community briefing general update –don peterson day—tomorrow, november 22 nd –student town...
Post on 15-Jan-2016
217 views
TRANSCRIPT
Community BriefingCommunity Briefing
General UpdateGeneral Update– Don Peterson Day—Tomorrow, November 22Don Peterson Day—Tomorrow, November 22ndnd – Student Town Meeting—December 6Student Town Meeting—December 6thth – Student Recruitment—Class of 2011Student Recruitment—Class of 2011– New Residence Hall PlanningNew Residence Hall Planning– 19 New Faculty Positions19 New Faculty Positions– FY08 Budget DevelopmentFY08 Budget Development– Life Sciences Building Grand Opening– Sept 17-21Life Sciences Building Grand Opening– Sept 17-21stst
Information Technology UpdateInformation Technology Update
Information TechnologyInformation Technology
MissionThe IT Division partners with
faculty, students, and staff in the quest for knowledge, applying the
power of technology to unite people and content anytime, anyplace.
IT AgendaIT Agenda
Information Literacy – Helen ShusterInformation Literacy – Helen Shuster
Collaboration Resources – Mary Beth HarrityCollaboration Resources – Mary Beth Harrity
Protecting Intellectual Property and Identity – Protecting Intellectual Property and Identity – Sean O’ConnorSean O’Connor
Working Remotely – Ben ThompsonWorking Remotely – Ben Thompson
Computing Resources – Sia NajafiComputing Resources – Sia Najafi
Major Projects – Allan JohannesenMajor Projects – Allan Johannesen
Information Access; Q&A – Tom LynchInformation Access; Q&A – Tom Lynch
Information LiteracyInformation Literacy
An information literate individual is able to:An information literate individual is able to:A.A. Find and access information effectively & Find and access information effectively &
efficientlyefficientlyB.B. Evaluate information + source criticallyEvaluate information + source criticallyC.C. Use information effectively to accomplish Use information effectively to accomplish
specific purposespecific purposeD.D. Understand economic, legal, social Understand economic, legal, social
issues surrounding use of informationissues surrounding use of informationE.E. All of the aboveAll of the above
Information LiteracyInformation Literacy
Library Library – 248 sessions, 3049 individuals in ‘06248 sessions, 3049 individuals in ‘06– Individual IQP project groups Individual IQP project groups – Course related developed with facultyCourse related developed with faculty
Library and ATCLibrary and ATC– Joint Liaison program with academic depts.Joint Liaison program with academic depts.
2 person teams – updates and assistance2 person teams – updates and assistanceConduit to all IT services and resourcesConduit to all IT services and resources
Information LiteracyInformation Literacy
Technology LiteracyTechnology Literacy
Software Applications trainingSoftware Applications training
– Consultations for individuals and groupsConsultations for individuals and groups
Helpdesk supportHelpdesk supportScientific/Engineering software trainingScientific/Engineering software training– Matlab, Fluent, AnsysMatlab, Fluent, Ansys– 90 lectures, 400 attendees, 9 departments90 lectures, 400 attendees, 9 departments
Information LiteracyInformation Literacy
IT online contentIT online content– Web pages, video clips, tutorialsWeb pages, video clips, tutorials– http://www.wpi.edu/Academics/Library/Help/http://www.wpi.edu/Academics/Library/Help/– http://www.wpi.edu/Academics/CCC/Help/Services/http://www.wpi.edu/Academics/CCC/Help/Services/– http://www.wpi.edu/Academics/ATC/Instruction/http://www.wpi.edu/Academics/ATC/Instruction/
Information LiteracyInformation Literacy
Librarians have NOT assisted users on Librarians have NOT assisted users on which of the following areas recently?which of the following areas recently?
