SlideShare a Scribd company logo
1 of 49
Download to read offline
University Campus: A Microcosm of
the Future
          Triangle InfoSeCon
           October 20, 2011

              Marc Hoit, PhD
           Vice Chancellor for IT
            NC State University
Projected Mobile Internet Use in 2015




Source: http://www.business2community.com/mobile-apps/video-
infographic-mobile-trends-dominate-the-internet-in-2015-048554
Source: http://gist.com/
Source: http://gist.com/
Source: http://gist.com/
Source: http://gigaom.com/2010/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/
A microcosm of the future
• Students – aggressive early adopters of
  cloud based solutions, mobile technology
  and all things new
• Administrative Staff –more predictable
  demand, reliable secure access and nimble
  support for radical changes in business
  requirements
• Faculty – independent, entrepreneurial with
  unique requirements and a focus on
  research, teaching and service
EDUCAUSE: Top-Ten IT Issues, 2011
1. Funding IT
2. Administrative/ERP/Information Systems
3. Teaching and Learning with Technology
4. Security
5. Mobile Technologies
6. Agility/Adaptability/Responsiveness
7. Governance, Portfolio/Project Management
8. Infrastructure/Cyberinfrastructure
9. Disaster Recovery / Business Continuity
10.Strategic Planning
NC State is a Small City
• 34,000 Student, 8,000 Faculty & Staff
   – 11 Colleges – each with departments
   – 57 centers & institutes
• $1.2 B annual expenditure budget
• Business focus: Education (training) & Research
   – Research: $361M annual expenditures
• 2,120 acres in size
   –   348 Buildings > 1000 sq ft
   –   14.2 million gross square feet
   –   1.2 million rentable square feet on Centennial Campus
   –   18.7 miles of paved roads
   –   72 residence halls housing 8,454
2010 Horizon Report - Trends
• The abundance of resources and relationships
  made easily accessible via the Internet is
  challenging our roles as educators in sense-
  making, coaching, and credentialing.
• People expect to be able to work, learn, and study
  whenever and wherever they want to.
• The technologies we use are increasingly cloud-
  based, and IT support are decentralized.
• The work of students is increasingly seen as
  collaborative resulting in more collaboration
  between departments
     http://www.nmc.org/pdf/2010-Horizon-Report.pdf
More Students Owned Laptops Than
 Other Devices in 2010




                                   http://chronicle.com/section/Almanac/536

 95% of students own a computer

 4% own only a desktop

© 2011 STUDENT MONITOR LLC
WIRELESS READING DEVICES OWNED
 More than one in
  seven (14%) own a
  wireless reading
                              iPad    8%
  device
 Among this 14%,           Kindle   3%
  nearly six in ten (57%)
  own an iPad while          Nook    2%
  one in five (21%) own
  a Kindle and one in       Galaxy   1%
  seven (14%) own a
  Nook
                            Xoom     1%
                   Sony eReader      1%
                   None of these           86%

© 2011 STUDENT MONITOR LLC
Internet Capable Handheld Devices
ECAR, 2010
Text Messaging is the Communication
Form of Choice for Most Students




http://chronicle.com/section/Almanac/536
NC State Residence Hall Survey, 2011

 80.00%
                   69.32%
 70.00%
 60.00%
 50.00%
 40.00%
 30.00%                                     24.60% 23.05% 25.06%
 20.00%
          11.70%
 10.00%                     7.86%                                  8.03%
                                    3.56%
  0.00%
2010 Horizon Report – Technologies to Watch
 • Within next 12 months:
    – Mobile computing
    – Open content
 • Within 2~3 years:
    – Electronic books
    – Simple augmented reality
 • Within 4~5 years:
    – Gesture based computing
    – Visual data analysis


    http://www.nmc.org/pdf/2010-Horizon-Report.pdf
Mobile internet usage
                      U.S. Mobile Internet Time by Category: May 2010
                                        Share of mobile              Share of mobile
                                      Internet Time based        Internet Time based on
                                       on total time at an       average time spent at a
    RANK        Mobile Sector         individual site-level*         category-level**
      1    E-Mail                 38.50%                       41.60%
      2    Social Networking      10.70%                       10.50%
           News & Current
      3
           Events                 7.20%                        4.40%
      4    Search                 6.30%                        7.10%
      5    Portals                4.60%                        11.60%
      6    Entertainment          4.30%                        3.30%
      7    Sports                 4.10%                        2.30%
      8    Music                  4.00%                        3.10%
      9    Videos/Movies**        3.00%                        2.00%
      10   Weather                2.80%                        2.80%
http://blog.nielsen.com/nielsenwire/online_mobile/how-americans-spend-mobile-
Personal Technology in the Workplace…


