The document discusses how IT departments need to respond with agility to organizational changes. It describes a thought experiment where shareholders demand changes to the business model, including a reduced budget. The document argues that IT should lead these changes, not just follow or get out of the way. It also discusses how the Phoenix Central School District transformed its IT operations through virtualization to reduce costs while improving management and support. Education is poised for significant changes driven by technology, and IT will need to adapt quickly to these changes through approaches like virtualization.
Rapid, breathtaking technology advances are forcing radical changes not only in how IT organizations function, but also in terms of their culture, leadership, and even careers. Combined with business, social and global trends, as well as technology investing (spending), IT organizations must accelerate their organizational change plans in order to survive and thrive. They must assess and plan for complete transformation – strategy, structure, people, processes, and tools. Are we preparing our IT professionals to plan for and make these changes? Are we helping them position themselves and their organizations for success in this dynamically evolving world? This keynote address, delivered by IT industry thought leader Peter McGarahan of McGarahan & Associates (www.mcgarahan.com), will explore the impact of rapidly changing IT and business trends on traditional IT careers, positions, and skill sets. The wake-up call he will deliver comes from four-star US General (Ret.) Eric Shineski: "If you don\'t like change, you\'ll like irrelevance even less." From there, McGarahan will discuss:
• The urgent and undeniable need for IT professionals to examine their skill
sets today against those required tomorrow;
• The significance of industry and business changes as they radically impact
IT organizations, cultures, professionals, and careers over the next five years; and
• Recent game-changing developments, including cloud computing (hosted services
and software solutions), the virtual desktop, mobile computing, IT sourcing, and
remote / virtual workers.
McGarahan’s call to action for IT Leaders is direct and powerful: “As IT leaders, we must coach our IT professionals out of and beyond their comfort zone, raise the bar on their expected ingenuity and vision to meet future challenges, and establish a sense of urgency in them. We must help them reevaluate and retool themselves for the limitless opportunities and possibilities in front of them to deliver business value, competitive advantage, and customer loyalty.”
Collaboration and social applications generate a lot of information: over 80% of business data may be in email, activity streams, files, and other unstructured content that is growing inexorably. Thankfully, cognitive computing and natural language processing have the potential to help and bring unexpected insights from all that content. Come to this session to find out how collaboration tools can become even more efficient through auto-prioritization and identification of actions, the suggestion of relevant content, and a system that can actually learn from your actions to guide you forward in your day.
Web 2.0: Opportunity Or Threat For IT Support Staff?lisbk
Slides used in a talk on "Web 2.0: Opportunity Or Threat For IT Support Staff?" given by Brian Kelly, UKOLN at the UCISA SDG 2007 conference.
See http://www.ukoln.ac.uk/web-focus/events/conferences/ucisa-sdg-2007/
Rapid, breathtaking technology advances are forcing radical changes not only in how IT organizations function, but also in terms of their culture, leadership, and even careers. Combined with business, social and global trends, as well as technology investing (spending), IT organizations must accelerate their organizational change plans in order to survive and thrive. They must assess and plan for complete transformation – strategy, structure, people, processes, and tools. Are we preparing our IT professionals to plan for and make these changes? Are we helping them position themselves and their organizations for success in this dynamically evolving world? This keynote address, delivered by IT industry thought leader Peter McGarahan of McGarahan & Associates (www.mcgarahan.com), will explore the impact of rapidly changing IT and business trends on traditional IT careers, positions, and skill sets. The wake-up call he will deliver comes from four-star US General (Ret.) Eric Shineski: "If you don\'t like change, you\'ll like irrelevance even less." From there, McGarahan will discuss:
• The urgent and undeniable need for IT professionals to examine their skill
sets today against those required tomorrow;
• The significance of industry and business changes as they radically impact
IT organizations, cultures, professionals, and careers over the next five years; and
• Recent game-changing developments, including cloud computing (hosted services
and software solutions), the virtual desktop, mobile computing, IT sourcing, and
remote / virtual workers.