A.A. Mobile source air pollutionMobile source air pollution
B.B. Stadium safety and constructionStadium safety and construction
C.C. Bile and gastric juicesBile and gastric juices
D.D. Historical architecture in MassachusettsHistorical architecture in Massachusetts
E.E. Coriolis effect in the hemispheric flushing Coriolis effect in the hemispheric flushing of toiletsof toilets
Collaboration ResourcesCollaboration Resources
Click picture to play video
Collaboration ResourcesCollaboration Resources
Web conferencing toolsWeb conferencing tools– InterwiseInterwise iMeetingiMeeting- -
Features include application Features include application sharing, whiteboard, polling, sharing, whiteboard, polling, with audio and low-level videowith audio and low-level video
– Partnering with ECE Partnering with ECE department to create shared department to create shared IP-based video conferencing IP-based video conferencing room in AK (available in Jan. room in AK (available in Jan. 2007)2007)
Click picture to play video
Collaboration ResourcesCollaboration Resources
Teaching with Technology Teaching with Technology CollaboratoryCollaboratory
– Used by 222 organizations last yearUsed by 222 organizations last year
Access GridAccess Grid– Node in Morgan HallNode in Morgan Hall– Personal Node optionPersonal Node option
Protecting IP and IdentityProtecting IP and Identity
Network SecurityNetwork SecurityFirewallFirewallIntrusion Detection SystemIntrusion Detection SystemTripwireTripwireAnti-virus softwareAnti-virus softwareE-mail spamE-mail spamPolicies – ISCP, Data SecurityPolicies – ISCP, Data SecuritySystem patchingSystem patching
Note: IP = Intellectual PropertyNote: IP = Intellectual Property
Attack QuestionAttack Question
How many per day?How many per day?
AA
BB
CC
DD
EE
PoliciesPolicies
Information Security Compliance ProjectInformation Security Compliance Project– Covers seven federal laws on data protectionCovers seven federal laws on data protection– ‘‘Information Security at WPI’ bookletInformation Security at WPI’ booklet– Published and distributed in JulyPublished and distributed in July
Network Security PolicyNetwork Security Policy– Defines roles and responsibilities for securing the WPI Defines roles and responsibilities for securing the WPI
networknetwork
Data Security Project (In Progress)Data Security Project (In Progress)– Define roles and responsibilities for securing business Define roles and responsibilities for securing business
data, personal records, and research.data, personal records, and research.
http://www.wpi.edu/Academics/CCC/Policies/http://www.wpi.edu/Academics/CCC/Policies/
Network SecurityNetwork Security
Firewall Firewall – Used at network perimeter for blocking Used at network perimeter for blocking
commonly vulnerable services and for commonly vulnerable services and for temporary threats (Denial of Service attacks, temporary threats (Denial of Service attacks, etc).etc).
– IT managed desktop computers also have IT managed desktop computers also have firewallsfirewalls
Intrusion Detection System Intrusion Detection System – Monitors network traffic both the perimeter Monitors network traffic both the perimeter
and internally for system exploit attempts.and internally for system exploit attempts.
System SecuritySystem Security
Server SecurityServer Security– TripwireTripwire– Anti-virus softwareAnti-virus software
Desktop SecurityDesktop Security– E-mail spam markingE-mail spam marking– Anti-virus softwareAnti-virus software
System patchingSystem patching– WSUS for Microsoft softwareWSUS for Microsoft software– On-campus Fedora Linux mirrorsOn-campus Fedora Linux mirrors
Working RemotelyWorking Remotely
If you work with information when away from If you work with information when away from campus; you generally?campus; you generally?