    It’s here...how to embrace and support it.
Instructional Technology and the Professoriate
or “the world is changing faster than you are”
• Technology causes disruptive change
   – Skype and the telecommunications industry;
     Professors are “Skyping” their students?
• We support enterprise tools, such as LMSs
  or even content capture
• Our challenge isn’t just “keeping up with the
  Jones’” but:
   – Allowing people to explore and us support
     technologies as they emerge, before they even
     get to a standardized/enterprise level.
Instructional Technology Sampler
• Enterprise: Learning Management Systems
  – Moodle, Blackboard, Sakai
  84% of colleges/universities use one [Eduventures.
  (June, 2009). Benchmarking Online Operations.
  Online Higher Educational Learning Collaborative.]
• Content Capture
Vs
• Emerging
  – Sharepoint (as LMS), Google Sites, Tumblr,
    Scoop.It,
University Mobile Initiative Committee
• Representation from central and distributed IT groups
• Acts as a mentor and facilitator for mobile projects on
  campus, including mobile web, mobile application
  development, and text messaging
• Responsible for the Apple Developer License for NC State
   – Released 3 applications into the Apple App Store
       • WolfWalk - A photographic guide to the history of North Carolina State
         University.
       • WolfMatch - A free Match 3 game from NC State Distance Education
       • On Campus - A location-based application exclusive to NC State
         University’s campus.
• Maintain http://m.ncsu.edu mobile website
   – Compatible with any mobile device with a web browser.
• Support the library’s initiatives with http://m.lib.ncsu.edu
Social Media - http://twitter.ncsu.edu
• Aggregates all of NC States (nearly 200) twitter accounts
  into a single feed.
• Collaboration:
   – Outreach Technology provides back-end integration with Twitter
   – University Communications provided user interface and design
• Outreach:
   – Source: https://github.com/jfaustin/Tweet-gater
   – Many universities have implemented the code at their school, giving
     NC State credit
• Training: Effective use Twitter to communicate
   – Slides: http://www.slideshare.net/jfaustin/tweeting-for-nc-state-
     university
Around COE for Students
• Computer Science department
  piloted using Android devices as
  platform to teach JAVA
  programming courses
• My Schedule application
  developed to deliver a student’s
  course schedule tied with map
  data
  – Ties into Engineering Maps data to
    locate course’s building
  – Provides instructor information and
    location from directory services
College of Engineering: iPad Study
                    • Five each faculty, staff, undergrads,
                      and graduate students given an
                      iPad for 3 months
                    • Asked to blog about their
                      experiences
                    • Email, web browsing, and social
                      media dominated top uses

• Many staff and faculty use for daily email, web
  browsing, and content consumption
• Most find it is NOT a full computer replacement
• Users will still come to you for support even if it is
  a personal device
College of Engineering: Phone vs. Tablet

• Important to understand the difference in
  utilization between smartphone and tablet
• Nielsen reports that 65% of tablet owners
  use their smartphones exactly the same
  amount before hand with only 13% reporting
  using it less
• 31% of users say they use a tablet over a
  PC/laptop because it is easy to carry take
  with you
What’s drives universities to the cloud?

• Cloud more likely for new services than to
  transition established services
• Individual faculty or students looking for the
  added flexibility and convenience
• Calls for increased IT reliability and access
• Timely access to the latest IT functionality
• Budget pressures
   – Outsourcing cost of development and maintenance of
     application code
My Most Used iPad Apps
• ActiveSync -> native email, calendar
• iAnnotate: PDF reader AND mark-up
• Penultimate: Note taking (written)

• Dropbox: integrated cloud storage for iPad
  (and others)
• FilesConnect: Connect to SMB (MS) network
  storage
• Jump: RDP Client
A growing area for NC State…
• Students and employees expect to access
  campus services from personally owned
  devices.
• Google Apps for Education is our messaging
  platform (faculty, staff & students)
• More use of cloud technology (e.g., Google,
  DropBox, etc.)
• More sensitive data diffusion and
  compliance legislation
• More diversity of devices and software
• Setting service expectations is crucial
Major OIT Projects
• Gmail for Students
   – Next phase to make improvements (general calendars, more use of
     sites, etc)
   – NextGen mail for Faculty & Staff – in transition
• Postini - Spam & Virus for Faculty & Staff
   – eDiscovery Retention: ALL email retained for 10 Years
• Managed Desktop Service
   – Provide desktop support with tiered pricing (partner, basic,
     extended)
• Combined Pricing Initiative
   –   New law requiring unified purchasing for UNC
   –   7 Standard configurations (laptops, desktops) + options
   –   3 vendors (Dell, HP, Lenovo) + Apple
   –   Exception process for special needs (expect to be <)
Major OIT Projects (continued)
• Web hosting
   – On-campus version of Cpanel type service with branded templates
     ($20/month)
• Classroom Capture Project
   – Purchased 50 classroom capture units – mostly installed
• Centralized Storage Project
   – Expand & enhance the centralized data storage & backup services
   – Working on archiving option to meet NSF & DoD requirement
• Identity and Access Management
   – Unified, authoritative, secure, efficient and cost-effective IAM
     environment that meets current and future needs & legal
     requirements
• University Data Mart
   – Developing a data mart, dashboard, and query tools to provide
     easily accessible, decision-support information for NC State
Managed & Desktop Support
4 key changes to improve campus support:
  1. OIT purchased SCCM (PCs) and Casper Suite (Macs)
     •   Unified management tools for campus
     •   Developed by task force and Campus IT Directors (CITD)
  2. Desktop management offering
     • Developed true cost per PC for support (at 4 levels)
     • Existing (administrative) customers will see change:
         – Same service level as past for default (other options available)
         – In 2011, we will be transitioning to a new desktop configuration with additional
           file space and Windows 7.
     • New customers welcomed
  3. IT Support personnel in-sourcing option (from OIT)
  4. Combined Pricing Initiative (CPI)
     •   Marketplace and standard PC’s – across UNC
OIT Managed Desktop Cost Model
                                                                              Support Service Levels - Year 1 (FY '10-'11)
                                                               Partnered                    Extended       Premium                         Additional
    Desktop Support Service Cost Model:                         Support    Basic Support     Support       Support           Lab Support   Machines
Annual Charge Per User/Workstation:                             $244.00       $497.00        $682.00        $948.00            $920.00      $252.00
Monthly Installment of annual charge:                           $20.33        $41.42         $56.83          $79.00            $76.67       $21.00
Support Service Includes the Following:
Secure and reliable computing environment                         √             √               √              √                 √             √
Immediate, remote help desk support/assistance                    √             √               √              √                 √             √
User home directory (5GB per user)                                √             √               √              √
Departmental share (Tiered Storage Rate)                          √             √               √              √
Productivity Software (Windows OS, Office, Adobe
Pro)                                                              √             √               √              √                 √             √
Application Packaging and Delivery                                √             √               √              √                 √             √
Desktop patching                                                  √             √               √              √                 √             √
Email support                                                     √             √               √              √                 √             √
End-user training                                                 √             √               √              √                 √             √
Tier 2 Remote Application and Desktop Support                                   √               √              √                 √             √
Network connectivity support                                                    √               √              √                 √             √
Network printer/copier/scanner support                                          √               √              √                 √             √
On-site desktop support                                                                         √              √                 √
Hardware warranty repairs                                                                       √              √                 √
Loaner workstations                                                                             √              √                 √

