marc hoit university campus - microcosm of the future
Post on 16-Jan-2015
431 Views
Preview:
DESCRIPTION
TRANSCRIPT
University Campus: A Microcosm of
the Future
Triangle InfoSeCon
October 20, 2011
Marc Hoit, PhD
Vice Chancellor for IT
NC State University
Projected Mobile Internet Use in 2015
Source: http://www.business2community.com/mobile-apps/video-
infographic-mobile-trends-dominate-the-internet-in-2015-048554
Source: http://gist.com/
Source: http://gist.com/
Source: http://gist.com/
Source: http://gigaom.com/2010/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/
A microcosm of the future
• Students – aggressive early adopters of
cloud based solutions, mobile technology
and all things new
• Administrative Staff –more predictable
demand, reliable secure access and nimble
support for radical changes in business
requirements
• Faculty – independent, entrepreneurial with
unique requirements and a focus on
research, teaching and service
EDUCAUSE: Top-Ten IT Issues, 2011
1. Funding IT
2. Administrative/ERP/Information Systems
3. Teaching and Learning with Technology
4. Security
5. Mobile Technologies
6. Agility/Adaptability/Responsiveness
7. Governance, Portfolio/Project Management
8. Infrastructure/Cyberinfrastructure
9. Disaster Recovery / Business Continuity
10.Strategic Planning
NC State is a Small City
• 34,000 Student, 8,000 Faculty & Staff
– 11 Colleges – each with departments
– 57 centers & institutes
• $1.2 B annual expenditure budget
• Business focus: Education (training) & Research
– Research: $361M annual expenditures
• 2,120 acres in size
– 348 Buildings > 1000 sq ft
– 14.2 million gross square feet
– 1.2 million rentable square feet on Centennial Campus
– 18.7 miles of paved roads
– 72 residence halls housing 8,454
2010 Horizon Report - Trends
• The abundance of resources and relationships
made easily accessible via the Internet is
challenging our roles as educators in sense-
making, coaching, and credentialing.
• People expect to be able to work, learn, and study
whenever and wherever they want to.
• The technologies we use are increasingly cloud-
based, and IT support are decentralized.
• The work of students is increasingly seen as
collaborative resulting in more collaboration
between departments
http://www.nmc.org/pdf/2010-Horizon-Report.pdf
More Students Owned Laptops Than
Other Devices in 2010
http://chronicle.com/section/Almanac/536
95% of students own a computer
4% own only a desktop
© 2011 STUDENT MONITOR LLC
86%
1%
1%
1%
2%
3%
8%
None of these
Sony eReader
Xoom
Galaxy
Nook
Kindle
iPad
WIRELESS READING DEVICES OWNED
More than one in seven (14%) own a wireless reading device
Among this 14%, nearly six in ten (57%) own an iPad while one in five (21%) own a Kindle and one in seven (14%) own a Nook
© 2011 STUDENT MONITOR LLC
Internet Capable Handheld Devices
ECAR, 2010
Text Messaging is the Communication
Form of Choice for Most Students
http://chronicle.com/section/Almanac/536
NC State Residence Hall Survey, 2011
11.70%
69.32%
7.86% 3.56%
24.60% 23.05% 25.06%
8.03%
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
2010 Horizon Report – Technologies to Watch
• Within next 12 months:
– Mobile computing
– Open content
• Within 2~3 years:
– Electronic books
– Simple augmented reality
• Within 4~5 years:
– Gesture based computing
– Visual data analysis
http://www.nmc.org/pdf/2010-Horizon-Report.pdf
Mobile internet usage
U.S. Mobile Internet Time by Category: May 2010
RANK Mobile Sector
Share of mobile
Internet Time based
on total time at an
individual site-level*
Share of mobile
Internet Time based on
average time spent at a
category-level**
1 E-Mail 38.50% 41.60%
2 Social Networking 10.70% 10.50%
3 News & Current
Events 7.20% 4.40%
4 Search 6.30% 7.10%
5 Portals 4.60% 11.60%
6 Entertainment 4.30% 3.30%
7 Sports 4.10% 2.30%
8 Music 4.00% 3.10%
9 Videos/Movies** 3.00% 2.00%
10 Weather 2.80% 2.80%
http://blog.nielsen.com/nielsenwire/online_mobile/how-americans-spend-mobile-
internet-time-a-new-look/
Personal Technology in the Workplace…
It’s here...how to embrace and support it.
