Marc hoit University Campus - Microcosm of the future


Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Marc hoit University Campus - Microcosm of the future

  1. 1. University Campus: A Microcosm ofthe Future Triangle InfoSeCon October 20, 2011 Marc Hoit, PhD Vice Chancellor for IT NC State University
  2. 2. Projected Mobile Internet Use in 2015Source:
  3. 3. Source:
  4. 4. Source:
  5. 5. Source:
  6. 6. Source:
  7. 7. A microcosm of the future• Students – aggressive early adopters of cloud based solutions, mobile technology and all things new• Administrative Staff –more predictable demand, reliable secure access and nimble support for radical changes in business requirements• Faculty – independent, entrepreneurial with unique requirements and a focus on research, teaching and service
  8. 8. EDUCAUSE: Top-Ten IT Issues, 20111. Funding IT2. Administrative/ERP/Information Systems3. Teaching and Learning with Technology4. Security5. Mobile Technologies6. Agility/Adaptability/Responsiveness7. Governance, Portfolio/Project Management8. Infrastructure/Cyberinfrastructure9. Disaster Recovery / Business Continuity10.Strategic Planning
  9. 9. NC State is a Small City• 34,000 Student, 8,000 Faculty & Staff – 11 Colleges – each with departments – 57 centers & institutes• $1.2 B annual expenditure budget• Business focus: Education (training) & Research – Research: $361M annual expenditures• 2,120 acres in size – 348 Buildings > 1000 sq ft – 14.2 million gross square feet – 1.2 million rentable square feet on Centennial Campus – 18.7 miles of paved roads – 72 residence halls housing 8,454
  10. 10. 2010 Horizon Report - Trends• The abundance of resources and relationships made easily accessible via the Internet is challenging our roles as educators in sense- making, coaching, and credentialing.• People expect to be able to work, learn, and study whenever and wherever they want to.• The technologies we use are increasingly cloud- based, and IT support are decentralized.• The work of students is increasingly seen as collaborative resulting in more collaboration between departments
  11. 11. More Students Owned Laptops Than Other Devices in 2010 95% of students own a computer 4% own only a desktop© 2011 STUDENT MONITOR LLC
  12. 12. WIRELESS READING DEVICES OWNED More than one in seven (14%) own a wireless reading iPad 8% device Among this 14%, Kindle 3% nearly six in ten (57%) own an iPad while Nook 2% one in five (21%) own a Kindle and one in Galaxy 1% seven (14%) own a Nook Xoom 1% Sony eReader 1% None of these 86%© 2011 STUDENT MONITOR LLC
  13. 13. Internet Capable Handheld DevicesECAR, 2010
  14. 14. Text Messaging is the CommunicationForm of Choice for Most Students
  15. 15. NC State Residence Hall Survey, 2011 80.00% 69.32% 70.00% 60.00% 50.00% 40.00% 30.00% 24.60% 23.05% 25.06% 20.00% 11.70% 10.00% 7.86% 8.03% 3.56% 0.00%
  16. 16. 2010 Horizon Report – Technologies to Watch • Within next 12 months: – Mobile computing – Open content • Within 2~3 years: – Electronic books – Simple augmented reality • Within 4~5 years: – Gesture based computing – Visual data analysis
  17. 17. Mobile internet usage U.S. Mobile Internet Time by Category: May 2010 Share of mobile Share of mobile Internet Time based Internet Time based on on total time at an average time spent at a RANK Mobile Sector individual site-level* category-level** 1 E-Mail 38.50% 41.60% 2 Social Networking 10.70% 10.50% News & Current 3 Events 7.20% 4.40% 4 Search 6.30% 7.10% 5 Portals 4.60% 11.60% 6 Entertainment 4.30% 3.30% 7 Sports 4.10% 2.30% 8 Music 4.00% 3.10% 9 Videos/Movies** 3.00% 2.00% 10 Weather 2.80% 2.80%
  18. 18. Personal Technology in the Workplace… It’s to embrace and support it.
  19. 19. Instructional Technology and the Professoriateor “the world is changing faster than you are”• Technology causes disruptive change – Skype and the telecommunications industry; Professors are “Skyping” their students?• We support enterprise tools, such as LMSs or even content capture• Our challenge isn’t just “keeping up with the Jones’” but: – Allowing people to explore and us support technologies as they emerge, before they even get to a standardized/enterprise level.
