Advantages of Hiring UIUX Design Service Providers for Your Business
Marc hoit University Campus - Microcosm of the future
1. University Campus: A Microcosm of
the Future
Triangle InfoSeCon
October 20, 2011
Marc Hoit, PhD
Vice Chancellor for IT
NC State University
2. Projected Mobile Internet Use in 2015
Source: http://www.business2community.com/mobile-apps/video-
infographic-mobile-trends-dominate-the-internet-in-2015-048554
9. A microcosm of the future
• Students – aggressive early adopters of
cloud based solutions, mobile technology
and all things new
• Administrative Staff –more predictable
demand, reliable secure access and nimble
support for radical changes in business
requirements
• Faculty – independent, entrepreneurial with
unique requirements and a focus on
research, teaching and service
10. EDUCAUSE: Top-Ten IT Issues, 2011
1. Funding IT
2. Administrative/ERP/Information Systems
3. Teaching and Learning with Technology
4. Security
5. Mobile Technologies
6. Agility/Adaptability/Responsiveness
7. Governance, Portfolio/Project Management
8. Infrastructure/Cyberinfrastructure
9. Disaster Recovery / Business Continuity
10.Strategic Planning
11. NC State is a Small City
• 34,000 Student, 8,000 Faculty & Staff
– 11 Colleges – each with departments
– 57 centers & institutes
• $1.2 B annual expenditure budget
• Business focus: Education (training) & Research
– Research: $361M annual expenditures
• 2,120 acres in size
– 348 Buildings > 1000 sq ft
– 14.2 million gross square feet
– 1.2 million rentable square feet on Centennial Campus
– 18.7 miles of paved roads
– 72 residence halls housing 8,454
12. 2010 Horizon Report - Trends
• The abundance of resources and relationships
made easily accessible via the Internet is
challenging our roles as educators in sense-
making, coaching, and credentialing.
• People expect to be able to work, learn, and study
whenever and wherever they want to.
• The technologies we use are increasingly cloud-
based, and IT support are decentralized.
• The work of students is increasingly seen as
collaborative resulting in more collaboration
between departments
http://www.nmc.org/pdf/2010-Horizon-Report.pdf
18. 2010 Horizon Report – Technologies to Watch
• Within next 12 months:
– Mobile computing
– Open content
• Within 2~3 years:
– Electronic books
– Simple augmented reality
• Within 4~5 years:
– Gesture based computing
– Visual data analysis
http://www.nmc.org/pdf/2010-Horizon-Report.pdf
19. Mobile internet usage
U.S. Mobile Internet Time by Category: May 2010
Share of mobile Share of mobile
Internet Time based Internet Time based on
on total time at an average time spent at a
RANK Mobile Sector individual site-level* category-level**
1 E-Mail 38.50% 41.60%
2 Social Networking 10.70% 10.50%
News & Current
3
Events 7.20% 4.40%
4 Search 6.30% 7.10%
5 Portals 4.60% 11.60%
6 Entertainment 4.30% 3.30%
7 Sports 4.10% 2.30%
8 Music 4.00% 3.10%
9 Videos/Movies** 3.00% 2.00%
10 Weather 2.80% 2.80%
http://blog.nielsen.com/nielsenwire/online_mobile/how-americans-spend-mobile-
21. Instructional Technology and the Professoriate
or “the world is changing faster than you are”
• Technology causes disruptive change
– Skype and the telecommunications industry;
Professors are “Skyping” their students?
• We support enterprise tools, such as LMSs
or even content capture
• Our challenge isn’t just “keeping up with the
Jones’” but:
– Allowing people to explore and us support
technologies as they emerge, before they even
get to a standardized/enterprise level.
22. Instructional Technology Sampler
• Enterprise: Learning Management Systems
– Moodle, Blackboard, Sakai
84% of colleges/universities use one [Eduventures.
(June, 2009). Benchmarking Online Operations.
Online Higher Educational Learning Collaborative.]
• Content Capture
Vs
• Emerging
– Sharepoint (as LMS), Google Sites, Tumblr,
Scoop.It,
23. University Mobile Initiative Committee
• Representation from central and distributed IT groups
• Acts as a mentor and facilitator for mobile projects on
campus, including mobile web, mobile application
development, and text messaging
• Responsible for the Apple Developer License for NC State
– Released 3 applications into the Apple App Store
• WolfWalk - A photographic guide to the history of North Carolina State
University.
• WolfMatch - A free Match 3 game from NC State Distance Education
• On Campus - A location-based application exclusive to NC State
University’s campus.
• Maintain http://m.ncsu.edu mobile website
– Compatible with any mobile device with a web browser.
• Support the library’s initiatives with http://m.lib.ncsu.edu
24. Social Media - http://twitter.ncsu.edu
• Aggregates all of NC States (nearly 200) twitter accounts
into a single feed.
