An overloaded computer must finish what it starts and not start what will fail or hang. Our presenter developed a congestion control algorithm that manages overload with its unique formulation of...
Your Open-Source Machine Learning Tool Kit
During this session, our speakers will present a set of open-source tools widely adopted and compatible with most environments including data centers, clouds, and mainframes. Cloud services or even...
System Performance Estimation, Evaluation, and Decision (SPEED)
<Digital Badge Opportunity> If you are tackling many servers in the data center, saving a small percentage of those servers can bring significant return. In this training session, participants...
How is DevOps changing the Modern Software Development Landscape? A Panel Discussion
DevOps is becoming the new norm for many software development shops. An extension of Agile thinking, DevOps emphasizes constant testing and embedding operations in the team to internalize expertise...
Pocket AI and IoT
Want to learn more about trends like AI, IoT and wearable tech? In one hour, we will cut through the hype by building a “smart” fitness tracker using your own mobile device. This session is full of...
You can’t always get what you want. Or can you? An Evaluation of Cloud-Native Tools
As companies innovate with their infrastructure configurations, the variety of tools to manage these systems grows immensely. During this IMPACT 2020 session, participants will learn more about...
Business Continuity and Contingency Planning - Digital Badge Opportunity
In the early days of IT, it was enough to get our very expensive processors and code to run efficiently, when they worked at all. Over the past few decades, our concerns have grown from reliability,...
Mapping your Successful Cloud Migration
In the rush to control costs and deliver faster, many companies look to the cloud as the go-to strategy to support DevOps. Unfortunately, market research shows that some organizations start the...
Optimizing your Cloud
The public cloud has unlimited capacity if you have an unlimited budget to buy it. But the reality is that budgets are never truly unlimited and one needs to do rightsizing of the cloud objects to...
Solving the “Need for Speed” in the World of Continuous Integration
Today’s business dynamics have changed the way software is developed and shipped, especially within the Continuous Integration / Continuous Delivery (CI/CD) pipeline in a DevOps world. This means...
Mainframe 101
In the 1960s and 1970s, mainframe computing was the dominant paradigm in information processing. Rapid and continuing developments have changed the focus to distributed systems, but mainframes...
Meeting of the Minds: Performance Engineering
This “Birds of a Feather” session will kick off with a brief presentation on “A Short History of Performance Engineering” by Alex Podelko. In this introductory session, Alex will briefly cover the...
Meeting of the Minds: AI, ML, and DL
Join Amy Peck and Igor Trubin for this birds-of-a-feather session on Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL). During this hour-long, casual session, participants...
Meeting of the Minds: Mainframe hosted by DataKinetics
Got a burning problem you’d like to bounce off colleagues? Want to catch up on the latest ideas with your Peers? Join us for this hour-long, casual session, where you can engage in an open forum and...
Deep Learning: An Overview
Deep Learning is a branch of Artificial and Machine Learning that has surpassed the performance of traditional machine learning algorithms for specific applications by a considerable percentage. The...
Blockchain is the New Black: The Convergence of Blockchain, XR, AI and Emerging Tech
Are you prepared for the next wave of technology? We spend a lot of time following futurists and tech experts who “predict” the future. However, we are in the throes of an old concept: Life Imitates...
How Website Speed affects your Bottom Line and what you can do about it
What if you improved your site's speed so that you saw boosted ranking for mobile search results, higher traffic, and lowered bounce rates? Unless you think your online product could get by without...
How to select appropriate IT Infrastructure to support Digital Transformation
The effective utilization of data might be one of the single biggest advantages of undergoing a digital transformation, but many companies struggle with the changes required to stream and process...
Tailored Fit Pricing: How to Manage Workload in a world without Capping
Since their invention in the 1950s, workload planning and cost management has been the primary challenge of mainframe professionals. Now, Tailored Fit Pricing represents the biggest change to...
The story of a Bank, a Bot, and an ELK (or how Banca d’Italia used Machine Learning to enable Capacity Planning and Anomaly Resolution)
In this session, Pietro Tiberi and Marco Capotosto of Banca d'Italia will present a case study of their production implementation of a log analysis system based on ELK (Elastic Search, Logstash and...
Resource Optimization in an Ever-changing Landscape
In a landscape where things change constantly, be it the hardware, software, or workload and performance profiles, how do we maximize resources and minimize the cost to serve? Change is the only...
Marrying Artificial Intelligence and Automation to Drive Operational Efficiencies
As performance practitioners we have always applied engineering principles to deliver value outside our organization. But with this growing technology landscape, companies are keen on driving...
The Hidden Threat of LinkedIn to Business Security
Presented by former FBI Special Agent Stacy Arruda, the purpose of this session is to demonstrate how terrorists, spies and criminals, the “bad guys,” take the seemingly innocuous information you...
Performance is not only about response time
Performance testing has often been the last step before deployment. Due to time constraints, many projects have been focused on one single metric: Response time. Response time is obviously important...
Among a Billion Configurations, How Would You Find the Best One?
The complexity of modern IT stack optimization, across both on-premises and hybrid cloud environments, has grown exponentially with the interplay of hundreds of tuning parameters across each layer...
Building a Modern-Day Site Reliability Team
In today’s fast-paced development environments, companies tend to focus on feature delivery speed so much that reliability can often be overlooked. Keeping up with reliability goals, however, is of...
Scaling Multi-Cloud with Infrastructure as Code
In the age of DevOps, “infrastructure as code” (IaC) is an emerging practice in which infrastructure is treated as versioned code. This practice reduces the effort required to create and manage...
Deep Learning’s Most Dangerous Vulnerability: Adversarial Attacks
Groundbreaking theory, big data, and computing power—with this trifecta, the extraordinary advent of deep learning seems almost inevitable. It propels computer vision and real-time operational and...
Driving the Business Case for Performance and Optimization
A lot is changing in the world, driving tremendous uncertainty and volatility in IT demand. These growing influences have created an increased demand for performance management and optimization. ...
Performance Engineering as a Service: Enabling Performance Testing at Scale in a DevOps World Using Infrastructure Automation
Performance is everything for an e-commerce company like Wayfair. The global e-commerce retailer employs more than 2,300 engineers and has dozens of software engineering teams to maintain their IT...
Changing the Rules of Engagement: Supporting Business Growth through Capacity Planning at Cerner
The IT operations team at Cerner, a leading supplier of health information technology, faced many challenges including a growing user base, new IT environments, constantly changing application...
The Hidden Threat of LinkedIn to Business Security
Presented by former FBI Special Agent Stacy Arruda, the purpose of this session is to demonstrate how terrorists, spies and criminals, the “bad guys,” take the seemingly innocuous information you...
Secure Z! Escape Room Experience
In this collaborative Escape Room experience, participants play the roles of newly hired z/OS security professionals at the fictitious company, Mock-Up Services Enterprises (M.U.S.E.), investigating...
Security and Encryption for the Future
Since 2013, 14.7 billion records have been breached and the average cost of a breach was $3.86 million. In this session, participants will learn methods to strategically secure their data and move...
Betting on Digital Leadership
In his role at Caesars Entertainment Corporation, Jay is responsible for all aspects of technology infrastructure and reliable operations. He has designed and deployed solutions for the hotel, food...
Practically Magic: How Anticipatory Design Is the Future of Product Development
Heather Wilde is a multiple–award winning, six-time CTO and 5x-certified executive coach. Heather was an early employee of Spirit Airlines and a founding member of Evernote, where she oversaw the...
Netflix Performance Tales in One Take
At Netflix we’re focused on running our service as efficiently as possible to serve our more than 150 million members around the world. We are always looking for ways to highlight and fix...