  20. 20. Instructional Technology Sampler• Enterprise: Learning Management Systems – Moodle, Blackboard, Sakai 84% of colleges/universities use one [Eduventures. (June, 2009). Benchmarking Online Operations. Online Higher Educational Learning Collaborative.]• Content CaptureVs• Emerging – Sharepoint (as LMS), Google Sites, Tumblr, Scoop.It,
  21. 21. University Mobile Initiative Committee• Representation from central and distributed IT groups• Acts as a mentor and facilitator for mobile projects on campus, including mobile web, mobile application development, and text messaging• Responsible for the Apple Developer License for NC State – Released 3 applications into the Apple App Store • WolfWalk - A photographic guide to the history of North Carolina State University. • WolfMatch - A free Match 3 game from NC State Distance Education • On Campus - A location-based application exclusive to NC State University’s campus.• Maintain mobile website – Compatible with any mobile device with a web browser.• Support the library’s initiatives with
  22. 22. Social Media -• Aggregates all of NC States (nearly 200) twitter accounts into a single feed.• Collaboration: – Outreach Technology provides back-end integration with Twitter – University Communications provided user interface and design• Outreach: – Source: – Many universities have implemented the code at their school, giving NC State credit• Training: Effective use Twitter to communicate – Slides: university
  23. 23. Around COE for Students• Computer Science department piloted using Android devices as platform to teach JAVA programming courses• My Schedule application developed to deliver a student’s course schedule tied with map data – Ties into Engineering Maps data to locate course’s building – Provides instructor information and location from directory services
  24. 24. College of Engineering: iPad Study • Five each faculty, staff, undergrads, and graduate students given an iPad for 3 months • Asked to blog about their experiences • Email, web browsing, and social media dominated top uses• Many staff and faculty use for daily email, web browsing, and content consumption• Most find it is NOT a full computer replacement• Users will still come to you for support even if it is a personal device
  25. 25. College of Engineering: Phone vs. Tablet• Important to understand the difference in utilization between smartphone and tablet• Nielsen reports that 65% of tablet owners use their smartphones exactly the same amount before hand with only 13% reporting using it less• 31% of users say they use a tablet over a PC/laptop because it is easy to carry take with you
  26. 26. What’s drives universities to the cloud?• Cloud more likely for new services than to transition established services• Individual faculty or students looking for the added flexibility and convenience• Calls for increased IT reliability and access• Timely access to the latest IT functionality• Budget pressures – Outsourcing cost of development and maintenance of application code
  27. 27. My Most Used iPad Apps• ActiveSync -> native email, calendar• iAnnotate: PDF reader AND mark-up• Penultimate: Note taking (written)• Dropbox: integrated cloud storage for iPad (and others)• FilesConnect: Connect to SMB (MS) network storage• Jump: RDP Client
  28. 28. A growing area for NC State…• Students and employees expect to access campus services from personally owned devices.• Google Apps for Education is our messaging platform (faculty, staff & students)• More use of cloud technology (e.g., Google, DropBox, etc.)• More sensitive data diffusion and compliance legislation• More diversity of devices and software• Setting service expectations is crucial
  29. 29. Major OIT Projects• Gmail for Students – Next phase to make improvements (general calendars, more use of sites, etc) – NextGen mail for Faculty & Staff – in transition• Postini - Spam & Virus for Faculty & Staff – eDiscovery Retention: ALL email retained for 10 Years• Managed Desktop Service – Provide desktop support with tiered pricing (partner, basic, extended)• Combined Pricing Initiative – New law requiring unified purchasing for UNC – 7 Standard configurations (laptops, desktops) + options – 3 vendors (Dell, HP, Lenovo) + Apple – Exception process for special needs (expect to be <)
  30. 30. Major OIT Projects (continued)• Web hosting – On-campus version of Cpanel type service with branded templates ($20/month)• Classroom Capture Project – Purchased 50 classroom capture units – mostly installed• Centralized Storage Project – Expand & enhance the centralized data storage & backup services – Working on archiving option to meet NSF & DoD requirement• Identity and Access Management – Unified, authoritative, secure, efficient and cost-effective IAM environment that meets current and future needs & legal requirements• University Data Mart – Developing a data mart, dashboard, and query tools to provide easily accessible, decision-support information for NC State
  31. 31. Managed & Desktop Support4 key changes to improve campus support: 1. OIT purchased SCCM (PCs) and Casper Suite (Macs) • Unified management tools for campus • Developed by task force and Campus IT Directors (CITD) 2. Desktop management offering • Developed true cost per PC for support (at 4 levels) • Existing (administrative) customers will see change: – Same service level as past for default (other options available) – In 2011, we will be transitioning to a new desktop configuration with additional file space and Windows 7. • New customers welcomed 3. IT Support personnel in-sourcing option (from OIT) 4. Combined Pricing Initiative (CPI) • Marketplace and standard PC’s – across UNC