• Technology causes disruptive change
– Skype and the telecommunications industry;
Professors are “Skyping” their students?
• We support enterprise tools, such as LMSs
or even content capture
• Our challenge isn’t just “keeping up with the
Jones’” but:
– Allowing people to explore and us support
technologies as they emerge, before they even
get to a standardized/enterprise level.
Instructional Technology and the Professoriate
or “the world is changing faster than you are”
Instructional Technology Sampler
• Enterprise: Learning Management Systems
– Moodle, Blackboard, Sakai
84% of colleges/universities use one [Eduventures.
(June, 2009). Benchmarking Online Operations.
Online Higher Educational Learning Collaborative.]
• Content Capture
Vs
• Emerging
– Sharepoint (as LMS), Google Sites, Tumblr,
Scoop.It,
University Mobile Initiative Committee
• Representation from central and distributed IT groups
• Acts as a mentor and facilitator for mobile projects on
campus, including mobile web, mobile application
development, and text messaging
• Responsible for the Apple Developer License for NC State
– Released 3 applications into the Apple App Store
• WolfWalk - A photographic guide to the history of North Carolina State
University.
• WolfMatch - A free Match 3 game from NC State Distance Education
• On Campus - A location-based application exclusive to NC State
University’s campus.
• Maintain http://m.ncsu.edu mobile website – Compatible with any mobile device with a web browser.
• Support the library’s initiatives with http://m.lib.ncsu.edu
Social Media - http://twitter.ncsu.edu
• Aggregates all of NC States (nearly 200) twitter accounts
into a single feed.
• Collaboration:
– Outreach Technology provides back-end integration with Twitter
– University Communications provided user interface and design
• Outreach:
– Source: https://github.com/jfaustin/Tweet-gater
– Many universities have implemented the code at their school, giving
NC State credit
• Training: Effective use Twitter to communicate
– Slides: http://www.slideshare.net/jfaustin/tweeting-for-nc-state-
university
Around COE for Students
• Computer Science department
piloted using Android devices as
platform to teach JAVA
programming courses
• My Schedule application
developed to deliver a student’s
course schedule tied with map
data
– Ties into Engineering Maps data to
locate course’s building
– Provides instructor information and
location from directory services
College of Engineering: iPad Study
• Five each faculty, staff, undergrads,
and graduate students given an
iPad for 3 months
• Asked to blog about their
experiences
• Email, web browsing, and social
media dominated top uses
• Many staff and faculty use for daily email, web
browsing, and content consumption
• Most find it is NOT a full computer replacement
• Users will still come to you for support even if it is
a personal device
College of Engineering: Phone vs. Tablet
• Important to understand the difference in
utilization between smartphone and tablet
• Nielsen reports that 65% of tablet owners
use their smartphones exactly the same
amount before hand with only 13% reporting
using it less
• 31% of users say they use a tablet over a
PC/laptop because it is easy to carry take
with you
What’s drives universities to the cloud?
• Cloud more likely for new services than to
transition established services
• Individual faculty or students looking for the
added flexibility and convenience
• Calls for increased IT reliability and access
• Timely access to the latest IT functionality
• Budget pressures
– Outsourcing cost of development and maintenance of
application code
My Most Used iPad Apps
• ActiveSync -> native email, calendar
• iAnnotate: PDF reader AND mark-up
• Penultimate: Note taking (written)
• Dropbox: integrated cloud storage for iPad
(and others)
• FilesConnect: Connect to SMB (MS) network
storage
• Jump: RDP Client
A growing area for NC State…
• Students and employees expect to access
campus services from personally owned
devices.
• Google Apps for Education is our messaging
platform (faculty, staff & students)
• More use of cloud technology (e.g., Google,
DropBox, etc.)