A) Work on paperA) Work on paperB) Work remotely using VPN and the same B) Work remotely using VPN and the same
shares/files used in the officeshares/files used in the officeC) Work on the same notebook PC when in-office C) Work on the same notebook PC when in-office
and travelingand travelingD) Work with information on/transferred with portable D) Work with information on/transferred with portable
media (USB memory, Floppy, CD/CDR…)media (USB memory, Floppy, CD/CDR…)E) Work with information transported between E) Work with information transported between
computers using e-mailcomputers using e-mail
Working Remotely - SecurityWorking Remotely - Security
Extension of the WPI Network/InformationExtension of the WPI Network/Information
Physical SecurityPhysical Security
PC & Network Management standardsPC & Network Management standards
CCC Policy & StandardsCCC Policy & Standards
Work Remotely – Appear LocalWork Remotely – Appear Local
Proxy Server – (Library Web service)Proxy Server – (Library Web service)
VPN (appear on WPI network)VPN (appear on WPI network)
Terminal Services (virtual lab) Terminal Services (virtual lab) – Alternate desktop platformsAlternate desktop platforms– Software (hardware/license limitations)Software (hardware/license limitations)
Working Remotely Working Remotely continued …continued …
Software for use at homeSoftware for use at home– MS Campus AgreementMS Campus Agreement– McAfee virus protectionMcAfee virus protection– Other softwareOther software
Cell Phones for international travelCell Phones for international travel
Blackberry and MS Push Mail SupportBlackberry and MS Push Mail Support
Computing ResourcesComputing Resources
How many devices (PCs, laptops, etc.) How many devices (PCs, laptops, etc.) are registered to be used on our are registered to be used on our network?network?
A.A. 22002200
B.B. 55005500
C.C. 76547654
D.D. 1270012700
Computing ResourcesComputing Resources
What do we have?What do we have?
LabsLabs
HardwareHardware
SoftwareSoftware
StorageStorage
SupportSupport
Computer Labs and ClassroomsComputer Labs and Classrooms
23 Public Labs 23 Public Labs
39 E-classrooms39 E-classrooms
3 year replacement cycle3 year replacement cycle
7x24 Access7x24 Access
Computing ResourcesComputing Resources
Computing ResourcesComputing Resources
HardwareHardware
Windows Cluster for Research Computing (new)Windows Cluster for Research Computing (new)– Accessible using terminal servicesAccessible using terminal services
2 Linux Clusters, 11 and 14 nodes2 Linux Clusters, 11 and 14 nodes– Each node, 2x2.4 GHz Intel Xeon CPUs, 2GB RAM ~25GflopsEach node, 2x2.4 GHz Intel Xeon CPUs, 2GB RAM ~25Gflops
SGI Altix 350SGI Altix 350– 16 1.5GHz Itanium2 CPUs, 32 GB RAM, LinuxOS~56Gflops16 1.5GHz Itanium2 CPUs, 32 GB RAM, LinuxOS~56Gflops
A system with 16 CPUs, dual core 2.4 GHz AMD A system with 16 CPUs, dual core 2.4 GHz AMD Opteron, 32GB of RAM ~54GflopsOpteron, 32GB of RAM ~54GflopsMany other 2 and 4 CPU nodes, AMD Opteron 64 bit Many other 2 and 4 CPU nodes, AMD Opteron 64 bit systemssystems
Computing ResourcesComputing Resources
SoftwareSoftware
Over 250 software applicationsOver 250 software applications
Productivity suites, Engineering and Productivity suites, Engineering and scientific apps, Compilers, developmental scientific apps, Compilers, developmental tools and libraries, etc…tools and libraries, etc…
32 bit and 64 bit32 bit and 64 bit
Supported platforms Windows/MAC/LinuxSupported platforms Windows/MAC/Linux
Computing ResourcesComputing Resources
StorageStorage
750 MB network storage per user750 MB network storage per user
Other Storage arrays (EMC NAS-350, Other Storage arrays (EMC NAS-350, AX100) for research supportAX100) for research support
SupportSupport
MAC support (new)MAC support (new)
Resource Planning (volume and upgrade Resource Planning (volume and upgrade planning)planning)
Major ProjectsMajor Projects
Web submission and archiving of ProjectsWeb submission and archiving of Projects– Undergraduate projects are a differentiating feature of Undergraduate projects are a differentiating feature of
WPI education.WPI education.– Builds on web submission of theses and dissertations Builds on web submission of theses and dissertations
which were mandated 6 years ago.which were mandated 6 years ago.– Both Major and Interactive projectsBoth Major and Interactive projects– Second year of a pilot project – volunteer onlySecond year of a pilot project – volunteer only– Working with faculty committees toward a faculty vote Working with faculty committees toward a faculty vote
of mandatory electronic submission.of mandatory electronic submission.