Workstation Allowance of $800 (4 year refresh cycle)                                                           √                 √
End-user after hours support (6 pm to 10 pm)                                                                   √                 √
Guaranteed 60-minute on-site support                                                                           √                 √
Direct access to support staff                                                                                 √                 √

4-hour downtime guarantee (for hardware problems)                                                              √                 √
Lab Application Packaging                                                                                                        √
Mixing Application on a Single Device
     Causes Security Challenges




How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General
Manager, Endpoint Security, McAfee, Inc., 2010
Sensitive Data – Compliance & Regulation
• As regulation grows – so does compliance
  workload
   – SOX/FISMA, FERPA/ HEOA, NC Id Theft, HIPAA, PCI,
     GLB
   – Open Records Laws (Public institutions)
• Public sensitivity and potential for reputational
  harm
• Fines and penalties - growing
• Personal use & privacy
   – Combined use devices (personal and work)
   – Records access and retention
How We Currently Secure
• Anti-malware             • Firewalls
  – Email and computers      – Limited on Campus
    – separate solutions       perimeter
  – Cloud solutions for      – Stronger control on
    email                      server environment
  – Centrally managed      • Server hardening
• Manual analysis with     • Intrusion detection
  scripts                    systems
  – Network & server         – Network
    logs                     – Endpoint and
  – Phishing                   server Host IPS
  – Malware
Future protection directions
•   End points become the new           •   More automation and
    perimeter                               consolidation of protection
     – Web browsers anywhere…                – Intrusion Prevention Systems
     – Malware prevention on                 – Security Incident Event
        endpoints (beyond AV…)                 Monitoring
•   Match levels of security to              – Log correlation
    sensitivity of data                      – Advanced malware control
    •   Developing guides and data           – Data Leakage Protection
        sensitivity framework
                                        •   Protect data with encryption
•   Authentication
                                             – All sensitive data storage
     – Multi-factor (Passwords passé)
                                                 • Mobile device storage
     – Federated SSO
                                                 • Email (Manual or Automated
•   More security guidelines and                   Policy)
    awareness training                       – Communications
     – Recognize services will be               • SSL and VPN
       used
     – Focus on keeping data safe
       through educated use
Top Areas of Effort in IT Security

• Compliance with PCI DSS v2.0
• Data Sensitivity Framework
• Mobile Device Security Guidelines
• Guidelines for cloud services (Dropbox, etc)
• Red Lambda - DMCA monitoring
• Research data security & compliance with
  grants and federal requirements
• Students use of technology - must keep up
Risk Based Strategy for Effort


                                 Decision on Effort to Particular Solution
                             5
 Probability of Occurrence




                             4
                             3
                             2
                             1
                             0
                                 Low Impact                            High Impact
                                                Impact to Reputation
Data Classification Statement Matrix
Level       Risk     Regulation Financial      Reputation   Business Other
High        Two of   Violation   Significant   Serious      Serious
Red-Hot     Two of   Multiple    Significant   Serious      Serious   Litigation
Moderate    One of   Violation   Some                       Some      Adverse
Normal      No                                                        Access
            major                                                     control
Not         None
sensitive
Mobile and Personal Devices:
 A key support concept…

   how to access services, not how to use
                the device.
Level of Criticality in Managing Consumer Devices
                               In a McAfee survey of
                               233 IT decision-makers,
                               45 percent of the
                               respondents said that
                               managing consumer-
                               owned devices and
                               related technologies
                               within the enterprise
                               network is “critical.”

                               How Can You Prepare for the Consumerization
                               of IT? by Candace Worley, Senior Vice President
                               and General Manager, Endpoint Security, McAfee,
                               Inc., 2010
Security for Personal Mobile Devices
• Multiple new operating systems – Android, iOS,
  Windows mobile, etc.
• Software and hardware technology changing rapidly
• Thousands of commercial apps – limited certification of
  distributed apps
• Sensitive data stored on mobile devices should be multi-
  level encrypted
• Institution may need to “wipe” device when employee
  leaves
• Access control – passwords (minimum) & multi factor
Is There Safety in the Cloud?
• High degree of trust             • Regulations still apply to
  needed since control               the cloud systems
  delegated, consider                   – Handle most with
  long-term viability                     contract:
                                            • Access, location, indemnity,
• Cloud services can be                       breach response, etc
  more secure than
                                   • Encrypt all sensitive data
  current offerings
                                     using multiple levels
• Integrate with
                                   • Ensure authorization and
  institutions Identity
                                     tools to investigate
  Management
                                     breaches
      http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterly
      MagazineVolum/IsThereSafetyintheCloud/206543
Key Business Decisions…
• Can employees use personally-owned
  devices for their work?
  – Home computers?
  – Tablets?
  – Do we have a choice?
• If so, what are your requirements of them?
  – Security standards
  – Data retention requirements
  – Data compliance requirements
Who is responsible?
University responsibility        Client responsibility
• Establish device standards     • Ensure that device is
  (browsers, mobile                functional—can it connect
  platform/OS, etc.) receiving     to services off-campus?
  full support and
  communicate to clients.
                                 • What data is on the
                                   device and is it secure?
• Provide configuration
  information for key            • Report loss/theft of the
  University-provided services     device quickly.
  (email, calendar, etc.)
• Support connections to key
  services
Moving forward…
• Mobile, multiple and personal devices are
  here to stay.
• New services should be designed with
  personal & mobile devices in mind.
• Move to functional requirements and support
• In the workplace, don’t confuse workplace
  behavior with technology.
  – Establish requirements on a functional level
  – Security, support and access will be more
    distributed and less “controlled”
"It is not necessary to change.
  Survival is not mandatory."

