University Campus: A Microcosm of
the Future
          Triangle InfoSeCon
           October 20, 2011

              Marc Hoit, PhD
           Vice Chancellor for IT
            NC State University
Projected Mobile Internet Use in 2015




Source: http://www.business2community.com/mobile-apps/video-
infographic-mobile-trends-dominate-the-internet-in-2015-048554
Source: http://gist.com/
Source: http://gist.com/
Source: http://gist.com/
Source: http://gigaom.com/2010/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/
Marc hoit   University Campus - Microcosm of the future
Marc hoit   University Campus - Microcosm of the future
A microcosm of the future
• Students – aggressive early adopters of
  cloud based solutions, mobile technology
  and all things new
• Administrative Staff –more predictable
  demand, reliable secure access and nimble
  support for radical changes in business
  requirements
• Faculty – independent, entrepreneurial with
  unique requirements and a focus on
  research, teaching and service
EDUCAUSE: Top-Ten IT Issues, 2011
1. Funding IT
2. Administrative/ERP/Information Systems
3. Teaching and Learning with Technology
4. Security
5. Mobile Technologies
6. Agility/Adaptability/Responsiveness
7. Governance, Portfolio/Project Management
8. Infrastructure/Cyberinfrastructure
9. Disaster Recovery / Business Continuity
10.Strategic Planning
NC State is a Small City
• 34,000 Student, 8,000 Faculty & Staff
   – 11 Colleges – each with departments
   – 57 centers & institutes
• $1.2 B annual expenditure budget
• Business focus: Education (training) & Research
   – Research: $361M annual expenditures
• 2,120 acres in size
   –   348 Buildings > 1000 sq ft
   –   14.2 million gross square feet
   –   1.2 million rentable square feet on Centennial Campus
   –   18.7 miles of paved roads
   –   72 residence halls housing 8,454
2010 Horizon Report - Trends
• The abundance of resources and relationships
  made easily accessible via the Internet is
  challenging our roles as educators in sense-
  making, coaching, and credentialing.
• People expect to be able to work, learn, and study
  whenever and wherever they want to.
• The technologies we use are increasingly cloud-
  based, and IT support are decentralized.
• The work of students is increasingly seen as
  collaborative resulting in more collaboration
  between departments
     http://www.nmc.org/pdf/2010-Horizon-Report.pdf
More Students Owned Laptops Than
 Other Devices in 2010




                                   http://chronicle.com/section/Almanac/536

 95% of students own a computer

 4% own only a desktop

© 2011 STUDENT MONITOR LLC
WIRELESS READING DEVICES OWNED
 More than one in
  seven (14%) own a
  wireless reading
                              iPad    8%
  device
 Among this 14%,           Kindle   3%
  nearly six in ten (57%)
  own an iPad while          Nook    2%
  one in five (21%) own
  a Kindle and one in       Galaxy   1%
  seven (14%) own a
  Nook
                            Xoom     1%
                   Sony eReader      1%
                   None of these           86%

© 2011 STUDENT MONITOR LLC
Internet Capable Handheld Devices
ECAR, 2010
Text Messaging is the Communication
Form of Choice for Most Students




http://chronicle.com/section/Almanac/536
NC State Residence Hall Survey, 2011

 80.00%
                   69.32%
 70.00%
 60.00%
 50.00%
 40.00%
 30.00%                                     24.60% 23.05% 25.06%
 20.00%
          11.70%
 10.00%                     7.86%                                  8.03%
                                    3.56%
  0.00%
2010 Horizon Report – Technologies to Watch
 • Within next 12 months:
    – Mobile computing
    – Open content
 • Within 2~3 years:
    – Electronic books
    – Simple augmented reality
 • Within 4~5 years:
    – Gesture based computing
    – Visual data analysis


    http://www.nmc.org/pdf/2010-Horizon-Report.pdf
Mobile internet usage
                      U.S. Mobile Internet Time by Category: May 2010
                                        Share of mobile              Share of mobile
                                      Internet Time based        Internet Time based on
                                       on total time at an       average time spent at a
    RANK        Mobile Sector         individual site-level*         category-level**
      1    E-Mail                 38.50%                       41.60%
      2    Social Networking      10.70%                       10.50%
           News & Current
      3
           Events                 7.20%                        4.40%
      4    Search                 6.30%                        7.10%
      5    Portals                4.60%                        11.60%
      6    Entertainment          4.30%                        3.30%
      7    Sports                 4.10%                        2.30%
      8    Music                  4.00%                        3.10%
      9    Videos/Movies**        3.00%                        2.00%
      10   Weather                2.80%                        2.80%
http://blog.nielsen.com/nielsenwire/online_mobile/how-americans-spend-mobile-
Personal Technology in the Workplace…


