This document summarizes a presentation about enabling cross-university collaboration through identity and access management (IAM) tools and standards. It discusses Harvard's IAM program and goals of simplifying user experience, enabling research and collaboration, and protecting resources. Key tools and standards discussed include TIER, InCommon federation, Grouper, and HarvardKey. The presentation emphasizes how IAM solutions can help support teaching and research by providing shared identities, attributes, and groups that facilitate collaboration across institutions.
The document discusses Harvard University's approach to online video accessibility. It introduces Digital Video Services and their role in coordinating video standards and policies. It then outlines Harvard's guidelines that encourage captioning for durable online videos intended for public use. It also discusses the selection of 3Play Media as the preferred captioning vendor after evaluating several options. Future plans include selecting a preferred live captioning vendor and adding audio description capabilities. More information is available on Harvard's accessibility website.
This document summarizes presentations from an IT summit on the Teaching and Learning Technologies (TLT) program and academic technology services at Harvard. It provides an overview of TLT activities including running Canvas, engaging with schools, and supporting tool development. It also summarizes presentations on deepening Canvas use through the Division of Continuing Education, extending Canvas functionality using third-party tools via Learning Tools Interoperability, and plans for the next iteration of academic technology services called AcTS 2.0.
Delivering university self service for it and business services v1margaret_ronald
The document discusses delivering a unified self-service portal for Harvard University. It outlines examples of existing portals, the benefits of a unified portal for students and staff, challenges to implementing one, and next steps. The presentation recommends starting work immediately with HUIT and other departments collaborating to expand self-service options and discuss how to create a unified portal that meets user needs.
2016 it summit_accessibility_2016-05-24_standardkevin_donovan
This document introduces an online accessibility website created by Harvard University's Accessibility Team. The website provides resources for content creators, developers, and others to make digital content accessible. It includes best practices, examples, and techniques organized around Web Content Accessibility Guidelines. The website also previews an upcoming accessibility testing tool that will automate and facilitate testing of content and sites to identify and fix accessibility issues.
The document discusses frequently asked questions about digital accessibility. It explains that accessibility benefits all users by improving usability, user experience, and search engine optimization. The Harvard Online Accessibility website provides guidelines and resources to create accessible online content. WCAG 2.0 are web accessibility guidelines that can be applied broadly. Assistive technologies help people with disabilities interact with technology. Content should be tested using both automated and manual methods with assistive technologies. Accessibility must be considered when contracting external vendors and questions can be directed to University Disability Services.
The document discusses identity and access management (IAM) at Harvard University. It describes how the IAM Program aims to simplify user experience, enable research and collaboration, protect university resources, and facilitate technology innovation by managing user identities and access privileges. Specific examples are provided of IAM initiatives at Harvard Medical School to improve user provisioning, Harvard Kennedy School to implement federated authentication, and the Harvard Alumni Association to transition to a more seamless user experience. The overall goals are to provide secure yet easy access to applications and information across Harvard and beyond through centralized identity management.
The document discusses the multi-modal curriculum developed by the Data Wise project at Harvard Graduate School of Education. It aims to provide accessible learning experiences on data-driven decision making through various platforms, including online courses, intensive retreats, and a digital portfolio. The curriculum features foundational training on the Data Wise improvement process, skill-building exercises using interactive data visualization tools, and a highly structured online version of their popular on-campus leadership institute for school teams. The goal is to develop alternative offerings that retain the richness of in-person experiences while improving access to both participant data and digital assets as the project expands.
Information security fasit-cait-20150129_v04kevin_donovan
Christian Hamer, Chief Information Security Officer at Harvard, provided an overview of information security at the university. He discussed the threats facing higher education from advanced attackers seeking valuable data. Harvard faces specific risks due to its high-value research data and reputation. The university's strategy is to make the community aware of risks, better protect the network and data, and improve readiness to respond to threats. Key initiatives include launching an awareness campaign, reviewing security tools and policies, and establishing protocols for incident response. Hamer urged the community to be aware of best practices for classifying and handling data securely, applying updates, using strong passwords, and reporting suspicious activity to enhance the university's security.
The document discusses Harvard University's approach to online video accessibility. It introduces Digital Video Services and their role in coordinating video standards and policies. It then outlines Harvard's guidelines that encourage captioning for durable online videos intended for public use. It also discusses the selection of 3Play Media as the preferred captioning vendor after evaluating several options. Future plans include selecting a preferred live captioning vendor and adding audio description capabilities. More information is available on Harvard's accessibility website.
This document summarizes presentations from an IT summit on the Teaching and Learning Technologies (TLT) program and academic technology services at Harvard. It provides an overview of TLT activities including running Canvas, engaging with schools, and supporting tool development. It also summarizes presentations on deepening Canvas use through the Division of Continuing Education, extending Canvas functionality using third-party tools via Learning Tools Interoperability, and plans for the next iteration of academic technology services called AcTS 2.0.
Delivering university self service for it and business services v1margaret_ronald
The document discusses delivering a unified self-service portal for Harvard University. It outlines examples of existing portals, the benefits of a unified portal for students and staff, challenges to implementing one, and next steps. The presentation recommends starting work immediately with HUIT and other departments collaborating to expand self-service options and discuss how to create a unified portal that meets user needs.
2016 it summit_accessibility_2016-05-24_standardkevin_donovan
This document introduces an online accessibility website created by Harvard University's Accessibility Team. The website provides resources for content creators, developers, and others to make digital content accessible. It includes best practices, examples, and techniques organized around Web Content Accessibility Guidelines. The website also previews an upcoming accessibility testing tool that will automate and facilitate testing of content and sites to identify and fix accessibility issues.
The document discusses frequently asked questions about digital accessibility. It explains that accessibility benefits all users by improving usability, user experience, and search engine optimization. The Harvard Online Accessibility website provides guidelines and resources to create accessible online content. WCAG 2.0 are web accessibility guidelines that can be applied broadly. Assistive technologies help people with disabilities interact with technology. Content should be tested using both automated and manual methods with assistive technologies. Accessibility must be considered when contracting external vendors and questions can be directed to University Disability Services.
The document discusses identity and access management (IAM) at Harvard University. It describes how the IAM Program aims to simplify user experience, enable research and collaboration, protect university resources, and facilitate technology innovation by managing user identities and access privileges. Specific examples are provided of IAM initiatives at Harvard Medical School to improve user provisioning, Harvard Kennedy School to implement federated authentication, and the Harvard Alumni Association to transition to a more seamless user experience. The overall goals are to provide secure yet easy access to applications and information across Harvard and beyond through centralized identity management.
The document discusses the multi-modal curriculum developed by the Data Wise project at Harvard Graduate School of Education. It aims to provide accessible learning experiences on data-driven decision making through various platforms, including online courses, intensive retreats, and a digital portfolio. The curriculum features foundational training on the Data Wise improvement process, skill-building exercises using interactive data visualization tools, and a highly structured online version of their popular on-campus leadership institute for school teams. The goal is to develop alternative offerings that retain the richness of in-person experiences while improving access to both participant data and digital assets as the project expands.