McGarahan’s call to action for IT Leaders is direct and powerful: “As IT leaders, we must coach our IT professionals out of and beyond their comfort zone, raise the bar on their expected ingenuity and vision to meet future challenges, and establish a sense of urgency in them. We must help them reevaluate and retool themselves for the limitless opportunities and possibilities in front of them to deliver business value, competitive advantage, and customer loyalty.”
Collaboration and social applications generate a lot of information: over 80% of business data may be in email, activity streams, files, and other unstructured content that is growing inexorably. Thankfully, cognitive computing and natural language processing have the potential to help and bring unexpected insights from all that content. Come to this session to find out how collaboration tools can become even more efficient through auto-prioritization and identification of actions, the suggestion of relevant content, and a system that can actually learn from your actions to guide you forward in your day.
Web 2.0: Opportunity Or Threat For IT Support Staff?lisbk
Slides used in a talk on "Web 2.0: Opportunity Or Threat For IT Support Staff?" given by Brian Kelly, UKOLN at the UCISA SDG 2007 conference.
See http://www.ukoln.ac.uk/web-focus/events/conferences/ucisa-sdg-2007/
This speech was delivered as the keynote speech at the 2012 Software Architecture Symposiums International (SASI) "Cloud Architecture Without The Hype" conference. The purpose of this presentation was to show that IT has faced major changes in the past and that cloud computing is another major change. The impact on what IT staff will do in the new era of cloud computing is then explored...
DataEd Slides: Expressing Data Improvements as Business OutcomesDATAVERSITY
Join us and learn how you can better align your Data Management projects with business objectives to justify funding and gain management approval. Failure to successfully monetize Data Management investments sets up an unfortunate loop of fixing symptoms without addressing the underlying problems. As organizations begin to understand that data practices are the root causes of many business problems, they become more willing to make the required investments. However, we need to also approach them. The No. 1 reason that data programs fail to deliver is that they do not set or measure specific objectives that are meaningful to management. While there are opportunities to assist at the project level, data improvements are better able to be leveraged at the organization level. An improvable, dedicated data program can only be achieved by repeated application of data practices in service of specific business objectives. Data improvements typically do not maintain an ROI calculation. ROIs expressed in terms that board/executive management cares about deeply ensure data program viability. Improving organizational execution of specific data practice improvements must lead directly to specific improvements in organizational KPIs. While organizations may not be currently practiced in this ability, it is quite easy to learn. This presentation uses a number of specific examples calculating the business impact of data improvements. Program learning objectives include:
• Coming to grips with the state of practice
• Understanding the need for a comparable baseline measure
• Seeing application in a number of contexts
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
Whether you call it data munging, data cleansing, or data wrangling, everyone agrees that data preparation activities account for 80% of analysts’ time, leaving only 20% for analysis. Shifting this work to more specialized talent represents a major source of data analysis productivity improvements. This program “walks” through the major preparation categories including collection, evaluation, evolution, access design, and storage requirements. Understanding each in context also provides opportunities to develop complementary Data Governance/ethics frameworks. A generalized approach is presented.
Learning objectives:
- Appreciate the savings that can accrue from transforming data preparation from one-off to an improvable process
- Recognize what data preparation knowledge/skills your organization has and/or needs
- Better know the transformations that data can survive as it is prepared to be analyzed
This speech was delivered as the keynote speech at the 2012 Software Architecture Symposiums International (SASI) "Cloud Architecture Without The Hype" conference. The purpose of this presentation was to show that IT has faced major changes in the past and that cloud computing is another major change. The impact on what IT staff will do in the new era of cloud computing is then explored...