    It’s here...how to embrace and support it.
Instructional Technology and the Professoriate
or “the world is changing faster than you are”
• Technology causes disruptive change
   – Skype and the telecommunications industry;
     Professors are “Skyping” their students?
• We support enterprise tools, such as LMSs
  or even content capture
• Our challenge isn’t just “keeping up with the
  Jones’” but:
   – Allowing people to explore and us support
     technologies as they emerge, before they even
     get to a standardized/enterprise level.
Instructional Technology Sampler
• Enterprise: Learning Management Systems
  – Moodle, Blackboard, Sakai
  84% of colleges/universities use one [Eduventures.
  (June, 2009). Benchmarking Online Operations.
  Online Higher Educational Learning Collaborative.]
• Content Capture
Vs
• Emerging
  – Sharepoint (as LMS), Google Sites, Tumblr,
    Scoop.It,
University Mobile Initiative Committee
• Representation from central and distributed IT groups
• Acts as a mentor and facilitator for mobile projects on
  campus, including mobile web, mobile application
  development, and text messaging
• Responsible for the Apple Developer License for NC State
   – Released 3 applications into the Apple App Store
       • WolfWalk - A photographic guide to the history of North Carolina State
         University.
       • WolfMatch - A free Match 3 game from NC State Distance Education
       • On Campus - A location-based application exclusive to NC State
         University’s campus.
• Maintain http://m.ncsu.edu mobile website
   – Compatible with any mobile device with a web browser.
• Support the library’s initiatives with http://m.lib.ncsu.edu
Social Media - http://twitter.ncsu.edu
• Aggregates all of NC States (nearly 200) twitter accounts
  into a single feed.
• Collaboration:
   – Outreach Technology provides back-end integration with Twitter
   – University Communications provided user interface and design
• Outreach:
   – Source: https://github.com/jfaustin/Tweet-gater
   – Many universities have implemented the code at their school, giving
     NC State credit
• Training: Effective use Twitter to communicate
   – Slides: http://www.slideshare.net/jfaustin/tweeting-for-nc-state-
     university
Around COE for Students
• Computer Science department
  piloted using Android devices as
  platform to teach JAVA
  programming courses
• My Schedule application
  developed to deliver a student’s
  course schedule tied with map
  data
  – Ties into Engineering Maps data to
    locate course’s building
  – Provides instructor information and
    location from directory services
College of Engineering: iPad Study
                    • Five each faculty, staff, undergrads,
                      and graduate students given an
                      iPad for 3 months
                    • Asked to blog about their
                      experiences
                    • Email, web browsing, and social
                      media dominated top uses

• Many staff and faculty use for daily email, web
  browsing, and content consumption
• Most find it is NOT a full computer replacement
• Users will still come to you for support even if it is
  a personal device
College of Engineering: Phone vs. Tablet

• Important to understand the difference in
  utilization between smartphone and tablet
• Nielsen reports that 65% of tablet owners
  use their smartphones exactly the same
  amount before hand with only 13% reporting
  using it less
• 31% of users say they use a tablet over a
  PC/laptop because it is easy to carry take
  with you
What’s drives universities to the cloud?

• Cloud more likely for new services than to
  transition established services
• Individual faculty or students looking for the
  added flexibility and convenience
• Calls for increased IT reliability and access
• Timely access to the latest IT functionality
• Budget pressures
   – Outsourcing cost of development and maintenance of
     application code
My Most Used iPad Apps
• ActiveSync -> native email, calendar
• iAnnotate: PDF reader AND mark-up
• Penultimate: Note taking (written)