• More sensitive data diffusion and
compliance legislation
• More diversity of devices and software
• Setting service expectations is crucial
Major OIT Projects • Gmail for Students
– Next phase to make improvements (general calendars, more use of sites, etc)
– NextGen mail for Faculty & Staff – in transition
• Postini - Spam & Virus for Faculty & Staff – eDiscovery Retention: ALL email retained for 10 Years
• Managed Desktop Service – Provide desktop support with tiered pricing (partner, basic,
extended)
• Combined Pricing Initiative – New law requiring unified purchasing for UNC
– 7 Standard configurations (laptops, desktops) + options
– 3 vendors (Dell, HP, Lenovo) + Apple
– Exception process for special needs (expect to be <)
Major OIT Projects (continued) • Web hosting
– On-campus version of Cpanel type service with branded templates
($20/month)
• Classroom Capture Project – Purchased 50 classroom capture units – mostly installed
• Centralized Storage Project – Expand & enhance the centralized data storage & backup services – Working on archiving option to meet NSF & DoD requirement
• Identity and Access Management – Unified, authoritative, secure, efficient and cost-effective IAM
environment that meets current and future needs & legal requirements
• University Data Mart – Developing a data mart, dashboard, and query tools to provide
easily accessible, decision-support information for NC State
Managed & Desktop Support
4 key changes to improve campus support:
1. OIT purchased SCCM (PCs) and Casper Suite (Macs) • Unified management tools for campus
• Developed by task force and Campus IT Directors (CITD)
2. Desktop management offering
• Developed true cost per PC for support (at 4 levels)
• Existing (administrative) customers will see change:
– Same service level as past for default (other options available)
– In 2011, we will be transitioning to a new desktop configuration with additional
file space and Windows 7.
• New customers welcomed
3. IT Support personnel in-sourcing option (from OIT)
4. Combined Pricing Initiative (CPI)
• Marketplace and standard PC’s – across UNC
OIT Managed Desktop Cost Model
Desktop Support Service Cost Model:
Support Service Levels - Year 1 (FY '10-'11)
Partnered
Support Basic Support
Extended
Support
Premium
Support Lab Support
Additional
Machines
Annual Charge Per User/Workstation: $244.00 $497.00 $682.00 $948.00 $920.00 $252.00
Monthly Installment of annual charge: $20.33 $41.42 $56.83 $79.00 $76.67 $21.00
Support Service Includes the Following:
Secure and reliable computing environment √ √ √ √ √ √
Immediate, remote help desk support/assistance √ √ √ √ √ √
User home directory (5GB per user) √ √ √ √
Departmental share (Tiered Storage Rate) √ √ √ √
Productivity Software (Windows OS, Office, Adobe
Pro) √ √ √ √ √ √
Application Packaging and Delivery √ √ √ √ √ √
Desktop patching √ √ √ √ √ √
Email support √ √ √ √ √ √
End-user training √ √ √ √ √ √
Tier 2 Remote Application and Desktop Support √ √ √ √ √
Network connectivity support √ √ √ √ √
Network printer/copier/scanner support √ √ √ √ √
On-site desktop support √ √ √
Hardware warranty repairs √ √ √
Loaner workstations √ √ √
Workstation Allowance of $800 (4 year refresh cycle) √ √
End-user after hours support (6 pm to 10 pm) √ √
Guaranteed 60-minute on-site support √ √
Direct access to support staff √ √
4-hour downtime guarantee (for hardware problems) √ √
Lab Application Packaging √
Mixing Application on a Single Device
Causes Security Challenges
How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General
Manager, Endpoint Security, McAfee, Inc., 2010
Sensitive Data – Compliance & Regulation
• As regulation grows – so does compliance
workload
– SOX/FISMA, FERPA/ HEOA, NC Id Theft, HIPAA, PCI,
GLB
– Open Records Laws (Public institutions)
• Public sensitivity and potential for reputational
harm
• Fines and penalties - growing
• Personal use & privacy
– Combined use devices (personal and work)
– Records access and retention
How We Currently Secure
• Anti-malware
– Email and computers
– separate solutions
– Cloud solutions for
– Centrally managed
• Manual analysis with
scripts
– Network & server
logs
– Phishing
– Malware
• Firewalls
– Limited on Campus
perimeter
– Stronger control on
server environment
• Server hardening
• Intrusion detection
systems
– Network
