Your SlideShare is downloading. ×
0
IT Services in Higher Education – what Enterprisecan learn from the Universities
Industry Hot Topics – does it all seem familiar?    •   Cloud Computing (and SDN)    •   BYOD/T/S    •   The “internet of ...
BYO – the hottest topic of all    Some numbers    •    95% of organizations allow employee-owned devices in the workplace ...
More Numbers4
BYO = BAU for HE    •   Residential students have always “Brought their own”    •   Universities very rarely have separate...
Students are the “connected generation”     Source: Cisco6
With the rest of us not far behind7
The lessons we take from HE to BYO    •   Understand your existing environment    •   Don’t let technology capabilities di...
Multi – Tenancy, isn’t that just using your infrastructure?    The Enterprise Picture    •   Cloud service provision and c...
The “internet of things”     It’s the new BYO!     •   Kevin Ashton, MIT coined the term in 1999 – the vision was ubiquito...
There cannot be a proprietary solution11
Not so much has changed – we’re still sharing networks                                                     This….12
(Bob Metcalfe preceded Visio..)                                       And this (Alohanet)…13
And segmenting..                        Allowed this…14
And virtualising (Unsigned by the artist)                                                 With some of this…15
It’s just bigger16                      To Become this…
And works even over 185 Meters17
Big Science >> Big Data >> Big IT     1913 Panama Canal (40,000 people – warning, this may be engineering!)     1939 ULTRA...
Academic and Research projects In HE force innovation and create markets     •   Cloud computing (Virtualisation, HPC, Orc...
Thankyou – we (really) couldn’t do it without you..     Next Generation Security     •   Application visibility and contro...
Upcoming SlideShare
Loading in...5
×

UCISA 2013 Presentation

71

Published on

Adrian Taylor, Data Integration CTO presented at this year's UCISA conference.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
71
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "UCISA 2013 Presentation"