• Dropbox: integrated cloud storage for iPad
  (and others)
• FilesConnect: Connect to SMB (MS) network
  storage
• Jump: RDP Client
A growing area for NC State…
• Students and employees expect to access
  campus services from personally owned
  devices.
• Google Apps for Education is our messaging
  platform (faculty, staff & students)
• More use of cloud technology (e.g., Google,
  DropBox, etc.)
• More sensitive data diffusion and
  compliance legislation
• More diversity of devices and software
• Setting service expectations is crucial
Major OIT Projects
• Gmail for Students
   – Next phase to make improvements (general calendars, more use of
     sites, etc)
   – NextGen mail for Faculty & Staff – in transition
• Postini - Spam & Virus for Faculty & Staff
   – eDiscovery Retention: ALL email retained for 10 Years
• Managed Desktop Service
   – Provide desktop support with tiered pricing (partner, basic,
     extended)
• Combined Pricing Initiative
   –   New law requiring unified purchasing for UNC
   –   7 Standard configurations (laptops, desktops) + options
   –   3 vendors (Dell, HP, Lenovo) + Apple
   –   Exception process for special needs (expect to be <)
Major OIT Projects (continued)
• Web hosting
   – On-campus version of Cpanel type service with branded templates
     ($20/month)
• Classroom Capture Project
   – Purchased 50 classroom capture units – mostly installed
• Centralized Storage Project
   – Expand & enhance the centralized data storage & backup services
   – Working on archiving option to meet NSF & DoD requirement
• Identity and Access Management
   – Unified, authoritative, secure, efficient and cost-effective IAM
     environment that meets current and future needs & legal
     requirements
• University Data Mart
   – Developing a data mart, dashboard, and query tools to provide
     easily accessible, decision-support information for NC State
Managed & Desktop Support
4 key changes to improve campus support:
  1. OIT purchased SCCM (PCs) and Casper Suite (Macs)
     •   Unified management tools for campus
     •   Developed by task force and Campus IT Directors (CITD)
  2. Desktop management offering
     • Developed true cost per PC for support (at 4 levels)
     • Existing (administrative) customers will see change:
         – Same service level as past for default (other options available)
         – In 2011, we will be transitioning to a new desktop configuration with additional
           file space and Windows 7.
     • New customers welcomed
  3. IT Support personnel in-sourcing option (from OIT)
  4. Combined Pricing Initiative (CPI)
     •   Marketplace and standard PC’s – across UNC
OIT Managed Desktop Cost Model
                                                                              Support Service Levels - Year 1 (FY '10-'11)
                                                               Partnered                    Extended       Premium                         Additional
    Desktop Support Service Cost Model:                         Support    Basic Support     Support       Support           Lab Support   Machines
Annual Charge Per User/Workstation:                             $244.00       $497.00        $682.00        $948.00            $920.00      $252.00
Monthly Installment of annual charge:                           $20.33        $41.42         $56.83          $79.00            $76.67       $21.00
Support Service Includes the Following:
Secure and reliable computing environment                         √             √               √              √                 √             √
Immediate, remote help desk support/assistance                    √             √               √              √                 √             √
User home directory (5GB per user)                                √             √               √              √
Departmental share (Tiered Storage Rate)                          √             √               √              √
Productivity Software (Windows OS, Office, Adobe
Pro)                                                              √             √               √              √                 √             √
Application Packaging and Delivery                                √             √               √              √                 √             √
Desktop patching                                                  √             √               √              √                 √             √
Email support                                                     √             √               √              √                 √             √
End-user training                                                 √             √               √              √                 √             √
Tier 2 Remote Application and Desktop Support                                   √               √              √                 √             √
Network connectivity support                                                    √               √              √                 √             √
Network printer/copier/scanner support                                          √               √              √                 √             √
On-site desktop support                                                                         √              √                 √
Hardware warranty repairs                                                                       √              √                 √
Loaner workstations                                                                             √              √                 √

Workstation Allowance of $800 (4 year refresh cycle)                                                           √                 √
End-user after hours support (6 pm to 10 pm)                                                                   √                 √
Guaranteed 60-minute on-site support                                                                           √                 √
Direct access to support staff                                                                                 √                 √

4-hour downtime guarantee (for hardware problems)                                                              √                 √
Lab Application Packaging                                                                                                        √
Mixing Application on a Single Device
     Causes Security Challenges




How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General
Manager, Endpoint Security, McAfee, Inc., 2010
Sensitive Data – Compliance & Regulation
• As regulation grows – so does compliance
  workload
   – SOX/FISMA, FERPA/ HEOA, NC Id Theft, HIPAA, PCI,
     GLB
   – Open Records Laws (Public institutions)
• Public sensitivity and potential for reputational
  harm
• Fines and penalties - growing
• Personal use & privacy
   – Combined use devices (personal and work)
   – Records access and retention
How We Currently Secure
• Anti-malware             • Firewalls
  – Email and computers      – Limited on Campus
    – separate solutions       perimeter
  – Cloud solutions for      – Stronger control on
    email                      server environment
  – Centrally managed      • Server hardening
• Manual analysis with     • Intrusion detection
  scripts                    systems
  – Network & server         – Network
    logs                     – Endpoint and
  – Phishing                   server Host IPS
  – Malware
Future protection directions
•   End points become the new           •   More automation and
    perimeter                               consolidation of protection
     – Web browsers anywhere…                – Intrusion Prevention Systems
     – Malware prevention on                 – Security Incident Event
        endpoints (beyond AV…)                 Monitoring
•   Match levels of security to              – Log correlation
    sensitivity of data                      – Advanced malware control
    •   Developing guides and data           – Data Leakage Protection
        sensitivity framework
                                        •   Protect data with encryption
•   Authentication
                                             – All sensitive data storage
     – Multi-factor (Passwords passé)
                                                 • Mobile device storage
     – Federated SSO
                                                 • Email (Manual or Automated
•   More security guidelines and                   Policy)
    awareness training                       – Communications
     – Recognize services will be               • SSL and VPN
       used
     – Focus on keeping data safe
       through educated use
Top Areas of Effort in IT Security

• Compliance with PCI DSS v2.0
• Data Sensitivity Framework
• Mobile Device Security Guidelines
• Guidelines for cloud services (Dropbox, etc)
• Red Lambda - DMCA monitoring
• Research data security & compliance with
  grants and federal requirements
• Students use of technology - must keep up
Risk Based Strategy for Effort


                                 Decision on Effort to Particular Solution
                             5
 Probability of Occurrence