DataEd Slides: Expressing Data Improvements as Business OutcomesDATAVERSITY
Join us and learn how you can better align your Data Management projects with business objectives to justify funding and gain management approval. Failure to successfully monetize Data Management investments sets up an unfortunate loop of fixing symptoms without addressing the underlying problems. As organizations begin to understand that data practices are the root causes of many business problems, they become more willing to make the required investments. However, we need to also approach them. The No. 1 reason that data programs fail to deliver is that they do not set or measure specific objectives that are meaningful to management. While there are opportunities to assist at the project level, data improvements are better able to be leveraged at the organization level. An improvable, dedicated data program can only be achieved by repeated application of data practices in service of specific business objectives. Data improvements typically do not maintain an ROI calculation. ROIs expressed in terms that board/executive management cares about deeply ensure data program viability. Improving organizational execution of specific data practice improvements must lead directly to specific improvements in organizational KPIs. While organizations may not be currently practiced in this ability, it is quite easy to learn. This presentation uses a number of specific examples calculating the business impact of data improvements. Program learning objectives include:
• Coming to grips with the state of practice
• Understanding the need for a comparable baseline measure
• Seeing application in a number of contexts
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
Whether you call it data munging, data cleansing, or data wrangling, everyone agrees that data preparation activities account for 80% of analysts’ time, leaving only 20% for analysis. Shifting this work to more specialized talent represents a major source of data analysis productivity improvements. This program “walks” through the major preparation categories including collection, evaluation, evolution, access design, and storage requirements. Understanding each in context also provides opportunities to develop complementary Data Governance/ethics frameworks. A generalized approach is presented.
Learning objectives:
- Appreciate the savings that can accrue from transforming data preparation from one-off to an improvable process
- Recognize what data preparation knowledge/skills your organization has and/or needs
- Better know the transformations that data can survive as it is prepared to be analyzed
DataEd Slides: Data Management vs. Data StrategyDATAVERSITY
Organizations across most industries make some attempt to utilize Data Management and data strategies. While most organizations have both concepts implemented, they must understand their required interoperability to fully achieve their goals.
Learning Objectives
• Gaining a good understanding of both important topics
• Understanding that data only operates at a very intricate, specifically dependent, intent and what this means
• Understand state-of-the-practice
• Coordination is key, requiring necessary but insufficient interdependencies and sequencing
• Practice makes perfect
Shrinking the Custom Application Development Cycle with Low-Code PlatformsQuickBase, Inc.
Enterprises are constantly seeking to raise speed and agility through software. This requires IT to address complex business requirements with an eye for customer experience and mobility. Until now, these builds meant long and expensive development cycles, on-site maintenance and updates. In short, these builds lack the flexibility required for today’s business environment.
Not anymore.
With the advent of low-code platforms, the time, skills, and resources required for building custom applications that meet complex business requirements have been dramatically reduced.
Brighttalk converged infrastructure and it operations management - finalAndrew White
How Converged Infrastructure Will Change IT Operations Management
Over the past decade, Enterprises have leveraged a shared service model to make IT more cost effective. The emergence of “Converged Infrastructure” and “Fabric-Based Infrastructure” will allow IT to offer purpose driven solutions rather than the function driven solutions of the past. To do this, IT will need to evolve towards more modular designs, rely more on open standards, and rethink their approach to management frameworks.
In this session you will learn:
How converged infrastructure is used to create purpose driven solutions
Why new operational challenges are faced as this new approach is used broadly
What changes need to occur to succeed with this new paradigm
I delivered a guest lecture for the students of the one-year Post Graduate program in Global Supply Chain Management offered by IIM Udaipur. In this talk, I focused on three dimensions of digital journey - technology, process (rather business models) and people.
DevOps -- A 10 year retrospective (based on interviews conducted at DevOps Da...Barton George
This presentation, delivered at DevOps Days Austin 2022, traces the evolution of DevOps -- its tools, technology, leaders and contributors -- from 2012 to 2022. The presented content is drawn from over 40 video interviews I conducted at the event starting in 2012. Cited interviews include those with Andrew Clay Shafer, Patrick Debois, Damon Edwards, John Willis, Michael Cote, Nick Galbreath, Christian Beedgen, Alexis LeQuoc and Jason Hansen (links to the interviews are embedded in the slides).