Information security fasit-cait-20150129_v04kevin_donovan
Christian Hamer, Chief Information Security Officer at Harvard, provided an overview of information security at the university. He discussed the threats facing higher education from advanced attackers seeking valuable data. Harvard faces specific risks due to its high-value research data and reputation. The university's strategy is to make the community aware of risks, better protect the network and data, and improve readiness to respond to threats. Key initiatives include launching an awareness campaign, reviewing security tools and policies, and establishing protocols for incident response. Hamer urged the community to be aware of best practices for classifying and handling data securely, applying updates, using strong passwords, and reporting suspicious activity to enhance the university's security.
The document outlines a teaching and learning technologies program at Harvard with the following key points:
1. The program aims to provide a continually evolving set of faculty-friendly and student-focused technologies to support teaching and learning across Harvard schools, facilitate pedagogical innovation, and contribute to educational research.
2. The plan is to provide core teaching and learning technologies to all schools, support pedagogical innovation and research, establish partnerships with faculty and staff, and cultivate an open source community around technology development.
3. A major initiative is migrating courses from existing platforms to Canvas, with projected timelines and numbers of courses outlined. Feedback from faculty and students will be gathered through surveys to inform
The document provides an overview of Harvard's Teaching and Learning Technologies (TLT) program. It discusses the program's strategic objectives to provide core teaching technologies, support pedagogical innovation, establish partnerships, and cultivate an open source community. An update on migrating courses to the new Canvas platform is provided, including pilot results. Case studies demonstrate how Canvas has been used for courses. The developer community is introduced as a way to contribute code and tools.
15.06.05 Using web and social media metrics to measure success and drive digi...kevin_donovan
1) The document discusses using web and social media metrics to measure the success of digital strategies and drive improvements.
2) It provides an overview of the key elements of a web and social media strategy, including defining goals, target audiences, and measurable usability objectives.
3) The document emphasizes analyzing metrics in relation to goals, such as driving targeted traffic, understanding useful content, and persuading visitors to take desired actions, in order to identify ways to inform decision-making and site improvements.
Slt fas fall startup 2014 combined final v2kevin_donovan
This document summarizes Harvard's Fall Startup 2014 plans across various departments. It outlines steps for incoming freshmen onboarding, course planning and registration. It also discusses communications protocols between departments and preparations by Administrative Technologies, Teaching and Learning Technologies and Support Services to ensure systems and applications are ready for the term. Key activities include testing upgrades to video lecture platforms, coordinating with faculty on classroom technologies and preparing support staff for potential issues.
Partner engagement program connect dots jan 2014-finalkevin_donovan
The document summarizes feedback from Phase 1 of HUIT's Customer Engagement Program. Key themes in the feedback included a desire for more technical advising, leadership, and help using technology from HUIT. Participants valued HUIT as a partner and appreciated the engagement process. Challenges with storage capacity were also mentioned. Next steps discussed further reviewing areas of major feedback and developing the agenda for future engagement meetings.
The document outlines goals and a projected outcome for a Business Continuity/Disaster Recovery Work Group at Harvard University. The goals are to develop an overall BC/DR strategy by June 30th that addresses events management, escalation processes, roles and responsibilities, applications and services, and provides architectural guidance. The projected outcome is to complete a current state assessment, develop a future state strategy with identified gaps, and a preliminary multi-year plan and budget by June 30th. The HUIT BC/DR vision is to have established processes, defined roles, and resilient systems that can withstand and recover from minor to major incidents to support continuity of technology services for the University.
This document outlines the vision and objectives of the Cloud & Dev Ops workgroup at Harvard University. The goals are to reduce IT costs, errors, and security risks while improving reliability, agility, and efficiency of service delivery. Key performance indicators will measure changes in ongoing costs and incidents as well as service value, SLAs met, and user satisfaction surveys. The workgroup will assess the current state, requirements, and future state to develop a gap analysis and migration approach with an achievable fiscal year plan.
Salesforce is being used across many departments at Harvard University to manage relationships and data in a centralized platform. The presentation provides an overview of Salesforce and how it is being implemented at both the Graduate School of Education and across the university. It discusses the benefits of consolidation efforts to have a single Salesforce instance for the university. This would allow for greater data sharing and expertise across departments while reducing costs. It also outlines how Salesforce can be enhanced to become more of a "CRM 2.0" platform to better facilitate collaboration and community building between various university constituents.
This document outlines the goals and strategies of an educational technology program at Harvard University. It aims to: 1) Provide core teaching and learning technologies to all Harvard schools; 2) Support pedagogical innovation and research on learning; and 3) Establish partnerships between faculty, staff, and the technology program. The program strives to deliver services on time and on budget while obtaining continuous input from faculty. It also emphasizes cultivating an open source community to develop technologies that support teaching and research.
Oculus: Using Open APIs to Share Harvard’s Digitized Books and Manuscripts kevin_donovan
1) The document discusses the development of Oculus, a new open source digital book viewer being created by Harvard to replace its older Page Delivery Service (PDS) viewer.
2) Oculus is being built according to open standards like the IIIF APIs to allow Harvard's digitized content to be shared more widely and reused by others. It will also allow Harvard researchers to access content from other institutions.
3) By developing Oculus as an open source project with input from various Harvard departments and other universities, it is hoped that the tool will have ongoing community support and be interoperable across multiple archives.
The document summarizes the agenda and key topics from a Harvard University Information Technology (HUIT) Town Hall meeting. The meeting objectives were to connect HUIT's work to Harvard's mission and recognize staff who exemplify HUIT values. Updates were provided on progress towards goals, Title IX compliance, and new initiatives like Open Houses and Morning Coffee meetups. The meeting also recognized a new faculty member and awarded the HUIT Cup prize to an employee.
Outcomes from the Digital Student Skills projectJisc
The document summarizes the outcomes of several phases of the Jisc Digital Student projects. It discusses focus groups conducted with over 120 learners from various skills sectors to understand their technology needs, experiences, and expectations. It also identifies challenges for different types of learners, such as work-based learners needing experience with workplace software and prison learners having very restricted access to technology.
The benefits and challenges of open access: lessons from practice - Helen Bla...Jisc
Led by Helen Blanchett, subject specialist, scholarly communications, Jisc.
With contribution from Andrew Simpson, associate university librarian (procurement and metadata and systems), Portsmouth University.
In this session you’ll hear in this session you’ll hear about the benefits and challenges of open access.
Connect more in London, 28 June 2016
Contextual Web Accessibility - Maximizing the Benefit of Accessibility Guidel...lisbk
Slides related to a peer-reviewed paper on "Contextual Web Accessibility - Maximizing the Benefit of Accessibility Guidelines" presented by Brian Kelly, UKOLN at the W4A 2006 workshop held in Edinburgh on 23 May 2006.