• Collaboration:
– Outreach Technology provides back-end integration with Twitter
– University Communications provided user interface and design
• Outreach:
– Source: https://github.com/jfaustin/Tweet-gater
– Many universities have implemented the code at their school, giving
NC State credit
• Training: Effective use Twitter to communicate
– Slides: http://www.slideshare.net/jfaustin/tweeting-for-nc-state-
university
25. Around COE for Students
• Computer Science department
piloted using Android devices as
platform to teach JAVA
programming courses
• My Schedule application
developed to deliver a student’s
course schedule tied with map
data
– Ties into Engineering Maps data to
locate course’s building
– Provides instructor information and
location from directory services
26. College of Engineering: iPad Study
• Five each faculty, staff, undergrads,
and graduate students given an
iPad for 3 months
• Asked to blog about their
experiences
• Email, web browsing, and social
media dominated top uses
• Many staff and faculty use for daily email, web
browsing, and content consumption
• Most find it is NOT a full computer replacement
• Users will still come to you for support even if it is
a personal device
27. College of Engineering: Phone vs. Tablet
• Important to understand the difference in
utilization between smartphone and tablet
• Nielsen reports that 65% of tablet owners
use their smartphones exactly the same
amount before hand with only 13% reporting
using it less
• 31% of users say they use a tablet over a
PC/laptop because it is easy to carry take
with you
28. What’s drives universities to the cloud?
• Cloud more likely for new services than to
transition established services
• Individual faculty or students looking for the
added flexibility and convenience
• Calls for increased IT reliability and access
• Timely access to the latest IT functionality
• Budget pressures
– Outsourcing cost of development and maintenance of
application code
29. My Most Used iPad Apps
• ActiveSync -> native email, calendar
• iAnnotate: PDF reader AND mark-up
• Penultimate: Note taking (written)
• Dropbox: integrated cloud storage for iPad
(and others)
• FilesConnect: Connect to SMB (MS) network
storage
• Jump: RDP Client
30. A growing area for NC State…
• Students and employees expect to access
campus services from personally owned
devices.
• Google Apps for Education is our messaging
platform (faculty, staff & students)
• More use of cloud technology (e.g., Google,
DropBox, etc.)
• More sensitive data diffusion and
compliance legislation
• More diversity of devices and software
• Setting service expectations is crucial
31. Major OIT Projects
• Gmail for Students
– Next phase to make improvements (general calendars, more use of
sites, etc)
– NextGen mail for Faculty & Staff – in transition
• Postini - Spam & Virus for Faculty & Staff
– eDiscovery Retention: ALL email retained for 10 Years
• Managed Desktop Service
– Provide desktop support with tiered pricing (partner, basic,
extended)
• Combined Pricing Initiative
– New law requiring unified purchasing for UNC
– 7 Standard configurations (laptops, desktops) + options
– 3 vendors (Dell, HP, Lenovo) + Apple
– Exception process for special needs (expect to be <)
32. Major OIT Projects (continued)
• Web hosting
– On-campus version of Cpanel type service with branded templates
($20/month)
• Classroom Capture Project
– Purchased 50 classroom capture units – mostly installed
• Centralized Storage Project
– Expand & enhance the centralized data storage & backup services
– Working on archiving option to meet NSF & DoD requirement
• Identity and Access Management
– Unified, authoritative, secure, efficient and cost-effective IAM
environment that meets current and future needs & legal
requirements
• University Data Mart
– Developing a data mart, dashboard, and query tools to provide
easily accessible, decision-support information for NC State
33. Managed & Desktop Support
4 key changes to improve campus support:
1. OIT purchased SCCM (PCs) and Casper Suite (Macs)
• Unified management tools for campus
• Developed by task force and Campus IT Directors (CITD)
2. Desktop management offering
• Developed true cost per PC for support (at 4 levels)
• Existing (administrative) customers will see change:
– Same service level as past for default (other options available)
– In 2011, we will be transitioning to a new desktop configuration with additional
file space and Windows 7.