     ~W. Edwards Deming~

More Related Content

What's hot

NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueMichael Barbour
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...theijes
 
English project
English projectEnglish project
English projectDDHIMS
 
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Dr. Mokter Hossain
 
Marketing the Mobile Part of Your Library
Marketing the Mobile Part of Your LibraryMarketing the Mobile Part of Your Library
Marketing the Mobile Part of Your LibraryBohyun Kim
 
USE OF MOBILE TECHNOLOGY IN LIBRARY AND INFORMATION SERVICES
USE OF MOBILE TECHNOLOGY IN LIBRARY  AND INFORMATION SERVICESUSE OF MOBILE TECHNOLOGY IN LIBRARY  AND INFORMATION SERVICES
USE OF MOBILE TECHNOLOGY IN LIBRARY AND INFORMATION SERVICESAmerican Research Thoughts
 
Teaching with Technology: Social Media Tools and Mobile Apps for Secondary S...
Teaching with Technology:  Social Media Tools and Mobile Apps for Secondary S...Teaching with Technology:  Social Media Tools and Mobile Apps for Secondary S...
Teaching with Technology: Social Media Tools and Mobile Apps for Secondary S...Cheryl Peltier-Davis
 
Going Mobile an Opportunity and Challenge for Higher Education
Going Mobile  an Opportunity and Challenge for Higher EducationGoing Mobile  an Opportunity and Challenge for Higher Education
Going Mobile an Opportunity and Challenge for Higher EducationLori Nidoh
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveSecurly
 
Matias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-CMatias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-CAudiMatias
 
Banning or Embracing of Mobile Technology
Banning or Embracing of Mobile TechnologyBanning or Embracing of Mobile Technology
Banning or Embracing of Mobile Technologyspaul6414
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schoolsvlferrari
 
Web 2.0 and Education
Web 2.0 and EducationWeb 2.0 and Education
Web 2.0 and EducationJulie Evans
 

What's hot (20)

Mobile technologies in libraries
Mobile technologies in librariesMobile technologies in libraries
Mobile technologies in libraries
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Cwpa mobile-091712x2
Cwpa mobile-091712x2Cwpa mobile-091712x2
Cwpa mobile-091712x2
 
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
 
English project
English projectEnglish project
English project
 
Singapore iatul keynote
Singapore iatul keynoteSingapore iatul keynote
Singapore iatul keynote
 
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
 
Marketing the Mobile Part of Your Library
Marketing the Mobile Part of Your LibraryMarketing the Mobile Part of Your Library
Marketing the Mobile Part of Your Library
 
USE OF MOBILE TECHNOLOGY IN LIBRARY AND INFORMATION SERVICES
USE OF MOBILE TECHNOLOGY IN LIBRARY  AND INFORMATION SERVICESUSE OF MOBILE TECHNOLOGY IN LIBRARY  AND INFORMATION SERVICES
USE OF MOBILE TECHNOLOGY IN LIBRARY AND INFORMATION SERVICES
 
gmac2011
gmac2011gmac2011
gmac2011
 
WORST ACADEMIC WRITING
WORST ACADEMIC WRITING WORST ACADEMIC WRITING
WORST ACADEMIC WRITING
 
Literature review
Literature reviewLiterature review
Literature review
 
Teaching with Technology: Social Media Tools and Mobile Apps for Secondary S...
Teaching with Technology:  Social Media Tools and Mobile Apps for Secondary S...Teaching with Technology:  Social Media Tools and Mobile Apps for Secondary S...
Teaching with Technology: Social Media Tools and Mobile Apps for Secondary S...
 
Going Mobile an Opportunity and Challenge for Higher Education
Going Mobile  an Opportunity and Challenge for Higher EducationGoing Mobile  an Opportunity and Challenge for Higher Education
Going Mobile an Opportunity and Challenge for Higher Education
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
Matias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-CMatias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-C
 
Banning or Embracing of Mobile Technology
Banning or Embracing of Mobile TechnologyBanning or Embracing of Mobile Technology
Banning or Embracing of Mobile Technology
 
Acceptable Internet Use In Schools
Acceptable Internet Use In SchoolsAcceptable Internet Use In Schools
Acceptable Internet Use In Schools
 
Web 2.0 and Education
Web 2.0 and EducationWeb 2.0 and Education
Web 2.0 and Education
 

Viewers also liked

Lenny zeltser social engineering attacks
Lenny zeltser   social engineering attacksLenny zeltser   social engineering attacks
Lenny zeltser social engineering attacksTravis Barnes
 
EYOilGas_Unlocking the potential_FINAL_June2013
EYOilGas_Unlocking the potential_FINAL_June2013EYOilGas_Unlocking the potential_FINAL_June2013
EYOilGas_Unlocking the potential_FINAL_June2013Seelan Naicker
 
Inste.es Beta v1.3 UX / UI Design
Inste.es Beta v1.3 UX / UI DesignInste.es Beta v1.3 UX / UI Design
Inste.es Beta v1.3 UX / UI Designedwell_
 