See http://www.ukoln.ac.uk/web-focus/events/conferences/w4a-2006/
Making your mind up: Formalising the evaluation of learning technologies Marieke Guy
The document discusses the need for institutions to take a more formal approach to evaluating learning technologies. It introduces some existing evaluation frameworks like the Educause rubric and SECTIONS model. It then outlines UCEM's approach, which involved thoroughly investigating requirements, identifying systems to evaluate, developing a testing plan based on the Educause rubric, testing functionality and data flows, and involving stakeholders before selecting a new assessment platform. Attendees at the talk were asked to provide ideas on evaluation processes and challenges through a Mural board.
The Real Apprenticeship Co. offers a single, multipurpose digital platform that allows for advertising opportunities, recruitment of apprentices, an online portfolio for apprentices, assessment and quality assurance of apprentices' work, reporting and batch returns, and remote support through tools like Skype and a YouTube video library. The platform is learner-driven and transparent, allowing employers individual access, and aims to be 100% digital by 2020 for national and international workplace delivery that is not tied to a specific location.
Reflections On Personal Experiences In Using Wikislisbk
This talk was given by Brian Kelly, UKOLN at UKOLN's "Exploiting the Potential Of Wikis" workshop held on 3 November 2006.
See http://www.ukoln.ac.uk/web-focus/events/workshops/wiki-workshop-2006/
Implemententing analytics part 1 - Niall SclaterJisc
The document provides an overview of Jisc's Effective Learning Analytics programme, which aims to help higher education institutions implement learning analytics to improve student retention and attainment. Key points include:
- The programme tested and developed learning analytics tools from 2015-2017 and launched a service in September 2017 to measure the impact on retention and achievement.
- Learning analytics can help improve retention, attainment, employability and personalised learning by applying techniques like machine learning and data mining.
- The programme provides institutions with a toolkit, community support, and case studies on implementing learning analytics for outcomes like improving grades and identifying at-risk students earlier.
Designing and implementing a digital skills certificate using Xerte and MoodleJisc
Speakers:
Ben Gill, IT trainer and support adviser, Lancaster University
Ryan Kavanagh, digital skills graduate intern, Lancaster University
We’ll start off with an interactive debate about the subjects that should be included in a digital skills certificate for students. Following this, we’ll take a look at how we’ve implemented our chosen curriculum at Lancaster, including how we’ve used Xerte and Moodle to develop content, assessments and digital badges.
Predicting and Preparing For Emerging Learning Technologieslisbk
The document summarizes Brian Kelly's presentation on predicting and preparing for emerging learning technologies. It discusses identifying technology trends, drivers, and challenges through the Delphi process used by the NMC Horizon Report. It also provides tools and methods for institutions to plan for future technologies, including scenario planning, acknowledging risks, and engaging with challenges. The presentation aims to help attendees understand limitations of future forecasting and apply similar methodologies to plan locally.
This presentation was provided by Judy Luther of Informed Strategies during the NISO webinar, Engineering Access Under the Hood, held on November 1, 2017
This document provides an agenda and overview for an identity management seminar. The agenda covers topics like an overview of identity and access management (IAM), how IAM improves security and privacy, federated identity management case studies, and leveraging federations. It also discusses definitions of IAM, how IAM relates to people and relationships, the creation and management of identities, and access to data, applications, and services. Key points are made about how IAM improves security and privacy and how policy frameworks like ISO 27002 can help build an IAM program.
The document outlines a teaching and learning technologies program at Harvard with the following key points:
1. The program aims to provide a continually evolving set of faculty-friendly and student-focused technologies to support teaching and learning across Harvard schools, facilitate pedagogical innovation, and contribute to educational research.
2. The plan is to provide core teaching and learning technologies to all schools, support pedagogical innovation and research, establish partnerships with faculty and staff, and cultivate an open source community around technology development.
3. A major initiative is migrating courses from existing platforms to Canvas, with projected timelines and numbers of courses outlined. Feedback from faculty and students will be gathered through surveys to inform
The document provides an overview of Harvard's Teaching and Learning Technologies (TLT) program. It discusses the program's strategic objectives to provide core teaching technologies, support pedagogical innovation, establish partnerships, and cultivate an open source community. An update on migrating courses to the new Canvas platform is provided, including pilot results. Case studies demonstrate how Canvas has been used for courses. The developer community is introduced as a way to contribute code and tools.
15.06.05 Using web and social media metrics to measure success and drive digi...kevin_donovan
1) The document discusses using web and social media metrics to measure the success of digital strategies and drive improvements.
2) It provides an overview of the key elements of a web and social media strategy, including defining goals, target audiences, and measurable usability objectives.
3) The document emphasizes analyzing metrics in relation to goals, such as driving targeted traffic, understanding useful content, and persuading visitors to take desired actions, in order to identify ways to inform decision-making and site improvements.
Slt fas fall startup 2014 combined final v2kevin_donovan
This document summarizes Harvard's Fall Startup 2014 plans across various departments. It outlines steps for incoming freshmen onboarding, course planning and registration. It also discusses communications protocols between departments and preparations by Administrative Technologies, Teaching and Learning Technologies and Support Services to ensure systems and applications are ready for the term. Key activities include testing upgrades to video lecture platforms, coordinating with faculty on classroom technologies and preparing support staff for potential issues.
Partner engagement program connect dots jan 2014-finalkevin_donovan
The document summarizes feedback from Phase 1 of HUIT's Customer Engagement Program. Key themes in the feedback included a desire for more technical advising, leadership, and help using technology from HUIT. Participants valued HUIT as a partner and appreciated the engagement process. Challenges with storage capacity were also mentioned. Next steps discussed further reviewing areas of major feedback and developing the agenda for future engagement meetings.
The document outlines goals and a projected outcome for a Business Continuity/Disaster Recovery Work Group at Harvard University. The goals are to develop an overall BC/DR strategy by June 30th that addresses events management, escalation processes, roles and responsibilities, applications and services, and provides architectural guidance. The projected outcome is to complete a current state assessment, develop a future state strategy with identified gaps, and a preliminary multi-year plan and budget by June 30th. The HUIT BC/DR vision is to have established processes, defined roles, and resilient systems that can withstand and recover from minor to major incidents to support continuity of technology services for the University.
This document outlines the vision and objectives of the Cloud & Dev Ops workgroup at Harvard University. The goals are to reduce IT costs, errors, and security risks while improving reliability, agility, and efficiency of service delivery. Key performance indicators will measure changes in ongoing costs and incidents as well as service value, SLAs met, and user satisfaction surveys. The workgroup will assess the current state, requirements, and future state to develop a gap analysis and migration approach with an achievable fiscal year plan.
Salesforce is being used across many departments at Harvard University to manage relationships and data in a centralized platform. The presentation provides an overview of Salesforce and how it is being implemented at both the Graduate School of Education and across the university. It discusses the benefits of consolidation efforts to have a single Salesforce instance for the university. This would allow for greater data sharing and expertise across departments while reducing costs. It also outlines how Salesforce can be enhanced to become more of a "CRM 2.0" platform to better facilitate collaboration and community building between various university constituents.