Major ProjectsMajor Projects
What percentage of projects were What percentage of projects were submitted via the web of all projects submitted via the web of all projects submitted in the past academic year?submitted in the past academic year?– A - 8%A - 8%– B - 17%B - 17%– C - 39%C - 39%– D - 57%D - 57%– E - 74%E - 74%
Major ProjectsMajor Projects
Overall, 39% of projects were submitted Overall, 39% of projects were submitted via the web last year.via the web last year.– 105 MQPs - 34% of 310 total105 MQPs - 34% of 310 total– 105 IQPs - 45% of 233 total105 IQPs - 45% of 233 total
Major ProjectsMajor Projects
Gateway ParkGateway Park– Working with construction project to assure Working with construction project to assure
“campus” network quality.“campus” network quality.– Campus telephone extensionsCampus telephone extensions– IP Videoconferencing for Seminar RoomIP Videoconferencing for Seminar Room– Presentation setups in 5 conference roomsPresentation setups in 5 conference rooms– Have proposed process changes to provide Have proposed process changes to provide
support for the building.support for the building.
Major ProjectsMajor Projects
What is the length of communications What is the length of communications cable which has been installed in Gateway cable which has been installed in Gateway Park?Park?– A - 6500 yardsA - 6500 yards– B - 6.5 milesB - 6.5 miles– C - 65 milesC - 65 miles– D - 650 milesD - 650 miles
Major ProjectsMajor Projects
65 miles of communications cable has 65 miles of communications cable has been installed in the Gateway building. been installed in the Gateway building. What is the length of communications What is the length of communications cable which is installed on the campus?cable which is installed on the campus?– A - 28 milesA - 28 miles– B – 56 milesB – 56 miles– C - 282 milesC - 282 miles– D - 560 milesD - 560 miles– E - 2,820 milesE - 2,820 miles
Major ProjectsMajor Projects
Machine Room environment upgradeMachine Room environment upgrade– GeneratorGenerator– Uninterruptible power supplyUninterruptible power supply– Air conditioning backupAir conditioning backup
FY07 GiftsFY07 Gifts
Grants and giftsGrants and gifts– APC 80 KVA unitAPC 80 KVA unit $289,950$289,950– APC RacksAPC Racks $36,000 $36,000– Nortel SwitchesNortel Switches $50,400 $50,400– Nortel Call Pilot SystemNortel Call Pilot System $60,000 $60,000– Nortel WirelessNortel Wireless $203,140$203,140– Wireless Management Software Wireless Management Software $17,595 $17,595– NetOps Closet/Hall renovationNetOps Closet/Hall renovation $57,000 $57,000– Nortel VPN + licensesNortel VPN + licenses $71,980 $71,980– Cyclades Terminal Server Cyclades Terminal Server $50,000 $50,000– Gift - Gateway ParkGift - Gateway Park $40,000 $40,000
– Total:Total: $858,470$858,470
Focus: Information AccessFocus: Information AccessWorking with administrators, administrative business Working with administrators, administrative business units, and academic departments to better define needs units, and academic departments to better define needs and set direction and set direction Institutional dataInstitutional data– Retention, academic advising, enrollment management, etc.Retention, academic advising, enrollment management, etc.– Development, alumni relations, capital campaign, etc.Development, alumni relations, capital campaign, etc.
Information architecture Information architecture – Systems view of the enterprise architecture; Data WarehouseSystems view of the enterprise architecture; Data Warehouse– Process flow, optimization, efficiencies Process flow, optimization, efficiencies
Information access projects (Banner)Information access projects (Banner)– Array of access to meet skills and needsArray of access to meet skills and needs
Graphical data displays; data integrity; catalogs of reportsGraphical data displays; data integrity; catalogs of reportsDirect access and analysis tools (Oracle Discoverer)Direct access and analysis tools (Oracle Discoverer)
– Third party productsThird party products– Project management software; super users; training coursesProject management software; super users; training courses
Q & AQ & A