                             4
                             3
                             2
                             1
                             0
                                 Low Impact                            High Impact
                                                Impact to Reputation
Data Classification Statement Matrix
Level       Risk     Regulation Financial      Reputation   Business Other
High        Two of   Violation   Significant   Serious      Serious
Red-Hot     Two of   Multiple    Significant   Serious      Serious   Litigation
Moderate    One of   Violation   Some                       Some      Adverse
Normal      No                                                        Access
            major                                                     control
Not         None
sensitive
Mobile and Personal Devices:
 A key support concept…

   how to access services, not how to use
                the device.
Level of Criticality in Managing Consumer Devices
                               In a McAfee survey of
                               233 IT decision-makers,
                               45 percent of the
                               respondents said that
                               managing consumer-
                               owned devices and
                               related technologies
                               within the enterprise
                               network is “critical.”

                               How Can You Prepare for the Consumerization
                               of IT? by Candace Worley, Senior Vice President
                               and General Manager, Endpoint Security, McAfee,
                               Inc., 2010
Security for Personal Mobile Devices
• Multiple new operating systems – Android, iOS,
  Windows mobile, etc.
• Software and hardware technology changing rapidly
• Thousands of commercial apps – limited certification of
  distributed apps
• Sensitive data stored on mobile devices should be multi-
  level encrypted
• Institution may need to “wipe” device when employee
  leaves
• Access control – passwords (minimum) & multi factor
Is There Safety in the Cloud?
• High degree of trust             • Regulations still apply to
  needed since control               the cloud systems
  delegated, consider                   – Handle most with
  long-term viability                     contract:
                                            • Access, location, indemnity,
• Cloud services can be                       breach response, etc
  more secure than
                                   • Encrypt all sensitive data
  current offerings
                                     using multiple levels
• Integrate with
                                   • Ensure authorization and
  institutions Identity
                                     tools to investigate
  Management
                                     breaches
      http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterly
      MagazineVolum/IsThereSafetyintheCloud/206543
Key Business Decisions…
• Can employees use personally-owned
  devices for their work?
  – Home computers?
  – Tablets?
  – Do we have a choice?
• If so, what are your requirements of them?
  – Security standards
  – Data retention requirements
  – Data compliance requirements
Who is responsible?
University responsibility        Client responsibility
• Establish device standards     • Ensure that device is
  (browsers, mobile                functional—can it connect
  platform/OS, etc.) receiving     to services off-campus?
  full support and
  communicate to clients.
                                 • What data is on the
                                   device and is it secure?
• Provide configuration
  information for key            • Report loss/theft of the
  University-provided services     device quickly.
  (email, calendar, etc.)
• Support connections to key
  services
Moving forward…
• Mobile, multiple and personal devices are
  here to stay.
• New services should be designed with
  personal & mobile devices in mind.
• Move to functional requirements and support
• In the workplace, don’t confuse workplace
  behavior with technology.
  – Establish requirements on a functional level
  – Security, support and access will be more
    distributed and less “controlled”
"It is not necessary to change.
  Survival is not mandatory."

     ~W. Edwards Deming~

More Related Content

PPTX
The Mobile Landscape, Mobile Literacy, and Libraries 2014
PPTX
Implications of a Mobile Computing World for Academic Libraries and Their Users
PDF
Connecting Caribbean Classrooms and Communities - CTEC 2016
PDF
TaLE-Week-7
PPTX
Using Mobile Devices to Build Community in the Classroom
PPT
Cybersafety
PDF
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
PDF
LIASA Pre-conference Workshop 3: Mobile Literacy
The Mobile Landscape, Mobile Literacy, and Libraries 2014
Implications of a Mobile Computing World for Academic Libraries and Their Users
Connecting Caribbean Classrooms and Communities - CTEC 2016
TaLE-Week-7
Using Mobile Devices to Build Community in the Classroom
Cybersafety
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
LIASA Pre-conference Workshop 3: Mobile Literacy

What's hot (20)

PDF
Mobile technologies in libraries
PPT
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
PPT
Breaking down the barriers
PPTX
Cwpa mobile-091712x2
PDF
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
PDF
English project
PPTX
Singapore iatul keynote
PDF
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
PPTX
Marketing the Mobile Part of Your Library
PDF
USE OF MOBILE TECHNOLOGY IN LIBRARY AND INFORMATION SERVICES
PPTX
gmac2011
DOCX
WORST ACADEMIC WRITING
DOCX
Literature review
PPTX
Teaching with Technology: Social Media Tools and Mobile Apps for Secondary S...
PDF
Going Mobile an Opportunity and Challenge for Higher Education
PDF
Managing Screen Time - The Student's Perspective
PPT
Matias et al. (2013) Sloan-C
PPT
Banning or Embracing of Mobile Technology
DOC
Acceptable Internet Use In Schools
PPT
Web 2.0 and Education
Mobile technologies in libraries
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
Breaking down the barriers
Cwpa mobile-091712x2
Application of Mobile Computing In Tertiary Institutions: Case Study of Midla...
English project
Singapore iatul keynote
Prospective U.S. Mathematics Teachers' Engagement in Handheld Cellular Device...
Marketing the Mobile Part of Your Library
USE OF MOBILE TECHNOLOGY IN LIBRARY AND INFORMATION SERVICES
gmac2011
WORST ACADEMIC WRITING
Literature review
Teaching with Technology: Social Media Tools and Mobile Apps for Secondary S...
Going Mobile an Opportunity and Challenge for Higher Education
Managing Screen Time - The Student's Perspective
Matias et al. (2013) Sloan-C
Banning or Embracing of Mobile Technology
Acceptable Internet Use In Schools
Web 2.0 and Education
Ad