This document outlines the goals and strategies of an educational technology program at Harvard University. It aims to: 1) Provide core teaching and learning technologies to all Harvard schools; 2) Support pedagogical innovation and research on learning; and 3) Establish partnerships between faculty, staff, and the technology program. The program strives to deliver services on time and on budget while obtaining continuous input from faculty. It also emphasizes cultivating an open source community to develop technologies that support teaching and research.
Oculus: Using Open APIs to Share Harvard’s Digitized Books and Manuscripts kevin_donovan
1) The document discusses the development of Oculus, a new open source digital book viewer being created by Harvard to replace its older Page Delivery Service (PDS) viewer.
2) Oculus is being built according to open standards like the IIIF APIs to allow Harvard's digitized content to be shared more widely and reused by others. It will also allow Harvard researchers to access content from other institutions.
3) By developing Oculus as an open source project with input from various Harvard departments and other universities, it is hoped that the tool will have ongoing community support and be interoperable across multiple archives.
The document summarizes the agenda and key topics from a Harvard University Information Technology (HUIT) Town Hall meeting. The meeting objectives were to connect HUIT's work to Harvard's mission and recognize staff who exemplify HUIT values. Updates were provided on progress towards goals, Title IX compliance, and new initiatives like Open Houses and Morning Coffee meetups. The meeting also recognized a new faculty member and awarded the HUIT Cup prize to an employee.
Outcomes from the Digital Student Skills projectJisc
The document summarizes the outcomes of several phases of the Jisc Digital Student projects. It discusses focus groups conducted with over 120 learners from various skills sectors to understand their technology needs, experiences, and expectations. It also identifies challenges for different types of learners, such as work-based learners needing experience with workplace software and prison learners having very restricted access to technology.
The benefits and challenges of open access: lessons from practice - Helen Bla...Jisc
Led by Helen Blanchett, subject specialist, scholarly communications, Jisc.
With contribution from Andrew Simpson, associate university librarian (procurement and metadata and systems), Portsmouth University.
In this session you’ll hear in this session you’ll hear about the benefits and challenges of open access.
Connect more in London, 28 June 2016
Contextual Web Accessibility - Maximizing the Benefit of Accessibility Guidel...lisbk
Slides related to a peer-reviewed paper on "Contextual Web Accessibility - Maximizing the Benefit of Accessibility Guidelines" presented by Brian Kelly, UKOLN at the W4A 2006 workshop held in Edinburgh on 23 May 2006.
See http://www.ukoln.ac.uk/web-focus/events/conferences/w4a-2006/
Making your mind up: Formalising the evaluation of learning technologies Marieke Guy
The document discusses the need for institutions to take a more formal approach to evaluating learning technologies. It introduces some existing evaluation frameworks like the Educause rubric and SECTIONS model. It then outlines UCEM's approach, which involved thoroughly investigating requirements, identifying systems to evaluate, developing a testing plan based on the Educause rubric, testing functionality and data flows, and involving stakeholders before selecting a new assessment platform. Attendees at the talk were asked to provide ideas on evaluation processes and challenges through a Mural board.
The Real Apprenticeship Co. offers a single, multipurpose digital platform that allows for advertising opportunities, recruitment of apprentices, an online portfolio for apprentices, assessment and quality assurance of apprentices' work, reporting and batch returns, and remote support through tools like Skype and a YouTube video library. The platform is learner-driven and transparent, allowing employers individual access, and aims to be 100% digital by 2020 for national and international workplace delivery that is not tied to a specific location.
Reflections On Personal Experiences In Using Wikislisbk
This talk was given by Brian Kelly, UKOLN at UKOLN's "Exploiting the Potential Of Wikis" workshop held on 3 November 2006.
See http://www.ukoln.ac.uk/web-focus/events/workshops/wiki-workshop-2006/
Implemententing analytics part 1 - Niall SclaterJisc
The document provides an overview of Jisc's Effective Learning Analytics programme, which aims to help higher education institutions implement learning analytics to improve student retention and attainment. Key points include:
- The programme tested and developed learning analytics tools from 2015-2017 and launched a service in September 2017 to measure the impact on retention and achievement.
- Learning analytics can help improve retention, attainment, employability and personalised learning by applying techniques like machine learning and data mining.
- The programme provides institutions with a toolkit, community support, and case studies on implementing learning analytics for outcomes like improving grades and identifying at-risk students earlier.
Designing and implementing a digital skills certificate using Xerte and MoodleJisc
Speakers:
Ben Gill, IT trainer and support adviser, Lancaster University
Ryan Kavanagh, digital skills graduate intern, Lancaster University
We’ll start off with an interactive debate about the subjects that should be included in a digital skills certificate for students. Following this, we’ll take a look at how we’ve implemented our chosen curriculum at Lancaster, including how we’ve used Xerte and Moodle to develop content, assessments and digital badges.
Predicting and Preparing For Emerging Learning Technologieslisbk
The document summarizes Brian Kelly's presentation on predicting and preparing for emerging learning technologies. It discusses identifying technology trends, drivers, and challenges through the Delphi process used by the NMC Horizon Report. It also provides tools and methods for institutions to plan for future technologies, including scenario planning, acknowledging risks, and engaging with challenges. The presentation aims to help attendees understand limitations of future forecasting and apply similar methodologies to plan locally.
This presentation was provided by Judy Luther of Informed Strategies during the NISO webinar, Engineering Access Under the Hood, held on November 1, 2017
This document provides an agenda and overview for an identity management seminar. The agenda covers topics like an overview of identity and access management (IAM), how IAM improves security and privacy, federated identity management case studies, and leveraging federations. It also discusses definitions of IAM, how IAM relates to people and relationships, the creation and management of identities, and access to data, applications, and services. Key points are made about how IAM improves security and privacy and how policy frameworks like ISO 27002 can help build an IAM program.
Reputation based model for decision making in the digital ageTogar Simatupang
Reputation systems are programs that allow users to rate each other in online communities in order to build trust through reputation.
Presents the basics of reputation based model and provides many facets of reputation applications.
The document discusses Identity and Access Management (IAM) at Harvard University. IAM enables the right individuals to access the right resources at the right times. The IAM program at Harvard aims to simplify access to applications and information, enable research and collaboration, protect university resources, and facilitate technology innovation. The program is transitioning to a new provisioning system called SailPoint IdentityIQ to better manage user provisioning, deprovisioning, and access requests. The document outlines various IAM processes at Harvard including account claiming, sponsored accounts, and managing access to resources.
This document discusses identity management and federated identity management. It defines identity management as a system that provides electronic credentials to individuals and maintains information about them while establishing trust for online transactions. Federated identity management involves an association of organizations that exchange identity information to enable access to shared resources through a common trust framework. Key benefits include single sign-on access, reduced need to manage user accounts, privacy controls, and scalability. The InCommon federation is an example that allows higher education institutions in the US to leverage identity databases so students can access multiple online resources with one set of credentials.