Janet M. Russeau's Presentation for EDIM 510
Janet M. Russeau's Presentation for EDIM 510Janet M. Russeau's Presentation for EDIM 510
Janet M. Russeau's Presentation for EDIM 510jmrusseau
 

Viewers also liked (8)

Lenny zeltser social engineering attacks
Lenny zeltser   social engineering attacksLenny zeltser   social engineering attacks
Lenny zeltser social engineering attacks
 
Itbi
ItbiItbi
Itbi
 
EYOilGas_Unlocking the potential_FINAL_June2013
EYOilGas_Unlocking the potential_FINAL_June2013EYOilGas_Unlocking the potential_FINAL_June2013
EYOilGas_Unlocking the potential_FINAL_June2013
 
Inste.es Beta v1.3 UX / UI Design
Inste.es Beta v1.3 UX / UI DesignInste.es Beta v1.3 UX / UI Design
Inste.es Beta v1.3 UX / UI Design
 
Janet M. Russeau's Presentation for EDIM 510
Janet M. Russeau's Presentation for EDIM 510Janet M. Russeau's Presentation for EDIM 510
Janet M. Russeau's Presentation for EDIM 510
 
Anggota kelompok
Anggota kelompokAnggota kelompok
Anggota kelompok
 
Fail panitia
Fail panitiaFail panitia
Fail panitia
 
Women’s art
Women’s artWomen’s art
Women’s art
 

Similar to Marc hoit University Campus - Microcosm of the future

AMcNab_Mobilising E-Content_AGI/LIR
AMcNab_Mobilising E-Content_AGI/LIRAMcNab_Mobilising E-Content_AGI/LIR
AMcNab_Mobilising E-Content_AGI/LIRAlison McNab
 
Mobile Technologies and Services for Nigerian Libraries
Mobile Technologies and Services for Nigerian LibrariesMobile Technologies and Services for Nigerian Libraries
Mobile Technologies and Services for Nigerian LibrariesDavid Nzoputa Ofili
 
Everybody’s surfin’ now: Teaching and learning with mobile technology
Everybody’s surfin’ now: Teaching and learning with mobile technology Everybody’s surfin’ now: Teaching and learning with mobile technology
Everybody’s surfin’ now: Teaching and learning with mobile technology robincanuel
 
Mobile users meet the mobile library
Mobile users meet the mobile libraryMobile users meet the mobile library
Mobile users meet the mobile libraryBen Rawlins
 
We have broadband mickey slimp-2012
We have broadband   mickey slimp-2012We have broadband   mickey slimp-2012
We have broadband mickey slimp-2012AATYC
 
A Mobile Web Framework for the UC System
A Mobile Web Framework for the UC SystemA Mobile Web Framework for the UC System
A Mobile Web Framework for the UC SystemBrett Pollak
 
Mobilising e-resources for academics and students
Mobilising e-resources for academics and studentsMobilising e-resources for academics and students
Mobilising e-resources for academics and studentsAlison McNab
 
Mobile Technology and the Academic Library
Mobile Technology and the Academic LibraryMobile Technology and the Academic Library
Mobile Technology and the Academic LibraryKatie Seeler Hoskins
 
Beyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & ServicesBeyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & ServicesDave Olsen
 
Savova Canuel & Crichton - Mobile technology and information literacy instruc...
Savova Canuel & Crichton - Mobile technology and information literacy instruc...Savova Canuel & Crichton - Mobile technology and information literacy instruc...
Savova Canuel & Crichton - Mobile technology and information literacy instruc...IL Group (CILIP Information Literacy Group)
 
Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom robincanuel
 
Pilot implementation of campusM
Pilot implementation of campusMPilot implementation of campusM
Pilot implementation of campusMdavid_clark
 
ELearning trends 2015: #2 Mobile learning
ELearning trends 2015: #2 Mobile learningELearning trends 2015: #2 Mobile learning
ELearning trends 2015: #2 Mobile learningNine Lanterns
 
How Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsHow Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsEDR
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)Cathy Oxley
 
Trends in K-12 Educational Technology
Trends in K-12 Educational TechnologyTrends in K-12 Educational Technology
Trends in K-12 Educational TechnologyE Robertson
 
Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Marieke Guy
 

Similar to Marc hoit University Campus - Microcosm of the future (20)

AMcNab_Mobilising E-Content_AGI/LIR
AMcNab_Mobilising E-Content_AGI/LIRAMcNab_Mobilising E-Content_AGI/LIR
AMcNab_Mobilising E-Content_AGI/LIR
 
Mobile Technologies and Services for Nigerian Libraries
Mobile Technologies and Services for Nigerian LibrariesMobile Technologies and Services for Nigerian Libraries
Mobile Technologies and Services for Nigerian Libraries
 
Everybody’s surfin’ now: Teaching and learning with mobile technology
Everybody’s surfin’ now: Teaching and learning with mobile technology Everybody’s surfin’ now: Teaching and learning with mobile technology
Everybody’s surfin’ now: Teaching and learning with mobile technology
 
Mobile users meet the mobile library
Mobile users meet the mobile libraryMobile users meet the mobile library
Mobile users meet the mobile library
 
We have broadband mickey slimp-2012
We have broadband   mickey slimp-2012We have broadband   mickey slimp-2012
We have broadband mickey slimp-2012
 
A Mobile Web Framework for the UC System
A Mobile Web Framework for the UC SystemA Mobile Web Framework for the UC System
A Mobile Web Framework for the UC System
 
Mobilising e-resources for academics and students
Mobilising e-resources for academics and studentsMobilising e-resources for academics and students
Mobilising e-resources for academics and students
 
Mobile Technology and the Academic Library
Mobile Technology and the Academic LibraryMobile Technology and the Academic Library
Mobile Technology and the Academic Library
 
Beyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & ServicesBeyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & Services
 
Savova Canuel & Crichton - Mobile technology and information literacy instruc...
Savova Canuel & Crichton - Mobile technology and information literacy instruc...Savova Canuel & Crichton - Mobile technology and information literacy instruc...
Savova Canuel & Crichton - Mobile technology and information literacy instruc...
 
Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom Mobile Technology and Learning: Information Literacy Beyond the Classroom
Mobile Technology and Learning: Information Literacy Beyond the Classroom
 
Mobile Web Development with MWF
Mobile Web Development with MWFMobile Web Development with MWF
Mobile Web Development with MWF
 
Pilot implementation of campusM
Pilot implementation of campusMPilot implementation of campusM
Pilot implementation of campusM
 
ELearning trends 2015: #2 Mobile learning
ELearning trends 2015: #2 Mobile learningELearning trends 2015: #2 Mobile learning
ELearning trends 2015: #2 Mobile learning
 
How Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsHow Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property Assessments
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)
 
Trends in K-12 Educational Technology
Trends in K-12 Educational TechnologyTrends in K-12 Educational Technology
Trends in K-12 Educational Technology
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
The Impact of Smart Phone Technology on Adult Learning
The Impact of Smart Phone Technology on Adult LearningThe Impact of Smart Phone Technology on Adult Learning
The Impact of Smart Phone Technology on Adult Learning
 
Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...Making our students ‘appy – how we successfully rolled out our student mobile...
Making our students ‘appy – how we successfully rolled out our student mobile...
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Marc hoit University Campus - Microcosm of the future

  • 1. University Campus: A Microcosm of the Future Triangle InfoSeCon October 20, 2011 Marc Hoit, PhD Vice Chancellor for IT NC State University
  • 2. Projected Mobile Internet Use in 2015 Source: http://www.business2community.com/mobile-apps/video- infographic-mobile-trends-dominate-the-internet-in-2015-048554
  • 7.
  • 8.
  • 9. A microcosm of the future • Students – aggressive early adopters of cloud based solutions, mobile technology and all things new • Administrative Staff –more predictable demand, reliable secure access and nimble support for radical changes in business requirements • Faculty – independent, entrepreneurial with unique requirements and a focus on research, teaching and service
  • 10. EDUCAUSE: Top-Ten IT Issues, 2011 1. Funding IT 2. Administrative/ERP/Information Systems 3. Teaching and Learning with Technology 4. Security 5. Mobile Technologies 6. Agility/Adaptability/Responsiveness 7. Governance, Portfolio/Project Management 8. Infrastructure/Cyberinfrastructure 9. Disaster Recovery / Business Continuity 10.Strategic Planning
  • 11. NC State is a Small City • 34,000 Student, 8,000 Faculty & Staff – 11 Colleges – each with departments – 57 centers & institutes • $1.2 B annual expenditure budget • Business focus: Education (training) & Research – Research: $361M annual expenditures • 2,120 acres in size – 348 Buildings > 1000 sq ft – 14.2 million gross square feet – 1.2 million rentable square feet on Centennial Campus – 18.7 miles of paved roads – 72 residence halls housing 8,454
  • 12. 2010 Horizon Report - Trends • The abundance of resources and relationships made easily accessible via the Internet is challenging our roles as educators in sense- making, coaching, and credentialing. • People expect to be able to work, learn, and study whenever and wherever they want to. • The technologies we use are increasingly cloud- based, and IT support are decentralized. • The work of students is increasingly seen as collaborative resulting in more collaboration between departments http://www.nmc.org/pdf/2010-Horizon-Report.pdf
  • 13. More Students Owned Laptops Than Other Devices in 2010 http://chronicle.com/section/Almanac/536  95% of students own a computer  4% own only a desktop © 2011 STUDENT MONITOR LLC
  • 14. WIRELESS READING DEVICES OWNED  More than one in seven (14%) own a wireless reading iPad 8% device  Among this 14%, Kindle 3% nearly six in ten (57%) own an iPad while Nook 2% one in five (21%) own a Kindle and one in Galaxy 1% seven (14%) own a Nook Xoom 1% Sony eReader 1% None of these 86% © 2011 STUDENT MONITOR LLC
  • 15. Internet Capable Handheld Devices ECAR, 2010
  • 16. Text Messaging is the Communication Form of Choice for Most Students http://chronicle.com/section/Almanac/536
  • 17. NC State Residence Hall Survey, 2011 80.00% 69.32% 70.00% 60.00% 50.00% 40.00% 30.00% 24.60% 23.05% 25.06% 20.00% 11.70% 10.00% 7.86% 8.03% 3.56% 0.00%
  • 18. 2010 Horizon Report – Technologies to Watch • Within next 12 months: – Mobile computing – Open content • Within 2~3 years: – Electronic books – Simple augmented reality • Within 4~5 years: – Gesture based computing – Visual data analysis http://www.nmc.org/pdf/2010-Horizon-Report.pdf
  • 19. Mobile internet usage U.S. Mobile Internet Time by Category: May 2010 Share of mobile Share of mobile Internet Time based Internet Time based on on total time at an average time spent at a RANK Mobile Sector individual site-level* category-level** 1 E-Mail 38.50% 41.60% 2 Social Networking 10.70% 10.50% News & Current 3 Events 7.20% 4.40% 4 Search 6.30% 7.10% 5 Portals 4.60% 11.60% 6 Entertainment 4.30% 3.30% 7 Sports 4.10% 2.30% 8 Music 4.00% 3.10% 9 Videos/Movies** 3.00% 2.00% 10 Weather 2.80% 2.80% http://blog.nielsen.com/nielsenwire/online_mobile/how-americans-spend-mobile-
  • 20. Personal Technology in the Workplace… It’s here...how to embrace and support it.
  • 21. Instructional Technology and the Professoriate or “the world is changing faster than you are” • Technology causes disruptive change – Skype and the telecommunications industry; Professors are “Skyping” their students? • We support enterprise tools, such as LMSs or even content capture • Our challenge isn’t just “keeping up with the Jones’” but: – Allowing people to explore and us support technologies as they emerge, before they even get to a standardized/enterprise level.
  • 22. Instructional Technology Sampler • Enterprise: Learning Management Systems – Moodle, Blackboard, Sakai 84% of colleges/universities use one [Eduventures. (June, 2009). Benchmarking Online Operations. Online Higher Educational Learning Collaborative.] • Content Capture Vs • Emerging – Sharepoint (as LMS), Google Sites, Tumblr, Scoop.It,