The retrospective shows how the Austin event provided an early glimpse at startups that would grow into key DevOps players as well as concepts that years later would become part of the vernacular. (Datadog, now valued at over $40B, was still in private beta when they participated in 2012 and the term “DevSecOps” which was presented at that same event wouldn’t show up in Google searches for another four years). A key theme throughout the presentation is how over the years the defining characteristic of DevOps has been pulled back and forth between culture and technology, and how the lack of a crisp definition has hampered adoption.
Because every organization produces and propagates data as part of their day-to-day operations, data trends are becoming more and more important in the mainstream business world’s consciousness. For many organizations in various industries, though, comprehension of this development begins and ends with buzzwords: “big data,” “NoSQL,” “data scientist,” and so on. Few realize that any and all solutions to their business problems, regardless of platform or relevant technology, rely to a critical extent on the data model supporting them. As such, Data Modeling is not an optional task for an organization’s data effort, but rather a vital activity that facilitates the solutions driving your business. Since quality engineering/architecture work products do not happen accidentally, the more your organization depends on automation, the more important the data models driving the engineering and architecture activities of your organization become. This webinar illustrates Data Modeling as a key activity upon which so much technology depends.
DataEd Slides: Leveraging Data Management TechnologiesDATAVERSITY
Our architecturally solid stool requires three legs: people, process, and technologies. This webinar looks at the most misunderstood of these three components: technology. While most organizations begin with technologies, it turns out that technologies are the last component that should be considered. This webinar will survey a range of technologies that can be used to increase the productivity of Data Management efforts. The goal is to invest in as little infrastructure as possible while still achieving business/program objectives. This program’s learning objectives include:
• Understanding technology considerations
• Appreciating the overview of data technologies and then specifically
• CASE technologies
• Repositories
• Profiling/discovery tools
• Data Quality engineering tools
• Appreciating the complete Data Quality life cycle
Similar to IT Agility: The Phenomenology of Virtualization, Consumerization, and Organizational Change (20)
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
IT Agility: The Phenomenology of Virtualization, Consumerization, and Organizational Change
1. Ted Love - IT Agility
IT Agility: The Phenomenology of
Virtualization, Consumerization, and Organizational Change
Theodore Love
Director of Technology
Phoenix Central School District
@ted_love
2. Ted Love - IT Agility
THOUGHT EXPERIMENT
• Shareholders decide that your
organization has been significantly falling
behind the competition and that the entire
business will have to be conducted
differently in the future in order to be
competitive
• The product will be created to new
standards within one year
• The new evaluation system will give each
employee a score out of 100 points –
based 60% on a 99 criterion rubric and
40% on the measurable profitability
added to the product by the employee
• The budget will be reduced, and
employment cuts will be made
Creative Commons Attribute:
http://www.flickr.com/photos/kanaka/
3. Ted Love - IT Agility
How should IT respond?
• Lead?
• Follow?
• Get out of the way?
• What would you have done
differently leading up to these
events?
Creative Commons Attribute:
http://www.flickr.com/photos/kanaka/
4. Ted Love - IT Agility
New York was awarded $700 million in funding from the
Federal Education Department’s “Race to the Top” in return
for: http://www.engageny.org
• New statewide curriculum based on the Common Core
standards
• Districts will create and administer Common Interim
Assessments (CIA) for Data Driven Instruction (DDI) and
http://www.corestandards.org
teachers will measure annual Student Learning Objectives
(SLO)
• New computer-based assessments from the Partnership for
Assessment of Readiness for College and Careers http://www.parcconline.org
(PARCC)
• NYSED is creating an Instructional Reporting and
Improvement System (IRIS) Education Data Portal (EDP)
• Revised Annual Professional Performance Review for
teachers (APPR)
• Fund school turnaround for the poorest performing schools Creative Commons Attribute:
http://www.flickr.com/photos/bruceclay/
5. Ted Love - IT Agility
Fundamental Belief #1
I believe that the biggest revolution of public education
since the formation of the central school district (1925)
is about to take place and that technology will play a
crucial role.
6. Ted Love - IT Agility
Fundamental Belief #2
I believe that IT teams can simultaneously meet and
exceed the ever increasing demands of our end-users
and do so in a way that is simpler and more efficient to
manage and maintain.