• New customers welcomed
3. IT Support personnel in-sourcing option (from OIT)
4. Combined Pricing Initiative (CPI)
• Marketplace and standard PC’s – across UNC
34. OIT Managed Desktop Cost Model
Support Service Levels - Year 1 (FY '10-'11)
Partnered Extended Premium Additional
Desktop Support Service Cost Model: Support Basic Support Support Support Lab Support Machines
Annual Charge Per User/Workstation: $244.00 $497.00 $682.00 $948.00 $920.00 $252.00
Monthly Installment of annual charge: $20.33 $41.42 $56.83 $79.00 $76.67 $21.00
Support Service Includes the Following:
Secure and reliable computing environment √ √ √ √ √ √
Immediate, remote help desk support/assistance √ √ √ √ √ √
User home directory (5GB per user) √ √ √ √
Departmental share (Tiered Storage Rate) √ √ √ √
Productivity Software (Windows OS, Office, Adobe
Pro) √ √ √ √ √ √
Application Packaging and Delivery √ √ √ √ √ √
Desktop patching √ √ √ √ √ √
Email support √ √ √ √ √ √
End-user training √ √ √ √ √ √
Tier 2 Remote Application and Desktop Support √ √ √ √ √
Network connectivity support √ √ √ √ √
Network printer/copier/scanner support √ √ √ √ √
On-site desktop support √ √ √
Hardware warranty repairs √ √ √
Loaner workstations √ √ √
Workstation Allowance of $800 (4 year refresh cycle) √ √
End-user after hours support (6 pm to 10 pm) √ √
Guaranteed 60-minute on-site support √ √
Direct access to support staff √ √
4-hour downtime guarantee (for hardware problems) √ √
Lab Application Packaging √
35. Mixing Application on a Single Device
Causes Security Challenges
How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General
Manager, Endpoint Security, McAfee, Inc., 2010
36. Sensitive Data – Compliance & Regulation
• As regulation grows – so does compliance
workload
– SOX/FISMA, FERPA/ HEOA, NC Id Theft, HIPAA, PCI,
GLB
– Open Records Laws (Public institutions)
• Public sensitivity and potential for reputational
harm
• Fines and penalties - growing
• Personal use & privacy
– Combined use devices (personal and work)
– Records access and retention
37. How We Currently Secure
• Anti-malware • Firewalls
– Email and computers – Limited on Campus
– separate solutions perimeter
– Cloud solutions for – Stronger control on
email server environment
– Centrally managed • Server hardening
• Manual analysis with • Intrusion detection
scripts systems
– Network & server – Network
logs – Endpoint and
– Phishing server Host IPS
– Malware
38. Future protection directions
• End points become the new • More automation and
perimeter consolidation of protection
– Web browsers anywhere… – Intrusion Prevention Systems
– Malware prevention on – Security Incident Event
endpoints (beyond AV…) Monitoring
• Match levels of security to – Log correlation
sensitivity of data – Advanced malware control
• Developing guides and data – Data Leakage Protection
sensitivity framework
• Protect data with encryption
• Authentication
– All sensitive data storage
– Multi-factor (Passwords passé)
• Mobile device storage
– Federated SSO
• Email (Manual or Automated
• More security guidelines and Policy)
awareness training – Communications
– Recognize services will be • SSL and VPN
used
– Focus on keeping data safe
through educated use
39. Top Areas of Effort in IT Security
• Compliance with PCI DSS v2.0
• Data Sensitivity Framework
• Mobile Device Security Guidelines
• Guidelines for cloud services (Dropbox, etc)
• Red Lambda - DMCA monitoring
• Research data security & compliance with
grants and federal requirements
• Students use of technology - must keep up
40. Risk Based Strategy for Effort
Decision on Effort to Particular Solution
5
Probability of Occurrence
4
3
2
1
0
Low Impact High Impact
Impact to Reputation
41. Data Classification Statement Matrix
Level Risk Regulation Financial Reputation Business Other
High Two of Violation Significant Serious Serious
Red-Hot Two of Multiple Significant Serious Serious Litigation
Moderate One of Violation Some Some Adverse
Normal No Access
major control
Not None
sensitive
42. Mobile and Personal Devices:
A key support concept…
how to access services, not how to use
the device.
43. Level of Criticality in Managing Consumer Devices
In a McAfee survey of
233 IT decision-makers,
45 percent of the
respondents said that
managing consumer-
owned devices and
related technologies
within the enterprise
network is “critical.”
How Can You Prepare for the Consumerization
of IT? by Candace Worley, Senior Vice President
and General Manager, Endpoint Security, McAfee,
Inc., 2010
44. Security for Personal Mobile Devices
• Multiple new operating systems – Android, iOS,
Windows mobile, etc.
• Software and hardware technology changing rapidly
• Thousands of commercial apps – limited certification of
distributed apps
• Sensitive data stored on mobile devices should be multi-
level encrypted
• Institution may need to “wipe” device when employee
leaves
• Access control – passwords (minimum) & multi factor
45. Is There Safety in the Cloud?
• High degree of trust • Regulations still apply to
needed since control the cloud systems
delegated, consider – Handle most with
long-term viability contract:
• Access, location, indemnity,
• Cloud services can be breach response, etc
more secure than
• Encrypt all sensitive data
current offerings
using multiple levels
• Integrate with
• Ensure authorization and
institutions Identity
tools to investigate
Management
breaches
http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterly
MagazineVolum/IsThereSafetyintheCloud/206543
46. Key Business Decisions…
• Can employees use personally-owned
devices for their work?
– Home computers?
– Tablets?
– Do we have a choice?
• If so, what are your requirements of them?
– Security standards
– Data retention requirements
– Data compliance requirements
47. Who is responsible?
University responsibility Client responsibility
• Establish device standards • Ensure that device is
(browsers, mobile functional—can it connect
platform/OS, etc.) receiving to services off-campus?
full support and
communicate to clients.
• What data is on the
device and is it secure?
• Provide configuration
information for key • Report loss/theft of the
University-provided services device quickly.
(email, calendar, etc.)
• Support connections to key
services
48. Moving forward…
• Mobile, multiple and personal devices are
here to stay.
• New services should be designed with
personal & mobile devices in mind.
• Move to functional requirements and support
• In the workplace, don’t confuse workplace
behavior with technology.
– Establish requirements on a functional level
– Security, support and access will be more
distributed and less “controlled”
49. "It is not necessary to change.
Survival is not mandatory."
~W. Edwards Deming~