  • 23. University Mobile Initiative Committee • Representation from central and distributed IT groups • Acts as a mentor and facilitator for mobile projects on campus, including mobile web, mobile application development, and text messaging • Responsible for the Apple Developer License for NC State – Released 3 applications into the Apple App Store • WolfWalk - A photographic guide to the history of North Carolina State University. • WolfMatch - A free Match 3 game from NC State Distance Education • On Campus - A location-based application exclusive to NC State University’s campus. • Maintain http://m.ncsu.edu mobile website – Compatible with any mobile device with a web browser. • Support the library’s initiatives with http://m.lib.ncsu.edu
  • 24. Social Media - http://twitter.ncsu.edu • Aggregates all of NC States (nearly 200) twitter accounts into a single feed. • Collaboration: – Outreach Technology provides back-end integration with Twitter – University Communications provided user interface and design • Outreach: – Source: https://github.com/jfaustin/Tweet-gater – Many universities have implemented the code at their school, giving NC State credit • Training: Effective use Twitter to communicate – Slides: http://www.slideshare.net/jfaustin/tweeting-for-nc-state- university
  • 25. Around COE for Students • Computer Science department piloted using Android devices as platform to teach JAVA programming courses • My Schedule application developed to deliver a student’s course schedule tied with map data – Ties into Engineering Maps data to locate course’s building – Provides instructor information and location from directory services
  • 26. College of Engineering: iPad Study • Five each faculty, staff, undergrads, and graduate students given an iPad for 3 months • Asked to blog about their experiences • Email, web browsing, and social media dominated top uses • Many staff and faculty use for daily email, web browsing, and content consumption • Most find it is NOT a full computer replacement • Users will still come to you for support even if it is a personal device
  • 27. College of Engineering: Phone vs. Tablet • Important to understand the difference in utilization between smartphone and tablet • Nielsen reports that 65% of tablet owners use their smartphones exactly the same amount before hand with only 13% reporting using it less • 31% of users say they use a tablet over a PC/laptop because it is easy to carry take with you
  • 28. What’s drives universities to the cloud? • Cloud more likely for new services than to transition established services • Individual faculty or students looking for the added flexibility and convenience • Calls for increased IT reliability and access • Timely access to the latest IT functionality • Budget pressures – Outsourcing cost of development and maintenance of application code
  • 29. My Most Used iPad Apps • ActiveSync -> native email, calendar • iAnnotate: PDF reader AND mark-up • Penultimate: Note taking (written) • Dropbox: integrated cloud storage for iPad (and others) • FilesConnect: Connect to SMB (MS) network storage • Jump: RDP Client
  • 30. A growing area for NC State… • Students and employees expect to access campus services from personally owned devices. • Google Apps for Education is our messaging platform (faculty, staff & students) • More use of cloud technology (e.g., Google, DropBox, etc.) • More sensitive data diffusion and compliance legislation • More diversity of devices and software • Setting service expectations is crucial
  • 31. Major OIT Projects • Gmail for Students – Next phase to make improvements (general calendars, more use of sites, etc) – NextGen mail for Faculty & Staff – in transition • Postini - Spam & Virus for Faculty & Staff – eDiscovery Retention: ALL email retained for 10 Years • Managed Desktop Service – Provide desktop support with tiered pricing (partner, basic, extended) • Combined Pricing Initiative – New law requiring unified purchasing for UNC – 7 Standard configurations (laptops, desktops) + options – 3 vendors (Dell, HP, Lenovo) + Apple – Exception process for special needs (expect to be <)
  • 32. Major OIT Projects (continued) • Web hosting – On-campus version of Cpanel type service with branded templates ($20/month) • Classroom Capture Project – Purchased 50 classroom capture units – mostly installed • Centralized Storage Project – Expand & enhance the centralized data storage & backup services – Working on archiving option to meet NSF & DoD requirement • Identity and Access Management – Unified, authoritative, secure, efficient and cost-effective IAM environment that meets current and future needs & legal requirements • University Data Mart – Developing a data mart, dashboard, and query tools to provide easily accessible, decision-support information for NC State
  • 33. Managed & Desktop Support 4 key changes to improve campus support: 1. OIT purchased SCCM (PCs) and Casper Suite (Macs) • Unified management tools for campus • Developed by task force and Campus IT Directors (CITD) 2. Desktop management offering • Developed true cost per PC for support (at 4 levels) • Existing (administrative) customers will see change: – Same service level as past for default (other options available) – In 2011, we will be transitioning to a new desktop configuration with additional file space and Windows 7. • New customers welcomed 3. IT Support personnel in-sourcing option (from OIT) 4. Combined Pricing Initiative (CPI) • Marketplace and standard PC’s – across UNC