Viewers also liked (8)

PDF
Lenny zeltser social engineering attacks
PDF
EYOilGas_Unlocking the potential_FINAL_June2013
PDF
Inste.es Beta v1.3 UX / UI Design
PPTX
Janet M. Russeau's Presentation for EDIM 510
PPTX
Anggota kelompok
DOCX
Fail panitia
PPTX
Women’s art
Lenny zeltser social engineering attacks
EYOilGas_Unlocking the potential_FINAL_June2013
Inste.es Beta v1.3 UX / UI Design
Janet M. Russeau's Presentation for EDIM 510
Anggota kelompok
Fail panitia
Women’s art
Ad

Similar to Marc hoit University Campus - Microcosm of the future (20)

PDF
Mobile Web Development with MWF
PPTX
Course tech conf_2013_ppt_mobile_technology_bowers-miller
PPTX
Course Tech 2013, Gina M. Bowers-Miller, Using Mobile Technology in the Class...
PDF
Postdesktop
PDF
Any Time, Anywhere, Any Device (ISASA)
PDF
Mobile Learning Presentation - ECOO 2008
PPTX
indiana library federation reference conference keynote
ZIP
WCSA Mobile Learning K-12
PPTX
Student perspectives on assistive technology
PDF
iExtension: How specialist, staff, and agents are utilizing the iPad acenetc ...
PDF
Going mobile: Web Self-Service for Students
PDF
Mobile 101 for Higher Education
PDF
The Future Friendly Campus (Workshop Edition)
PPTX
Student perspectives on assistive technology
KEY
LTMS 510 Mobile Technologies
PDF
Developing Staff Competencies in Emerging Technologies
KEY
GSA Boston 2011
PPT
AICPA Leadership Retreat - Technology
PDF
Content Strategy Across Connected Devices
PDF
Mobile Technology and the Academic Library
Mobile Web Development with MWF
Course tech conf_2013_ppt_mobile_technology_bowers-miller
Course Tech 2013, Gina M. Bowers-Miller, Using Mobile Technology in the Class...
Postdesktop
Any Time, Anywhere, Any Device (ISASA)
Mobile Learning Presentation - ECOO 2008
indiana library federation reference conference keynote
WCSA Mobile Learning K-12
Student perspectives on assistive technology
iExtension: How specialist, staff, and agents are utilizing the iPad acenetc ...
Going mobile: Web Self-Service for Students
Mobile 101 for Higher Education
The Future Friendly Campus (Workshop Edition)
Student perspectives on assistive technology
LTMS 510 Mobile Technologies
Developing Staff Competencies in Emerging Technologies
GSA Boston 2011
AICPA Leadership Retreat - Technology
Content Strategy Across Connected Devices
Mobile Technology and the Academic Library

Recently uploaded (20)

PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Internet of Everything -Basic concepts details
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Co-training pseudo-labeling for text classification with support vector machi...
Connector Corner: Transform Unstructured Documents with Agentic Automation
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
Convolutional neural network based encoder-decoder for efficient real-time ob...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Electrocardiogram sequences data analytics and classification using unsupervi...
Auditboard EB SOX Playbook 2023 edition.
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Basics of Cloud Computing - Cloud Ecosystem
Training Program for knowledge in solar cell and solar industry
Internet of Everything -Basic concepts details
Module 1 Introduction to Web Programming .pptx
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC

Marc hoit University Campus - Microcosm of the future

  • 1. University Campus: A Microcosm of the Future Triangle InfoSeCon October 20, 2011 Marc Hoit, PhD Vice Chancellor for IT NC State University
  • 2. Projected Mobile Internet Use in 2015 Source: http://www.business2community.com/mobile-apps/video- infographic-mobile-trends-dominate-the-internet-in-2015-048554
  • 9. A microcosm of the future • Students – aggressive early adopters of cloud based solutions, mobile technology and all things new • Administrative Staff –more predictable demand, reliable secure access and nimble support for radical changes in business requirements • Faculty – independent, entrepreneurial with unique requirements and a focus on research, teaching and service
  • 10. EDUCAUSE: Top-Ten IT Issues, 2011 1. Funding IT 2. Administrative/ERP/Information Systems 3. Teaching and Learning with Technology 4. Security 5. Mobile Technologies 6. Agility/Adaptability/Responsiveness 7. Governance, Portfolio/Project Management 8. Infrastructure/Cyberinfrastructure 9. Disaster Recovery / Business Continuity 10.Strategic Planning
  • 11. NC State is a Small City • 34,000 Student, 8,000 Faculty & Staff – 11 Colleges – each with departments – 57 centers & institutes • $1.2 B annual expenditure budget • Business focus: Education (training) & Research – Research: $361M annual expenditures • 2,120 acres in size – 348 Buildings > 1000 sq ft – 14.2 million gross square feet – 1.2 million rentable square feet on Centennial Campus – 18.7 miles of paved roads – 72 residence halls housing 8,454
  • 12. 2010 Horizon Report - Trends • The abundance of resources and relationships made easily accessible via the Internet is challenging our roles as educators in sense- making, coaching, and credentialing. • People expect to be able to work, learn, and study whenever and wherever they want to. • The technologies we use are increasingly cloud- based, and IT support are decentralized. • The work of students is increasingly seen as collaborative resulting in more collaboration between departments http://www.nmc.org/pdf/2010-Horizon-Report.pdf
  • 13. More Students Owned Laptops Than Other Devices in 2010 http://chronicle.com/section/Almanac/536  95% of students own a computer  4% own only a desktop © 2011 STUDENT MONITOR LLC
  • 14. WIRELESS READING DEVICES OWNED  More than one in seven (14%) own a wireless reading iPad 8% device  Among this 14%, Kindle 3% nearly six in ten (57%) own an iPad while Nook 2% one in five (21%) own a Kindle and one in Galaxy 1% seven (14%) own a Nook Xoom 1% Sony eReader 1% None of these 86% © 2011 STUDENT MONITOR LLC
  • 15. Internet Capable Handheld Devices ECAR, 2010
  • 16. Text Messaging is the Communication Form of Choice for Most Students http://chronicle.com/section/Almanac/536
  • 17. NC State Residence Hall Survey, 2011 80.00% 69.32% 70.00% 60.00% 50.00% 40.00% 30.00% 24.60% 23.05% 25.06% 20.00% 11.70% 10.00% 7.86% 8.03% 3.56% 0.00%
  • 18. 2010 Horizon Report – Technologies to Watch • Within next 12 months: – Mobile computing – Open content • Within 2~3 years: – Electronic books – Simple augmented reality • Within 4~5 years: – Gesture based computing – Visual data analysis http://www.nmc.org/pdf/2010-Horizon-Report.pdf
  • 19. Mobile internet usage U.S. Mobile Internet Time by Category: May 2010 Share of mobile Share of mobile Internet Time based Internet Time based on on total time at an average time spent at a RANK Mobile Sector individual site-level* category-level** 1 E-Mail 38.50% 41.60% 2 Social Networking 10.70% 10.50% News & Current 3 Events 7.20% 4.40% 4 Search 6.30% 7.10% 5 Portals 4.60% 11.60% 6 Entertainment 4.30% 3.30% 7 Sports 4.10% 2.30% 8 Music 4.00% 3.10% 9 Videos/Movies** 3.00% 2.00% 10 Weather 2.80% 2.80% http://blog.nielsen.com/nielsenwire/online_mobile/how-americans-spend-mobile-
  • 20. Personal Technology in the Workplace… It’s here...how to embrace and support it.
  • 21. Instructional Technology and the Professoriate or “the world is changing faster than you are” • Technology causes disruptive change – Skype and the telecommunications industry; Professors are “Skyping” their students? • We support enterprise tools, such as LMSs or even content capture • Our challenge isn’t just “keeping up with the Jones’” but: – Allowing people to explore and us support technologies as they emerge, before they even get to a standardized/enterprise level.
  • 22. Instructional Technology Sampler • Enterprise: Learning Management Systems – Moodle, Blackboard, Sakai 84% of colleges/universities use one [Eduventures. (June, 2009). Benchmarking Online Operations. Online Higher Educational Learning Collaborative.] • Content Capture Vs • Emerging – Sharepoint (as LMS), Google Sites, Tumblr, Scoop.It,
  • 23. University Mobile Initiative Committee • Representation from central and distributed IT groups • Acts as a mentor and facilitator for mobile projects on campus, including mobile web, mobile application development, and text messaging • Responsible for the Apple Developer License for NC State – Released 3 applications into the Apple App Store • WolfWalk - A photographic guide to the history of North Carolina State University. • WolfMatch - A free Match 3 game from NC State Distance Education • On Campus - A location-based application exclusive to NC State University’s campus. • Maintain http://m.ncsu.edu mobile website – Compatible with any mobile device with a web browser. • Support the library’s initiatives with http://m.lib.ncsu.edu