  1. 1. IT Services in Higher Education – what Enterprisecan learn from the Universities
  2. 2. Industry Hot Topics – does it all seem familiar? • Cloud Computing (and SDN) • BYOD/T/S • The “internet of things” • Mobility (consumerization) • Consumption based service provision • Multi – tenancy • Virtualisation • HPC • “Big” Data2
  3. 3. BYO – the hottest topic of all Some numbers • 95% of organizations allow employee-owned devices in the workplace • 84% of respondents also provide some support • 36% provide full support for ANY device • By 2014, the average connected devices per white collar worker will be 3.3 Why is this happening in the enterprise at all? • 76% of IT Leaders consider BYO to be “very” or “extremely” positive.. • Benefits of between $300 and $1300 per employee are estimated Why is this really happening in the enterprise at all? • 69% of employees want to use “unapproved” applications at work • 40% cited “device choice” as their top reason – above “work capability” • The CxO factor Sources Cisco / Absolute Software / BBC3
  4. 4. More Numbers4
  5. 5. BYO = BAU for HE • Residential students have always “Brought their own” • Universities very rarely have separate infrastructure • Universities always support pretty much whatever arrives • Student populations are among the most demanding user demographics • Research and Academic populations are THE most demanding demographic • Universities get both, and have to work with limited funds • These challenges have been met by HE for many years, before “BYO” was coined So do we actually need special “BYO” technology in the enterprise?5
  6. 6. Students are the “connected generation” Source: Cisco6
  7. 7. With the rest of us not far behind7
  8. 8. The lessons we take from HE to BYO • Understand your existing environment • Don’t let technology capabilities dictate policy • HAVE a policy • Enforce that policy but pick your battles – what’s really important? • It’s still about productivity first – the internet is the student application, it may not be for you • No amount of MDM, Endpoint control or NAC on top of “bad” design will help • There is no such thing as a supportless model – you WILL have to do it • Take steps with what you already have – there is so much unused capability • Don’t lump BYO and mobility in together – they are distinct8
  9. 9. Multi – Tenancy, isn’t that just using your infrastructure? The Enterprise Picture • Cloud service provision and consumption is driving multi-tenancy models • Reduced funding in traditionally recalcitrant sectors (finance) is changing opinions • Network design has moved on – things like SDN have caused a re-examination • In parallel, refresh cycles are being pushed up to and beyond EOL notifications • “Doing more with less” is a recurring theme • Space, power, cooling – much more relevant in a recession Suddenly this all means REAL money to enterprise9
  10. 10. The “internet of things” It’s the new BYO! • Kevin Ashton, MIT coined the term in 1999 – the vision was ubiquitous RFID • Asset tracking was the first practical use How does it look today? • APIs and Service Buses, effectively Why is enterprise suddenly excited by it? • Smart metering • Connected cars • Buildings Management Systems • Power and cooling micro-control Why is enterprise suddenly excited by it then?10
  11. 11. There cannot be a proprietary solution11
  12. 12. Not so much has changed – we’re still sharing networks This….12
  13. 13. (Bob Metcalfe preceded Visio..) And this (Alohanet)…13
  14. 14. And segmenting.. Allowed this…14
  15. 15. And virtualising (Unsigned by the artist) With some of this…15
  16. 16. It’s just bigger16 To Become this…
  17. 17. And works even over 185 Meters17
  18. 18. Big Science >> Big Data >> Big IT 1913 Panama Canal (40,000 people – warning, this may be engineering!) 1939 ULTRA decoding project at Bletchley Park (10,000 people) 1942 The Manhattan Project (130,000 people) 1969 The Apollo Project (400,000 people) 2002 Alzheimer’s Disease Neuroimaging Initiative (ADNI; 30,000 people, 90 orgs) 2003 Human Genome Sequencing (100,000 people, 120 countries) 2008 Large Hadron Collider (10,000 people, 100 countries) Real-time collaboration, instant result sharing Academic and Research projects In HE force innovation and create markets HE Leads the way in developing HPC, and “big” data analysis – Hadoop is open source18
  19. 19. Academic and Research projects In HE force innovation and create markets • Cloud computing (Virtualisation, HPC, Orchestration, NAC) • IPv6 ratification (through IETF membership) and early adoption • Big Data (Hadoop / MapReduce techniques) • Collaboration on an enormous scale, without the travel (research, VLE, MOOC) • Performance demands (speed, density, distance and quality control) • BYO (endpoint control, service delivery, session tracking and reporting)19
  20. 20. Thankyou – we (really) couldn’t do it without you.. Next Generation Security • Application visibility and control (Web 2.0 issues). You should have security and privacy safeguards that are fit-for-purpose in the age of Facebook, Twitter, LinkedIn and other social networks. They should also be able to securely enable WebEx, Instant Messaging, remote diagnostics and other technologies that bypass traditional communication protocols. • Endpoint protection and data leak prevention. As laptops, smartphones, tablets and other devices become an everyday business tool, they are now accessing potentially sensitive information that needs to be protected wherever it is distributed to. • Regulation and compliance (Governance). Most businesses are affected by regulation to some extent. The need to maintain compliance is essential to protect information and avoid financial penalties or reputational damage. • Malware attack. The Internet is replacing email as the primary channel for distribution and communication. Malware that is script-based can evade traditional / common antivirus and anti-malware software because of its inherent signature-based weaknessNext Generation Security Mobile and BYO • monitor and manage your mobile devices (MDM); • backup and restore data; • protect against virus and malware attack; • mitigate against loss or theft (GPS location remote wipe / remote locking); • control spam and other unwanted traffic (content management). Network Consolidation • Eliminating layers of switching to flatten and collapse the network from today’s 3-tier architecture to 2 layers and, ultimately, to just 1. • Simplification; achieved by interconnecting multiple physical switches, creating a single, logical device that combines the performance and simplicity of a switch with the connectivity and resilience of a network. • Reduction of complexity and acceleration of performance by the creation of a single data centre-wide fabric that provides any-to-any connection. • Cost and emissions; you can expect to see up to a 40% reduction in power consumption, a 30% reduction in heat output and a 20% increase in mean time between failure (MTBF) of major network components.20
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×