  • 34. OIT Managed Desktop Cost Model Support Service Levels - Year 1 (FY '10-'11) Partnered Extended Premium Additional Desktop Support Service Cost Model: Support Basic Support Support Support Lab Support Machines Annual Charge Per User/Workstation: $244.00 $497.00 $682.00 $948.00 $920.00 $252.00 Monthly Installment of annual charge: $20.33 $41.42 $56.83 $79.00 $76.67 $21.00 Support Service Includes the Following: Secure and reliable computing environment √ √ √ √ √ √ Immediate, remote help desk support/assistance √ √ √ √ √ √ User home directory (5GB per user) √ √ √ √ Departmental share (Tiered Storage Rate) √ √ √ √ Productivity Software (Windows OS, Office, Adobe Pro) √ √ √ √ √ √ Application Packaging and Delivery √ √ √ √ √ √ Desktop patching √ √ √ √ √ √ Email support √ √ √ √ √ √ End-user training √ √ √ √ √ √ Tier 2 Remote Application and Desktop Support √ √ √ √ √ Network connectivity support √ √ √ √ √ Network printer/copier/scanner support √ √ √ √ √ On-site desktop support √ √ √ Hardware warranty repairs √ √ √ Loaner workstations √ √ √ Workstation Allowance of $800 (4 year refresh cycle) √ √ End-user after hours support (6 pm to 10 pm) √ √ Guaranteed 60-minute on-site support √ √ Direct access to support staff √ √ 4-hour downtime guarantee (for hardware problems) √ √ Lab Application Packaging √
  • 35. Mixing Application on a Single Device Causes Security Challenges How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General Manager, Endpoint Security, McAfee, Inc., 2010
  • 36. Sensitive Data – Compliance & Regulation • As regulation grows – so does compliance workload – SOX/FISMA, FERPA/ HEOA, NC Id Theft, HIPAA, PCI, GLB – Open Records Laws (Public institutions) • Public sensitivity and potential for reputational harm • Fines and penalties - growing • Personal use & privacy – Combined use devices (personal and work) – Records access and retention
  • 37. How We Currently Secure • Anti-malware • Firewalls – Email and computers – Limited on Campus – separate solutions perimeter – Cloud solutions for – Stronger control on email server environment – Centrally managed • Server hardening • Manual analysis with • Intrusion detection scripts systems – Network & server – Network logs – Endpoint and – Phishing server Host IPS – Malware
  • 38. Future protection directions • End points become the new • More automation and perimeter consolidation of protection – Web browsers anywhere… – Intrusion Prevention Systems – Malware prevention on – Security Incident Event endpoints (beyond AV…) Monitoring • Match levels of security to – Log correlation sensitivity of data – Advanced malware control • Developing guides and data – Data Leakage Protection sensitivity framework • Protect data with encryption • Authentication – All sensitive data storage – Multi-factor (Passwords passé) • Mobile device storage – Federated SSO • Email (Manual or Automated • More security guidelines and Policy) awareness training – Communications – Recognize services will be • SSL and VPN used – Focus on keeping data safe through educated use
  • 39. Top Areas of Effort in IT Security • Compliance with PCI DSS v2.0 • Data Sensitivity Framework • Mobile Device Security Guidelines • Guidelines for cloud services (Dropbox, etc) • Red Lambda - DMCA monitoring • Research data security & compliance with grants and federal requirements • Students use of technology - must keep up
  • 40. Risk Based Strategy for Effort Decision on Effort to Particular Solution 5 Probability of Occurrence 4 3 2 1 0 Low Impact High Impact Impact to Reputation
  • 41. Data Classification Statement Matrix Level Risk Regulation Financial Reputation Business Other High Two of Violation Significant Serious Serious Red-Hot Two of Multiple Significant Serious Serious Litigation Moderate One of Violation Some Some Adverse Normal No Access major control Not None sensitive
  • 42. Mobile and Personal Devices: A key support concept… how to access services, not how to use the device.
  • 43. Level of Criticality in Managing Consumer Devices In a McAfee survey of 233 IT decision-makers, 45 percent of the respondents said that managing consumer- owned devices and related technologies within the enterprise network is “critical.” How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General Manager, Endpoint Security, McAfee, Inc., 2010
  • 44. Security for Personal Mobile Devices • Multiple new operating systems – Android, iOS, Windows mobile, etc. • Software and hardware technology changing rapidly • Thousands of commercial apps – limited certification of distributed apps • Sensitive data stored on mobile devices should be multi- level encrypted • Institution may need to “wipe” device when employee leaves • Access control – passwords (minimum) & multi factor
  • 45. Is There Safety in the Cloud? • High degree of trust • Regulations still apply to needed since control the cloud systems delegated, consider – Handle most with long-term viability contract: • Access, location, indemnity, • Cloud services can be breach response, etc more secure than • Encrypt all sensitive data current offerings using multiple levels • Integrate with • Ensure authorization and institutions Identity tools to investigate Management breaches http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterly MagazineVolum/IsThereSafetyintheCloud/206543
  • 46. Key Business Decisions… • Can employees use personally-owned devices for their work? – Home computers? – Tablets? – Do we have a choice? • If so, what are your requirements of them? – Security standards – Data retention requirements – Data compliance requirements
  • 47. Who is responsible? University responsibility Client responsibility • Establish device standards • Ensure that device is (browsers, mobile functional—can it connect platform/OS, etc.) receiving to services off-campus? full support and communicate to clients. • What data is on the device and is it secure? • Provide configuration information for key • Report loss/theft of the University-provided services device quickly. (email, calendar, etc.) • Support connections to key services
  • 48. Moving forward… • Mobile, multiple and personal devices are here to stay. • New services should be designed with personal & mobile devices in mind. • Move to functional requirements and support • In the workplace, don’t confuse workplace behavior with technology. – Establish requirements on a functional level – Security, support and access will be more distributed and less “controlled”
  • 49. "It is not necessary to change. Survival is not mandatory." ~W. Edwards Deming~