  • 24. Social Media - http://twitter.ncsu.edu • Aggregates all of NC States (nearly 200) twitter accounts into a single feed. • Collaboration: – Outreach Technology provides back-end integration with Twitter – University Communications provided user interface and design • Outreach: – Source: https://github.com/jfaustin/Tweet-gater – Many universities have implemented the code at their school, giving NC State credit • Training: Effective use Twitter to communicate – Slides: http://www.slideshare.net/jfaustin/tweeting-for-nc-state- university
  • 25. Around COE for Students • Computer Science department piloted using Android devices as platform to teach JAVA programming courses • My Schedule application developed to deliver a student’s course schedule tied with map data – Ties into Engineering Maps data to locate course’s building – Provides instructor information and location from directory services
  • 26. College of Engineering: iPad Study • Five each faculty, staff, undergrads, and graduate students given an iPad for 3 months • Asked to blog about their experiences • Email, web browsing, and social media dominated top uses • Many staff and faculty use for daily email, web browsing, and content consumption • Most find it is NOT a full computer replacement • Users will still come to you for support even if it is a personal device
  • 27. College of Engineering: Phone vs. Tablet • Important to understand the difference in utilization between smartphone and tablet • Nielsen reports that 65% of tablet owners use their smartphones exactly the same amount before hand with only 13% reporting using it less • 31% of users say they use a tablet over a PC/laptop because it is easy to carry take with you
  • 28. What’s drives universities to the cloud? • Cloud more likely for new services than to transition established services • Individual faculty or students looking for the added flexibility and convenience • Calls for increased IT reliability and access • Timely access to the latest IT functionality • Budget pressures – Outsourcing cost of development and maintenance of application code
  • 29. My Most Used iPad Apps • ActiveSync -> native email, calendar • iAnnotate: PDF reader AND mark-up • Penultimate: Note taking (written) • Dropbox: integrated cloud storage for iPad (and others) • FilesConnect: Connect to SMB (MS) network storage • Jump: RDP Client
  • 30. A growing area for NC State… • Students and employees expect to access campus services from personally owned devices. • Google Apps for Education is our messaging platform (faculty, staff & students) • More use of cloud technology (e.g., Google, DropBox, etc.) • More sensitive data diffusion and compliance legislation • More diversity of devices and software • Setting service expectations is crucial
  • 31. Major OIT Projects • Gmail for Students – Next phase to make improvements (general calendars, more use of sites, etc) – NextGen mail for Faculty & Staff – in transition • Postini - Spam & Virus for Faculty & Staff – eDiscovery Retention: ALL email retained for 10 Years • Managed Desktop Service – Provide desktop support with tiered pricing (partner, basic, extended) • Combined Pricing Initiative – New law requiring unified purchasing for UNC – 7 Standard configurations (laptops, desktops) + options – 3 vendors (Dell, HP, Lenovo) + Apple – Exception process for special needs (expect to be <)
  • 32. Major OIT Projects (continued) • Web hosting – On-campus version of Cpanel type service with branded templates ($20/month) • Classroom Capture Project – Purchased 50 classroom capture units – mostly installed • Centralized Storage Project – Expand & enhance the centralized data storage & backup services – Working on archiving option to meet NSF & DoD requirement • Identity and Access Management – Unified, authoritative, secure, efficient and cost-effective IAM environment that meets current and future needs & legal requirements • University Data Mart – Developing a data mart, dashboard, and query tools to provide easily accessible, decision-support information for NC State
  • 33. Managed & Desktop Support 4 key changes to improve campus support: 1. OIT purchased SCCM (PCs) and Casper Suite (Macs) • Unified management tools for campus • Developed by task force and Campus IT Directors (CITD) 2. Desktop management offering • Developed true cost per PC for support (at 4 levels) • Existing (administrative) customers will see change: – Same service level as past for default (other options available) – In 2011, we will be transitioning to a new desktop configuration with additional file space and Windows 7. • New customers welcomed 3. IT Support personnel in-sourcing option (from OIT) 4. Combined Pricing Initiative (CPI) • Marketplace and standard PC’s – across UNC
  • 34. OIT Managed Desktop Cost Model Support Service Levels - Year 1 (FY '10-'11) Partnered Extended Premium Additional Desktop Support Service Cost Model: Support Basic Support Support Support Lab Support Machines Annual Charge Per User/Workstation: $244.00 $497.00 $682.00 $948.00 $920.00 $252.00 Monthly Installment of annual charge: $20.33 $41.42 $56.83 $79.00 $76.67 $21.00 Support Service Includes the Following: Secure and reliable computing environment √ √ √ √ √ √ Immediate, remote help desk support/assistance √ √ √ √ √ √ User home directory (5GB per user) √ √ √ √ Departmental share (Tiered Storage Rate) √ √ √ √ Productivity Software (Windows OS, Office, Adobe Pro) √ √ √ √ √ √ Application Packaging and Delivery √ √ √ √ √ √ Desktop patching √ √ √ √ √ √ Email support √ √ √ √ √ √ End-user training √ √ √ √ √ √ Tier 2 Remote Application and Desktop Support √ √ √ √ √ Network connectivity support √ √ √ √ √ Network printer/copier/scanner support √ √ √ √ √ On-site desktop support √ √ √ Hardware warranty repairs √ √ √ Loaner workstations √ √ √ Workstation Allowance of $800 (4 year refresh cycle) √ √ End-user after hours support (6 pm to 10 pm) √ √ Guaranteed 60-minute on-site support √ √ Direct access to support staff √ √ 4-hour downtime guarantee (for hardware problems) √ √ Lab Application Packaging √