7. Ted Love - IT Agility
Phoenix Central School District 2009-present
Reduced IT staff
Reduced equipment and supplies budgets
Increased IT department responsibilities
Increased # of teacher and student workstations
Reduced power consumption
8. Ted Love - IT Agility
One Step at a Time
Capital Project (09,10) Application Virtualization
(ongoing)
Network redesign (09)
Virtual Desktops VDI (11)
Thin clients (09,12)
Server Virtualization (09,11)
Novell -> Microsoft (09)
User Profile Virtualization (11)
Remote Desktop Session
Host (RDSH) (09,10) Disaster Recovery (12)
Storage Area Network (09,11) WiFi (12)
9. Ted Love - IT Agility
“…we’re not VDI haters. We actually love VDI!
(Seriously!) What we don’t like is when VDI gets a
bad name when it fails because people try to use it
for the wrong reasons.” (83)
“If you look at the commonalities of why people
choose to use desktop virtualization you see that
they’re not trying to replace Windows and they’re
not trying to virtualize 100% of their desktops. That
means the even in the companies that have chosen
to implement desktop virtualization, there are still a
lot of traditional, physical Windows-based desktop
and laptops in their environment.” (132-133)
– Brian Madden
10. Ted Love - IT Agility
Goals for Phoenix Desktop Virtualization
Centralize management of desktops
Reduce footprint by having a lightweight end device
Consolidate and share compute resources
Benefit: flexibility of user device agnosticism
11. Ted Love - IT Agility
Effects of Desktop Virtualization
Desktop technicians become desktop architects
Better desktop management benefits all desktops (physical and
virtual)
Percentage of logged technician time spent on troubleshooting
went from 29.7% to 7.4% over five years
14. Ted Love - IT Agility
"U.S. public schools have been largely impervious to the productivity
gains that other sectors have realized from technology, for two main
reasons. First, until recently, they hadn't widely adopted technology:
Education ranked dead last, a 2002 Commerce Department study
reported, in deployment of technology relative to number of
employees. Second, when technology was deployed, it wasn't being
used to do anything different - a problem many industries have long
since confronted and resolved.“ Harvard Business Review, March 2012
15. Ted Love - IT Agility
• School of One in NYC gives each child an
individualized daily scheduled called their
"playlist“
• By October 2011 Khan Academy had 2600
videos and sees 39 million pageviews and 3.5
million unique visitors per month
(http://techcrunch.com/2011/10/19/khan-academy-triples-unique-users-to-3-5-million))
• Blackboard purchased by an investor group last
July for $1.64 billion
• The Software and Information Industry
Association (SIIA) and consultant John
Richards of cs4ed consulting estimated that the
edtech software market size is at approximately
$7.5 billion
(http://www.fastcoexist.com/1678918/marc-andreessen-on-the-potential-
Creative Commons Attribute:
promises-of-edtech-investments) http://www.flickr.com/photos/jodiejaye
16. Ted Love - IT Agility
@ASUSkySong Education Innovation Summit
April 16-18, 2012
17. Ted Love - IT Agility
#novaedu at Microsoft – Reston, VA
June 1-3, 2012
18. Ted Love - IT Agility
New Schools Venture Fund – Aspen Institute
#nsvfsummit
June 12-13, 2012
19. Ted Love - IT Agility
#launchedu at Microsoft – Mountain View, CA
June 12-13, 2012
20. Ted Love - IT Agility
https://docs.google.com/spreadsheet/ccc?key=
0Aj0vmJwi1Vq3dE9LX1M5MnFyTXhyZXFTZDY1bDZrZ0E
21. Ted Love - IT Agility
Education is going to look different and be delivered
differently.
Who is working with Principals and Superintendents
to navigate?
To be effective at the local level will require an IT team
who can operate with the agility to adapt and survive
within the fast pace of rapid change
OR… be outsourced entirely
Creative Commons Attribute: http://www.flickr.com/photos/roland_urbanek/
22. Ted Love - IT Agility
Creative Commons Attribute:
http://www.flickr.com/photos/kanaka/