– Endpoint and
server Host IPS
Future protection directions • End points become the new
perimeter
– Web browsers anywhere…
– Malware prevention on
endpoints (beyond AV…)
• Match levels of security to
sensitivity of data
• Developing guides and data
sensitivity framework
• Authentication
– Multi-factor (Passwords passé)
– Federated SSO
• More security guidelines and
awareness training
– Recognize services will be
used
– Focus on keeping data safe
through educated use
• More automation and
consolidation of protection
– Intrusion Prevention Systems
– Security Incident Event
Monitoring
– Log correlation
– Advanced malware control
– Data Leakage Protection
• Protect data with encryption
– All sensitive data storage • Mobile device storage
• Email (Manual or Automated
Policy)
– Communications
• SSL and VPN
Top Areas of Effort in IT Security
• Compliance with PCI DSS v2.0
• Data Sensitivity Framework
• Mobile Device Security Guidelines
• Guidelines for cloud services (Dropbox, etc)
• Red Lambda - DMCA monitoring
• Research data security & compliance with
grants and federal requirements
• Students use of technology - must keep up
Risk Based Strategy for Effort
0
1
2
3
4
5
Low Impact High Impact
Pro
bab
ilit
y o
f O
ccu
rren
ce
Impact to Reputation
Decision on Effort to Particular Solution
Data Classification Statement Matrix Level Risk Regulation Financial Reputation Business Other
High Two of Violation Significant Serious Serious
Red-Hot Two of Multiple Significant Serious Serious Litigation
Moderate One of Violation Some Some Adverse
Normal No
major
Access
control
Not
sensitive
None
Mobile and Personal Devices:
A key support concept…
how to access services, not how to use
the device.
Level of Criticality in Managing Consumer Devices
In a McAfee survey of
233 IT decision-makers,
45 percent of the
respondents said that
managing consumer-
owned devices and
related technologies
within the enterprise
network is “critical.”
How Can You Prepare for the Consumerization
of IT? by Candace Worley, Senior Vice President
and General Manager, Endpoint Security, McAfee,
Inc., 2010
Security for Personal Mobile Devices
• Multiple new operating systems – Android, iOS,
Windows mobile, etc.
• Software and hardware technology changing rapidly
• Thousands of commercial apps – limited certification of
distributed apps
• Sensitive data stored on mobile devices should be multi-
level encrypted
• Institution may need to “wipe” device when employee
leaves
• Access control – passwords (minimum) & multi factor
Is There Safety in the Cloud?
• High degree of trust
needed since control
delegated, consider
long-term viability
• Cloud services can be
more secure than
current offerings
• Integrate with
institutions Identity
Management
• Regulations still apply to
the cloud systems
– Handle most with
contract:
• Access, location, indemnity,
breach response, etc
• Encrypt all sensitive data
using multiple levels
• Ensure authorization and
tools to investigate
breaches
http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterly
MagazineVolum/IsThereSafetyintheCloud/206543
Key Business Decisions…
• Can employees use personally-owned
devices for their work?
– Home computers?
– Tablets?
– Do we have a choice?
• If so, what are your requirements of them?
– Security standards
– Data retention requirements
– Data compliance requirements
Who is responsible?
University responsibility
• Establish device standards
(browsers, mobile
platform/OS, etc.) receiving
full support and
communicate to clients.
• Provide configuration
information for key
University-provided services
(email, calendar, etc.)
• Support connections to key
services
Client responsibility
• Ensure that device is
functional—can it connect
to services off-campus?
• What data is on the
device and is it secure?
• Report loss/theft of the
device quickly.
Moving forward…
• Mobile, multiple and personal devices are
here to stay.
• New services should be designed with
personal & mobile devices in mind.
• Move to functional requirements and support
• In the workplace, don’t confuse workplace
behavior with technology.
– Establish requirements on a functional level
– Security, support and access will be more
distributed and less “controlled”
"It is not necessary to change.
Survival is not mandatory."
~W. Edwards Deming~
top related