  • 35. Mixing Application on a Single Device Causes Security Challenges How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General Manager, Endpoint Security, McAfee, Inc., 2010
  • 36. Sensitive Data – Compliance & Regulation • As regulation grows – so does compliance workload – SOX/FISMA, FERPA/ HEOA, NC Id Theft, HIPAA, PCI, GLB – Open Records Laws (Public institutions) • Public sensitivity and potential for reputational harm • Fines and penalties - growing • Personal use & privacy – Combined use devices (personal and work) – Records access and retention
  • 37. How We Currently Secure • Anti-malware • Firewalls – Email and computers – Limited on Campus – separate solutions perimeter – Cloud solutions for – Stronger control on email server environment – Centrally managed • Server hardening • Manual analysis with • Intrusion detection scripts systems – Network & server – Network logs – Endpoint and – Phishing server Host IPS – Malware
  • 38. Future protection directions • End points become the new • More automation and perimeter consolidation of protection – Web browsers anywhere… – Intrusion Prevention Systems – Malware prevention on – Security Incident Event endpoints (beyond AV…) Monitoring • Match levels of security to – Log correlation sensitivity of data – Advanced malware control • Developing guides and data – Data Leakage Protection sensitivity framework • Protect data with encryption • Authentication – All sensitive data storage – Multi-factor (Passwords passé) • Mobile device storage – Federated SSO • Email (Manual or Automated • More security guidelines and Policy) awareness training – Communications – Recognize services will be • SSL and VPN used – Focus on keeping data safe through educated use
  • 39. Top Areas of Effort in IT Security • Compliance with PCI DSS v2.0 • Data Sensitivity Framework • Mobile Device Security Guidelines • Guidelines for cloud services (Dropbox, etc) • Red Lambda - DMCA monitoring • Research data security & compliance with grants and federal requirements • Students use of technology - must keep up
  • 40. Risk Based Strategy for Effort Decision on Effort to Particular Solution 5 Probability of Occurrence 4 3 2 1 0 Low Impact High Impact Impact to Reputation
  • 41. Data Classification Statement Matrix Level Risk Regulation Financial Reputation Business Other High Two of Violation Significant Serious Serious Red-Hot Two of Multiple Significant Serious Serious Litigation Moderate One of Violation Some Some Adverse Normal No Access major control Not None sensitive
  • 42. Mobile and Personal Devices: A key support concept… how to access services, not how to use the device.
  • 43. Level of Criticality in Managing Consumer Devices In a McAfee survey of 233 IT decision-makers, 45 percent of the respondents said that managing consumer- owned devices and related technologies within the enterprise network is “critical.” How Can You Prepare for the Consumerization of IT? by Candace Worley, Senior Vice President and General Manager, Endpoint Security, McAfee, Inc., 2010
  • 44. Security for Personal Mobile Devices • Multiple new operating systems – Android, iOS, Windows mobile, etc. • Software and hardware technology changing rapidly • Thousands of commercial apps – limited certification of distributed apps • Sensitive data stored on mobile devices should be multi- level encrypted • Institution may need to “wipe” device when employee leaves • Access control – passwords (minimum) & multi factor
  • 45. Is There Safety in the Cloud? • High degree of trust • Regulations still apply to needed since control the cloud systems delegated, consider – Handle most with long-term viability contract: • Access, location, indemnity, • Cloud services can be breach response, etc more secure than • Encrypt all sensitive data current offerings using multiple levels • Integrate with • Ensure authorization and institutions Identity tools to investigate Management breaches http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterly MagazineVolum/IsThereSafetyintheCloud/206543
  • 46. Key Business Decisions… • Can employees use personally-owned devices for their work? – Home computers? – Tablets? – Do we have a choice? • If so, what are your requirements of them? – Security standards – Data retention requirements – Data compliance requirements
  • 47. Who is responsible? University responsibility Client responsibility • Establish device standards • Ensure that device is (browsers, mobile functional—can it connect platform/OS, etc.) receiving to services off-campus? full support and communicate to clients. • What data is on the device and is it secure? • Provide configuration information for key • Report loss/theft of the University-provided services device quickly. (email, calendar, etc.) • Support connections to key services
  • 48. Moving forward… • Mobile, multiple and personal devices are here to stay. • New services should be designed with personal & mobile devices in mind. • Move to functional requirements and support • In the workplace, don’t confuse workplace behavior with technology. – Establish requirements on a functional level – Security, support and access will be more distributed and less “controlled”
  • 49. "It is not necessary to change. Survival is not mandatory." ~W. Edwards Deming~