  32. 32. OIT Managed Desktop Cost Model Support Service Levels - Year 1 (FY 10-11) Partnered Extended Premium Additional Desktop Support Service Cost Model: Support Basic Support Support Support Lab Support MachinesAnnual Charge Per User/Workstation: $244.00 $497.00 $682.00 $948.00 $920.00 $252.00Monthly Installment of annual charge: $20.33 $41.42 $56.83 $79.00 $76.67 $21.00Support Service Includes the Following:Secure and reliable computing environment √ √ √ √ √ √Immediate, remote help desk support/assistance √ √ √ √ √ √User home directory (5GB per user) √ √ √ √Departmental share (Tiered Storage Rate) √ √ √ √Productivity Software (Windows OS, Office, AdobePro) √ √ √ √ √ √Application Packaging and Delivery √ √ √ √ √ √Desktop patching √ √ √ √ √ √Email support √ √ √ √ √ √End-user training √ √ √ √ √ √Tier 2 Remote Application and Desktop Support √ √ √ √ √Network connectivity support √ √ √ √ √Network printer/copier/scanner support √ √ √ √ √On-site desktop support √ √ √Hardware warranty repairs √ √ √Loaner workstations √ √ √Workstation Allowance of $800 (4 year refresh cycle) √ √End-user after hours support (6 pm to 10 pm) √ √Guaranteed 60-minute on-site support √ √Direct access to support staff √ √4-hour downtime guarantee (for hardware problems) √ √Lab Application Packaging √
  33. 33. Mixing Application on a Single Device Causes Security ChallengesHow Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and GeneralManager, Endpoint Security, McAfee, Inc., 2010
  34. 34. Sensitive Data – Compliance & Regulation• As regulation grows – so does compliance workload – SOX/FISMA, FERPA/ HEOA, NC Id Theft, HIPAA, PCI, GLB – Open Records Laws (Public institutions)• Public sensitivity and potential for reputational harm• Fines and penalties - growing• Personal use & privacy – Combined use devices (personal and work) – Records access and retention
  35. 35. How We Currently Secure• Anti-malware • Firewalls – Email and computers – Limited on Campus – separate solutions perimeter – Cloud solutions for – Stronger control on email server environment – Centrally managed • Server hardening• Manual analysis with • Intrusion detection scripts systems – Network & server – Network logs – Endpoint and – Phishing server Host IPS – Malware
  36. 36. Future protection directions• End points become the new • More automation and perimeter consolidation of protection – Web browsers anywhere… – Intrusion Prevention Systems – Malware prevention on – Security Incident Event endpoints (beyond AV…) Monitoring• Match levels of security to – Log correlation sensitivity of data – Advanced malware control • Developing guides and data – Data Leakage Protection sensitivity framework • Protect data with encryption• Authentication – All sensitive data storage – Multi-factor (Passwords passé) • Mobile device storage – Federated SSO • Email (Manual or Automated• More security guidelines and Policy) awareness training – Communications – Recognize services will be • SSL and VPN used – Focus on keeping data safe through educated use
  37. 37. Top Areas of Effort in IT Security• Compliance with PCI DSS v2.0• Data Sensitivity Framework• Mobile Device Security Guidelines• Guidelines for cloud services (Dropbox, etc)• Red Lambda - DMCA monitoring• Research data security & compliance with grants and federal requirements• Students use of technology - must keep up
  38. 38. Risk Based Strategy for Effort Decision on Effort to Particular Solution 5 Probability of Occurrence 4 3 2 1 0 Low Impact High Impact Impact to Reputation
  39. 39. Data Classification Statement MatrixLevel Risk Regulation Financial Reputation Business OtherHigh Two of Violation Significant Serious SeriousRed-Hot Two of Multiple Significant Serious Serious LitigationModerate One of Violation Some Some AdverseNormal No Access major controlNot Nonesensitive
  40. 40. Mobile and Personal Devices: A key support concept… how to access services, not how to use the device.
  41. 41. Level of Criticality in Managing Consumer Devices In a McAfee survey of 233 IT decision-makers, 45 percent of the respondents said that managing consumer- owned devices and related technologies within the enterprise network is “critical.” How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General Manager, Endpoint Security, McAfee, Inc., 2010
  42. 42. Security for Personal Mobile Devices• Multiple new operating systems – Android, iOS, Windows mobile, etc.• Software and hardware technology changing rapidly• Thousands of commercial apps – limited certification of distributed apps• Sensitive data stored on mobile devices should be multi- level encrypted• Institution may need to “wipe” device when employee leaves• Access control – passwords (minimum) & multi factor
  43. 43. Is There Safety in the Cloud?• High degree of trust • Regulations still apply to needed since control the cloud systems delegated, consider – Handle most with long-term viability contract: • Access, location, indemnity,• Cloud services can be breach response, etc more secure than • Encrypt all sensitive data current offerings using multiple levels• Integrate with • Ensure authorization and institutions Identity tools to investigate Management breaches MagazineVolum/IsThereSafetyintheCloud/206543
  44. 44. Key Business Decisions…• Can employees use personally-owned devices for their work? – Home computers? – Tablets? – Do we have a choice?• If so, what are your requirements of them? – Security standards – Data retention requirements – Data compliance requirements
  45. 45. Who is responsible?University responsibility Client responsibility• Establish device standards • Ensure that device is (browsers, mobile functional—can it connect platform/OS, etc.) receiving to services off-campus? full support and communicate to clients. • What data is on the device and is it secure?• Provide configuration information for key • Report loss/theft of the University-provided services device quickly. (email, calendar, etc.)• Support connections to key services
  46. 46. Moving forward…• Mobile, multiple and personal devices are here to stay.• New services should be designed with personal & mobile devices in mind.• Move to functional requirements and support• In the workplace, don’t confuse workplace behavior with technology. – Establish requirements on a functional level – Security, support and access will be more distributed and less “controlled”
  47. 47. "It is not necessary to change. Survival is not mandatory." ~W. Edwards Deming~