Metadata Matters – Collaboration, Search, and Information Governance at Brail...Concept Searching, Inc
Brailsford & Dunlavey has earned a reputation as a premier national program management firm, overseeing billions of dollars in new construction and renovation projects. It offers comprehensive services, ranging from planning through implementation, and manages all areas of risk, and maintains constant control of budget, schedule, and quality.
Brailsford & Dunlavey’s goal was to update its SharePoint 2010 intranet, to refresh an out-of-the-box design and to improve usability and collaboration. The existing intranet lacked a clear governance structure, effective information architecture, and mobile accessibility. With nearly 70,000 documents and more than 8,000 list items on its intranet, and another 200,000 on its client portal, the firm needed a way to make intranet content significantly more accessible to employees across several national offices.
The redeveloped and redesigned intranet was implemented with responsive design, to encourage the highly mobile workforce to access the site from anywhere. The intranet’s new, intuitive design reflects the look and feel of Brailsford & Dunlavey’s public facing website, and the refreshed information architecture has provided a clear path to find important information.
Join Brailsford & Dunlavey and Concept Searching to:
• Discover what was done from a technology perspective
• Understand how all the firm’s documents were tagged and classified
• Find out how long the project took
• Hear about challenges and lessons learned
• Learn what the benefits have been
• Watch a demo and see the intranet in action
70% of all security breaches are due to an organization’s own staff. Register for this webinar and find out how not to become a statistic. Security is increasingly becoming a significant challenge, regarding how ensuring unstructured and semi-structured content is protected, and also the security rights of the individuals within the organization that need to be given or denied rights to organizational assets.
This Concept Searching webinar will focus on all aspects of security in a SharePoint environment, using native SharePoint tools, conceptClassifier for SharePoint, or integrated with your security application. conceptClassifier for SharePoint and conceptClassifier for Office 365 deliver semantic metadata generation, auto-classification, and taxonomy tools integrated natively with the SharePoint Term Store.
How does it work with privacy and confidential content? The products identify unknown security or confidential exposures in real-time from diverse repositories. Identification of not only standard descriptors but also organizationally defined vocabulary can also be identified. Once identified they are routed to a repository and removed from unauthorized access and portability.
CIS 2015- Social Identity Management in AcademiaReal World BYOI- Tom EgglestonCloudIDSummit
This talk will explore the real world use case for BYOI which is developing in the UK academic sector, as Universities look for ways to remove friction and improve the student experience at all stages of the student lifecycle, from pre-applicant to alumni.
We will explore how the sector is starting to realise the value of social identities and how they can help to drive revenue, and how increased competition in the sector is forcing Universities to find new ways of managing identities to deliver a seamless experience.
Featuring original research data from UK universities, the talk will address:
- Can social login be used securely to access sensitive data?
- How social login can capture the value of identity to drive revenues
- How to build a next generation identity platform to deliver these benefits
This document discusses the evolution of knowledge management from information management. It outlines some of the key challenges in knowledge management, such as changing customer service methods, transforming business processes, and changing employee mindsets. The document also discusses ethics in knowledge management and attributes of knowledge, noting that knowledge expands on use and is sharable but also needs protection. Knowledge management systems have evolved from standalone systems in the 1990s-2000s to more integrated and collaborative systems today that leverage technologies like social networking, wikis, and mobile applications.
EduTools 2.0 is an updated comparison tool for learning management systems (LMS). It surveys key aspects of LMSs like portal functionality, communication tools, assessments, and pricing. The document discusses revising EduTools to address changing needs around ubiquitous technology, converging feature sets, and a focus on learning over learner management. It also explores related topics like personal learning environments, semi-permeable system borders, and interoperability. Authentication systems are similarly surveyed based on their functionality, user experience, pricing, support, and integration capabilities. The results will help inform LMS selection and improvement of comparison resources like EduTools.
Best of the Intranet Global Forum LA 2015Toby Ward
Best of the Intranet Global Forum LA 2015 intranet case study highlights by Toby Ward, Prescient Digital Media, at the Intranet Global Forum, NYC, on October 23, 2015.
Shaping the Future of Trusted Digital IdentityNoreen Whysel
May 2019 presentation by Noreen Whysel to the CARIN Technology Committee. Discusses the Identity Ecosystem Framework Registry (idefregistry.org) and proposed health data use cases for potential trusted identity API for healthcare.
InCommon provides federated identity management for higher education institutions and their partners. It establishes a common trust framework that allows institutions to leverage their identity databases and single sign-on systems. This allows users to access multiple online resources with one set of credentials. Through standards like SAML and Shibboleth, InCommon handles authentication while services make authorization decisions based on shared attributes. Over 250 institutions and millions of users participate in InCommon's federation for convenient and secure access to a growing number of academic and commercial resources.
Next Generation Identity Management discusses ProofID's identity management solutions and social identity management. It provides an overview of ProofID's background and customers. It then discusses challenges in academic identity management and introduces ProofID's managed identity platform using PingFederate, midPoint, and their IDENTify social identity product. The presentation demonstrates how social identity management could be used for pre-applicants, new students, and alumni through identity proofing and single sign-on access to university systems.
The document discusses the results of an identity management survey and audits conducted by the Identity Project in UK higher education institutions. It found that while IDM is becoming more important, practices are decentralized and inconsistent across institutions. The audits revealed issues with data quality and integration when implementing IDM systems. Recommendations include raising awareness, building capacity through funding and resources, and further research on authentication assurance levels and toolkits.
Presentation by Todd Carpenter given at the American Library Association Conference on June 25, 2017 about the Resource Access in the 21st Century (RA21) project. The RA21 project is focused on improving the access control systems for digital content subscribed to by libraries.
GÉANT supports over 40 National Research and Education Networks (NRENs) across Europe which in turn support over 10,000 institutions and 50 million academic users. eduTEAMS is a suite of services developed by GÉANT to enable the use of federated identity and access management (AAI) for research collaborations. This includes an eduTEAMS Membership Management service, Identity Hub, and Discovery Service that can be used together or separately to help collaborative organizations manage user identities and access to their services in a federated way. Several pilots are underway to test eduTEAMS with research communities, infrastructures, and NRENs.
Guide to Digital and Communication Accessibility in Higher Education3Play Media
This webinar will outline considerations for building an operational framework rooted in the social model of disability. Providing these services in the context of higher education creates a unique intersection where disabled students gain independence and autonomy while also exploring their own identity and communication preferences. Eliminating barriers at the first touchpoint for students (and employees) leads to retention and fulfilling the institutional mission.
Open Standards- the key to building digital learning environmentscccschamp
This document discusses the importance of open standards in building digital learning environments. It begins by noting the increasing number of learning tools and the challenge of scaling digital curriculum without integrated standards. It then discusses how open plug-and-play standards can help integrate tools to improve learner experience and enable data sharing. The remainder of the document outlines the work of IMS Global Learning Consortium communities of practice focused on topics like learning tools/content, analytics, credentials, and accessibility and how they are working to advance relevant standards.
