new opportunities: evolving and emerging technologies leslie maltz columbia university
TRANSCRIPT
New Opportunities: New Opportunities: Evolving and Emerging Evolving and Emerging
TechnologiesTechnologies
Leslie MaltzLeslie Maltz
Columbia UniversityColumbia University
NETWORKINGNETWORKING
Ubiquitous WirelessUbiquitous Wireless
Learning takes place everywhere andLearning takes place everywhere and
all the timeall the time
Issue:Issue:
Upgrade wired infrastructure or Upgrade wired infrastructure or
Install/upgrade wireless infrastructureInstall/upgrade wireless infrastructure
NETWORKINGNETWORKING
The technology to watch is broadband The technology to watch is broadband over power linesover power lines
– Relatively inexpensive devices can be Relatively inexpensive devices can be used with existing computersused with existing computers
– Will the power companies see the Will the power companies see the opportunity or will they be too late?opportunity or will they be too late?
DISASTER RECOVERYDISASTER RECOVERY
In the post-Katrina world, disaster recovery In the post-Katrina world, disaster recovery and business continuity plans are essentialand business continuity plans are essential
-DR and BC were hot topics after -DR and BC were hot topics after 9/11, but memories fade and 9/11, but memories fade and
budgets budgets disappear disappear
-Opportunities for assisting -Opportunities for assisting
each othereach other
SECURITYSECURITY
We need help!We need help!
The bad guys are killing us!The bad guys are killing us!
Bots, DOS, root kits, Windows Bots, DOS, root kits, Windows vulnerabilities/updatesvulnerabilities/updates
Authorization, authenticationAuthorization, authentication
Spam, phishingSpam, phishing
SECURITYSECURITY
FundingFunding
StaffingStaffing
ToolsTools
User awareness and trainingUser awareness and training
Secure protocols – local and remoteSecure protocols – local and remote
Anti-virus/malware/phishing/spam/…Anti-virus/malware/phishing/spam/…
IDENTITY MANAGEMENTIDENTITY MANAGEMENT
Need a uniform process for establishing Need a uniform process for establishing user identificationuser identification
Reduction in the number of sign-ons and Reduction in the number of sign-ons and passwords passwords
Greater security to protect informationGreater security to protect information
Legal regulationsLegal regulations
Lack of standardsLack of standards
AUTHENTICATIONAUTHENTICATION
2 Factor Authentication2 Factor Authentication
– Password plus a tokenPassword plus a token
– BiometricsBiometrics
– Even banks are seeing the needEven banks are seeing the need
PUBLIC KEY PUBLIC KEY INFRASTRUCTURE (PKI)INFRASTRUCTURE (PKI)
Need for a secure means of transmitting Need for a secure means of transmitting sensitive, confidential datasensitive, confidential data
PKI is not intuitive or easy to supportPKI is not intuitive or easy to support
But it may be the best of breedBut it may be the best of breed
PORTALSPORTALS
Continue to evolve and growContinue to evolve and grow
Flexible, customizable, personalized Flexible, customizable, personalized access and view of information based on access and view of information based on the interests and roles of individualsthe interests and roles of individuals
Open source is mainstreamOpen source is mainstream
Branded gateway to resourcesBranded gateway to resources
COLLABORATIONCOLLABORATIONTOOLSTOOLS
BlogsBlogsWikisWikisCourseware sitesCourseware sitesElectronic facebooksElectronic facebooksChats, instant messaging, SMS/text Chats, instant messaging, SMS/text messagingmessagingWeb conferencingWeb conferencingDigital repositories (i.e. DSpace)Digital repositories (i.e. DSpace)e-portfoliose-portfolios
EDUCATIONALEDUCATIONALGAMINGGAMING
Games aren’t just for funGames aren’t just for fun
Learning can be funLearning can be fun
Kids have load of experienceKids have load of experience
Games are engaging and adaptable to Games are engaging and adaptable to almost any subjectalmost any subject
Interactive learning experience;Interactive learning experience;
Lessons learned from games Lessons learned from games stay with studentsstay with students
INSTITUTIONALINSTITUTIONALREPOSITORIESREPOSITORIES
What information to keep?What information to keep?
Legal requirementsLegal requirements
Institutional archivesInstitutional archives
What media will last?What media will last?
CD has limited lifeCD has limited life
Fiche is ancient technologyFiche is ancient technology
INTELLIGENTINTELLIGENTSEARCHINGSEARCHING
Personal desktop search “bots” Personal desktop search “bots”
Specialized search interfaces like Google Specialized search interfaces like Google ScholarScholar
Remember search parameters over timeRemember search parameters over time
Searching of multiple archives, repositories, Searching of multiple archives, repositories, and databases with a single query and databases with a single query
GRID COMPUTINGGRID COMPUTING
Shared, distributed, heterogeneous Shared, distributed, heterogeneous computers computers
Lots of horsepower for computational Lots of horsepower for computational needsneeds
Harness distributed cyclesHarness distributed cycles
High data demand is more suited to High data demand is more suited to clusters clusters
Relatively inexpensiveRelatively inexpensive
PODCASTINGPODCASTING
New means for anywhere, New means for anywhere,
anytime learninganytime learning
Subscription modelSubscription model
Files are delivered because subscribers want to Files are delivered because subscribers want to get the information regularly get the information regularly
““Feeds” via RSS (Feeds” via RSS (Really Simple SyndicationReally Simple Syndication))
Usually MP3 audio formatUsually MP3 audio format
Vodcasting – video enabled podcastingVodcasting – video enabled podcasting
PEER-TO-PEER PEER-TO-PEER FILE SHARING FILE SHARING
Concept is validConcept is valid
There There areare lawful uses lawful uses
Industry pressure is growing forIndustry pressure is growing for
Content monitoringContent monitoring
Watch for legislationWatch for legislation
EDUCAUSE as voice for higher edEDUCAUSE as voice for higher ed
OUTSOURCINGOUTSOURCING
It’s like politics; It’s like politics;
which side are you on?which side are you on?
Financially attractive Financially attractive Expectations high; delivery Expectations high; delivery
sometimes highsometimes highCaution - Quality variesCaution - Quality varies
Phone, What PhonePhone, What Phone
Traditional phones are fadingTraditional phones are fading
Cost per call based on distance model is Cost per call based on distance model is brokenbroken
Phones in dorm rooms are only for 911Phones in dorm rooms are only for 911
VoIP works, but will the funding model VoIP works, but will the funding model continue as is?continue as is?
CONVERGENCECONVERGENCEDEVICESDEVICES
All in one handheld devicesAll in one handheld devices
– PhonePhone
– PDAPDA
– CalendarCalendar
– EmailEmail
– WebWeb
– SMS/Text messagingSMS/Text messaging
– TVTV
CONVERGENCE DEVICESCONVERGENCE DEVICES
Support issuesSupport issues
Security issuesSecurity issues
– Lost devices, confidential data, Lost devices, confidential data, vulnerabilities and virusesvulnerabilities and viruses
– Data and usage policiesData and usage policies
– Device ownershipDevice ownership