Edugate is a 1 year pilot project and 2 year production identity federation service for universities, colleges, and other institutions in Ireland. It provides single sign-on access to various applications and services. The document discusses several areas for potential improvement and expansion of Edugate, including extending user attribute schemas, implementing stronger authentication methods, improving account provisioning capabilities, tracking cross-institutional groups, adopting new identity protocols, gathering more statistics, expanding bilateral trusts, increasing participation beyond existing members, enabling non-web single sign-on, aggregating identities from multiple sources, and enhancing logout functionality.
The document discusses HBX's initiative to build a cloud-based data warehouse to support its online education platforms. It provides an overview of HBX, outlines the objectives of creating a data-driven culture, describes the technical architecture and challenges encountered, and discusses the impacts of enabling self-service analytics. Moving forward, areas of focus may include integrating additional data sources, handling streaming and native JSON data, and advancing the analytics capabilities.
2016 it summit_accessibility_2016-05-24_standardkevin_donovan
This document provides an overview of web accessibility, including what it means, why it's important, and benefits. It introduces Harvard University's online accessibility website, which contains best practices, examples, and resources for content creators, developers, and others to support the WCAG 2.0 accessibility guidelines. The website includes sections on techniques, resources, and an accessibility testing tool that is currently in development.
Fphs informatics for 2016 it summit 160531kevin_donovan
The Football Players Health Study at Harvard aims to improve health outcomes for former NFL players through research. It collects data through questionnaires, mobile apps, and planned in-person clinical assessments. It faces challenges of securely storing highly sensitive player health data across Harvard systems while enabling researcher access. It implements security measures like access controls, encryption, and auditing to comply with Harvard and HIPAA standards. The study involves collaboration between Harvard Medical School, Beth Israel, Partners, and information technology teams to support the research platform.
This document discusses the use of peer review and rubrics in the Canvas learning management system at Harvard Kennedy School and Harvard School of Engineering and Applied Sciences. It provides examples of how policy analysis and engineering courses used peer review in Canvas to provide students feedback on assignments. Both faculty and students found the peer review process in Canvas to be useful, though some challenges were noted, such as limitations in Canvas functionality and difficulties navigating peer feedback. Lessons learned focused on strategies to improve the peer review experience for students and faculty.
It summit dataverse-bigdata-mercecrosaskevin_donovan
This document discusses a data repository system called Dataverse that aims to make research data findable, accessible, interoperable and reusable (FAIR). Dataverse allows researchers to publish, archive and share their data while also providing metadata and access controls. It supports a wide range of data types and large datasets through integrations with other data management systems and cloud storage options.
This document summarizes Harvard Medical School's use of CrashPlan for end user backups. It notes that CrashPlan provides easy, set it and forget it backups across devices and platforms that protect users' personal data. Statistics are presented on the number of users and devices backed up, amount of data stored, and restore activities, with the majority of restores being for single files and under 10 MB in size. Success stories are shared of users' data being successfully restored after various types of data loss and hardware failures. Contact information is provided for support.
It summit facilitate-researchcomputing-mercecrosaskevin_donovan
This document discusses the increasing complexity of modern research due to factors such as growing data sizes, collaboration across disciplines, and the need to combine multiple data sets and skills. It notes that research is becoming more data-intensive and collaborative. To help researchers with these challenges, Harvard provides a variety of high-performance computing resources and research consultants across different schools to facilitate data-intensive research and provide training in tools like Python, R and GIS.
This document discusses the development of digital infrastructure and collaborative spaces at the Harvard Art Museums from 2012-2014. It highlights projects focused on collections access, media art, and innovative classrooms. Key developments included building a rack room for servers and creating the Lightbox Gallery, a space for exploring how objects speak to one another through media and metadata. The goal was to explore how digital spaces can fit within a collections-based institution and foster collaboration and questioning.
The document provides an overview of Harvard's new telephone replacement program called Harvard Phone. It will replace the legacy telephony service with a modern Voice over IP system powered by Cisco and hosted by Verizon. The program will provide desk phones, soft phones, video conferencing and self-service portals. It aims to reduce infrastructure costs over time while offering flexible communication tools and empowering users. The summary highlights the key aspects and goals of the new Harvard Phone program.
This document discusses best practices for crafting effective email communications while avoiding phishing risks. It provides tips for increasing email credibility and engagement, including: safely linking to external URLs, maintaining clean mailing lists, using a consistent branded template, and educating recipients to recognize phishing attempts. The document also describes Harvard's technical filters for blocking spam and phishing, and case studies how the Executive Vice President's newsletter incorporated these practices into its successful email marketing.
This document discusses privacy concerns related to sharing big educational data. It outlines different approaches to de-identifying data like removing identifying information according to FERPA or using k-anonymity to ensure at least k records share the same values for identifying fields. The author notes early attempts at de-identification through suppression or generalization introduced statistical biases. A new approach is proposed that adjusts value bins to minimize deviation from the mean and adds "chaff" or fake records, which shows promising preliminary results in allowing data sharing while preserving privacy.
The document summarizes the IT Academy's Year 1 program and outlines plans to develop Level II courses. Over 1300 IT professionals completed Level I courses, with 40 becoming certified facilitators. Eight Level I badge requirements were also rolled out. Level II is designed for those who have completed Level I and will involve additional courses, webinars, and activities to deepen skills and allow professionals to integrate concepts into their work and lead discussions. Specific Level II tracks outlined include Service Mindset, Project Management, Agile, ITIL, and Information Security. The document concludes with an announcement of an upcoming demonstration of the Harvard Training Portal.
A prototype is worth 1,000 meetings. The document discusses tips for collaborating on mobile-first prototyping including that interactive prototypes allow for quick initial development, align teams, and allow clients to test designs before development is complete. Key learnings are that prototypes streamline development processes, help clients visualize mobile designs, and designing directly in the browser saves time over adding elements for larger devices. Resources for prototyping and testing tools as well as contacts are provided.
The document discusses the challenges of archiving and preserving social media for historical and cultural purposes. It notes that social media is not just technological information but also captures important social and cultural contexts. Archiving social media poses difficulties due to its ephemeral nature, user-generated hashtags instead of keywords, and platforms' changing features and business models. The document examines how social media is used to construct personal identities and social formations, and how platforms can both liberate self-expression but also enforce certain norms. It emphasizes the importance of capturing the full context of social media for future researchers.
This document summarizes the work of the User Research Center at Harvard Library. It provides an overview of who they are, how they work, and what they have accomplished. The center conducts user research such as paper prototyping, usability testing, and test fests to evaluate designs and gather feedback from users. They work with campus partners to improve user experience and accessibility. Quotes from participants highlight how the research has helped improve products and services. The center is located in Lamont Library and welcomes consultations.
Stakeholder update 4 14 data center outagekevin_donovan
The document provides an update on the planned preventative maintenance for the data center network on June 4, 2016. The original plan to temporarily reroute network traffic and migrate applications to alternate storage has been altered. The new approach will permanently implement a direct network connection between virtual machines and storage, avoiding any potential outages. Next steps include finalizing the list of impacted applications and communication efforts to inform stakeholders of the changes and potential impacts. A detailed timeline is provided outlining the sequence of activities planned for the maintenance window.
The ATS Open House will be held on February 29, 2016. The open house event will provide an opportunity for prospective students and their families to learn more about the Applied Technology School and its programs. Attendees can tour the facilities and speak with current students and faculty to gain a better understanding of what ATS has to offer.
- A data center outage is scheduled for the weekend of June 4th to perform maintenance on end of life equipment.
- Progress updates were provided on action items from the last meeting, including scheduling executive check-ins, identifying impacted stakeholders, and communication plans for the outage.
- Next steps include determining the scope of impacted applications, reviewing effects on campus services, and finalizing plans for application migration and the day-of maintenance activities.
The document discusses plans to integrate the network operations center (NOC) and security operations center (SOC) at an organization into a single IT infrastructure organization over the next few months. This integration aims to [1] improve service and enable increased collaboration by reducing barriers between teams and simplifying service models, [2] leverage opportunities to align resources with goals through more integrated tools and functions, and [3] foster consistent planning and infrastructure innovation. The organization will host workshops for NOC and SOC staff to help define what the integrated organization should look like going forward.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
2. Agenda
• What is Identity & Access Management at Harvard?
• IAM in Higher Education is Different
• Requirements and Concerns for IAM in Higher Education
• Internet2: InCommon, Shibboleth, Identity Federation, and More
• TIER: Trust and Identity in Education and Research
• Harvard’s Role in TIER
• Major IAM Projects at Harvard: HarvardKey and Grouper
• Summary: Supporting the Teaching & Research Mission
2
3. Who We Are
• Jason Snyder
Managing Director, Architecture and Engineering, HUIT
• Jane Hill
Director, IAM Product Management, HUIT
• Scott Bradner
Senior Technology Consultant, HUIT
3
4. What is Identity & Access Management at Harvard?
4
Objectives Guiding Principles Key Performance Indicators
The Vision for the Identity & Access Management Program
Harvard Community needs will drive
our technology
Tactical project planning will remain
aligned with the program’s strategic
objectives
Solution design should allow for other
Schools to use foundational services
to communicate with the IAM system
in a consistent, federated fashion
Communication and socialization are
critical to our success
Provide users, application owners, and IT administrative staff with secure, easy access to
applications; solutions that require fewer login credentials; the ability to
collaborate across and beyond Harvard; and improved security and auditing.
Simplify User Experience
Simplify and improve access to
applications and information inside
and outside of the University
Enable Research & Collaboration
Make it easier for faculty, staff, and
students to research and collaborate
within the University and with other
institutions
Protect University Resources
Improve the security stature of the
University via a standard approach
Facilitate Technology Innovation
Establish a strong foundation for IAM
to enable user access regardless of
new and/or disruptive technologies
Monthly number of help desk
requests relating to account
management
Monthly number of registered
production applications using IAM
systems
Monthly number of user logins and
access requests through IAM
systems
Monthly number of production
systems to which IAM provisions
5. IAM in Higher Education is Different
5
Our users are different from those in industry, and their needs are different, too.
• Users are frequently affiliated with more than one institution, whether simply through
multi-institution research conducted at “home” or something as multivariate as a
temporary guest lecturer assignment at another university
• Inter- and intra-university partnerships continue to expand
• People often hold multiple rules – with multiple privileges – concurrently
• Affiliations often don’t have clear start or end dates — faculty need early access to set
up course sites, and many users continue to collaborate after formal appointments end
• Privacy is of greater importance in higher education than within many corporate
environments
• Faculty and researchers depend upon continuity and accuracy in their publishing
records and academic biographies, and therefore have their own unique needs
6. Scholarly Identity and Collaboration
6
• Increasingly, academic users need to maintain an accurate profile
of their publication history and academic biography
• Since IAM already involves a large amount of attribute and identifier exchange, adding
scholarly identifiers to the attribute repository is a way to include this information in an
existing data flow
• Identifiers enable integration around an individual’s scholarly record, such as LTI,
VIVO, etc.
• ORCID (Open Researcher & Contributor ID) identifiers are being added to Internet2’s
standardized eduPerson schema, as well as various data repositories around the
academic community
• Items linked to an ORCID record can have multiple external identifiers, and these can
connect to other identifiers: DOIs, ISBNs, ISNIs, PubMed IDs, grant numbers, etc.
Learn more about ORCID at orcid.org.
7. Identity and Privacy in Higher Education
7
“The rise of Internet identity began in earnest ten years ago, as academic, government
and corporate and social deployments started and began to influence each other.
Government initiatives have come and gone and come anew. Research and education
deployments worldwide have pushed the envelope but are now challenged to inter-
federate. Social providers evolve business models that leverage the user as
product.
“There are impressive successes now in many instances and key integrations have been
achieved. The extent of usage has grown dramatically. At the same time, there are
obvious stress points, where the conflict of economic motives compound issues of
privacy, where the international differences in cultures and legal systems create a swamp
of issues, and helping the institution and the user manage the complexity of privacy.”
— Ken Klingenstein, Internet2, December 2014
8. IAM in Higher Education: Common Requirements
8
Commonly accepted requirements for IAM solutions across the academic
community include the following:
• Services must support complex authorization models to grant individuals the right
levels of access to licensed resources (all roads lead to groups!)
• Solutions must support federation to enable inter- and intra-institution access — not
feasible to rely on centralized control of all users
• Solutions must allow for the fact that users will need to access some resources on the
public Internet
• With interest in cloud services exploding, solutions should be able to work in the cloud
if desired
• Preference for open source, standards-based solutions
• Services and solutions should be built with the financial constraints of higher education
in mind
9. IAM in Higher Education: Building Our Own Solutions
9
Since higher-education users have their own special needs, out-of-the-box vendor
solutions often aren’t satisfactory. Why build our own solution?
• Commercial products are designed for corporate intranet environments
• Vendor solutions are often a poor fit with our identity data and the requirements it
poses (multiple roles, fuzzy lifecycle, increased privacy)
• If support for federation even exists in vended solutions, it tends to be bi-lateral
• Vendors discount software, but often look to sell expensive professional services
• Use cases are often the same across institutions, regardless of their size:
– Extended identity lifecycles
– Context-sensitive privacy management
– An identity registry that supports multiple personae
– Group management
10. Addressing These Issues: Internet2
10
Internet2 is a not-for-profit organization started as a U.S.
higher education consortium in 1996.
• 252 U.S. universities
• 82 corporations
• 68 affiliates, including government agencies
• 41 regional and state education networks
• More than 65 national research and education networking
partners, representing more than 100 countries
Internet2 projects include:
• National network (100 Gbps links, Harvard is a member)
• Trust and Identity in Education and Research (TIER)
• Grouper
• Shibboleth
• InCommon Federation
11. Internet2: InCommon
11
• Certificate service
Flat-rate certificates
• Identity management federation
Use your Harvard identity elsewhere
• Assurance program
Standard for quality of authentication
• Multifactor authentication
Discount for Duo multifactor service
12. Internet2: Shibboleth
12
As a technology enabling identity federation, Shibboleth
defines the interaction between the two key players in
authentication:
• Identity provider (IdP)
An authentication and attribute service
• Service provider (SP)
An Internet-based website that uses an IdP to
authenticate a user
13. Shibboleth Identity Federation at Harvard
13
Identity federation at Harvard is a cooperative system that supports the
interconnection between SPs and IdPs, resulting in the following user experience:
1. User connects to a service and clicks a “log in” button or link
2. The service presents the user with a list of universities
3. The user selects “Harvard University”
4. The user’s browser is redirected to the Harvard web authentication system (PIN or
HarvardKey)
5. The user inputs his or her credentials
6. If credentials are accepted, the user’s browser is redirected to the original service
7. The service is told that the user is authenticated
14. Identity Federation at Harvard: Security & Privacy
14
Harvard’s federated identity system has a number of security and privacy benefits:
• The actual act of authentication is done at Harvard
• The service never gets the user’s credentials
• All interactions are cryptographically protected
• Harvard controls what user attributes are given to the service
– Usually eduPersonPrinicpalName (eppn), a random-appearing unique identifier
– May also get a user’s login name and email
15. Identity Federation: The Scope
15
• According to InCommon, 8 million people are supported by their
affiliated federated identity providers
– 397 IdPs
– 2,275 SPs
• Harvard supports referrals from more than 30 InCommon and
other SPs
• Harvard also runs one SP — the Loeb Classical Library
16. Identity Federation: InCommon Assurance
16
Harvard is certified as an InCommon Bronze-level identity provider.
• This means that we have met the extensive requirements in
InCommon’s Bronze certification requirements document
• See more details at http://iam.harvard.edu/resources/incommon,
including our Bronze self-certification documentation
• The only user impact to this certification is that users will be asked to
change their passwords the first time they try to access an InCommon
Bronze SP
• We have also completed nearly all the requirements for Silver-level
certification
17. TIER: Wrapping Them All Up
17
How can Harvard and other higher-education institutions
effectively share and standardize the results of their IAM efforts?
Through TIER — Trust and Identity in Education and Research.
• Higher-education community created to accelerate maturity and
broad adoption of IAM best practices
• The creation of TIER formally recognizes needs for IAM standards and
practices in higher education
• TIER will aid in the creation of a sustainable support model for producing and
maintaining tools needed to support the unique requirements of the higher-
education identity ecosystem
Benefits of Harvard’s membership in TIER include:
• Opportunities to help develop direction for standards and design
• Advance knowledge of components that TIER exists to sustain (including
Shibboleth, InCommon, Grouper, and others key to Harvard’s IAM mission)
18. The TIER Unified Model
18
TIER operates under a unified model of IAM services corresponding to the
structure below.
19. TIER and Harvard’s IAM Effort
19
Many of the IAM program’s key projects relate directly to domains within TIER’s
unified model — for example:
• Authentication
• Federated Registry
• Automated Provisioning and Deprovisioning
• Groups
• Multifactor Authentication
This means not only that our mission-critical projects rely on services and
technologies under TIER’s purview, but also that the processes, workflows, and
technologies we develop for IAM at Harvard can inform other TIER universities
working on similar problems.
20. Major Projects for Harvard IAM: Grouper
20
IAM is implementing a new access management system
using Internet2’s Grouper, with rollout in tandem with
the HarvardKey launch this autumn.
• Enterprise-scale access management that manages groups and group memberships
• The most suitable option for Harvard’s highly distributed management environment, as
well as our heterogenous technology environment
• Supports delegated group administration — meaning that because departments and
teams can manage their own access control, HUIT will not need to be involved in
everyday group and membership management
• As an Internet2 product supported by TIER, Grouper was built by the higher education
community with our needs in mind — and is backed up by successful deployments in
institutions worldwide
21. Major Projects for Harvard IAM: Grouper
21
Grouper’s core concept includes hierarchies of groups, subgroups, and composite
groups, with delegation of rights for group administration.
22. Grouper’s Benefits for Harvard
22
You can use groups created and maintained by Harvard IAM to support your own
local groups.
• Because Grouper is integrated with the main IAM identity registry, IAM will build and
maintain a set of fundamental groups
• IAM will also provide maintenance for locally defined and managed groups such as
courses or collaboration groups
• Other systems and applications that need to access groups will be able to do so easily
using a variety of methods:
– A SAML or CAS authentication assertion
– A multivalued attribute in LDAP
– A RESTful API
23. Major Projects for Harvard IAM: HarvardKey
23
HarvardKey is a unifying credential that enables
access to email, desktop, and Web resources
with a single login name and password.
You’ll see changes to the old PIN login screen beginning in September, with waves
of user populations invited to activate a HarvardKey soon after:
• September 22, 2015: New HarvardKey self-service account management functions
available to all Alumni users
• October 6, 2015: HarvardKey available to FAS and Central users in conjunction with
Harvard’s IT Security Campaign
• Within 18 months, every Harvard Community user will be invited to onboard
OCT:
FAS
Central
SEPT:
Alumni
24. HarvardKey: The Benefits
24
• HarvardKey is a single login name and password that enables access to email,
desktop, and Web resources
• Successor to Harvard’s current PIN System
• New, mobile-responsive user experience for the login screen and account
management suite (looks great on tablets, too!)
• Authentication and authorization are much more nimble
• Supports optional multifactor authentication
• Easier onboarding and off-boarding
• Supports the HUIT goal of “One Identity for Life” for any person — regardless of
role — including seamless support for changes between roles, schools, etc.
26. In Summary: Supporting the Harvard Mission
26
• At times, Harvard on its own can feel like multiple institutions … but solutions such as
HarvardKey, Grouper, InCommon federation and ORCID are addressing this:
– One user credential
– Attribute consolidation
– Facilitating interoperability with external institutions
• Our users can work across organizational as well as institutional boundaries thanks to
IAM solutions
• Our users’ ability to assert their identities and attributes from anywhere in the world, at
any time, facilitates collaboration — that’s one thing that makes IAM in higher
education unique
• Our membership in TIER supports collaboration in higher education as a whole as the
community identifies and addresses important IAM needs and opportunities for
standardization
29. In Summary: Supporting the Harvard Mission
29
What Goal? What Tool?
Give a credential to everyone who needs it HarvardKey
Enable identities to work wherever
researchers and scholars need to go
InCommon Federated Identity
Effective group management, including a
distributed permissions manager meeting
the needs of teachers, scholars, and
researchers
Grouper
Provide users with added security
beginning at the login screen
Multifactor Authentication (Duo)
The IAM toolset — both custom solutions and tools supported by TIER — supports
the critical goals supporting Harvard’s teaching and research mission.