New Opportunities: Evolving and Emerging Technologies Leslie Maltz Columbia University.

Post on 13-Jan-2016

220 views 3 download

Tags:

Transcript of New Opportunities: Evolving and Emerging Technologies Leslie Maltz Columbia University.

New Opportunities: New Opportunities: Evolving and Emerging Evolving and Emerging

TechnologiesTechnologies

Leslie MaltzLeslie Maltz

Columbia UniversityColumbia University

NETWORKINGNETWORKING

Ubiquitous WirelessUbiquitous Wireless

Learning takes place everywhere andLearning takes place everywhere and

all the timeall the time

Issue:Issue:

Upgrade wired infrastructure or Upgrade wired infrastructure or

Install/upgrade wireless infrastructureInstall/upgrade wireless infrastructure

NETWORKINGNETWORKING

The technology to watch is broadband The technology to watch is broadband over power linesover power lines

– Relatively inexpensive devices can be Relatively inexpensive devices can be used with existing computersused with existing computers

– Will the power companies see the Will the power companies see the opportunity or will they be too late?opportunity or will they be too late?

DISASTER RECOVERYDISASTER RECOVERY

In the post-Katrina world, disaster recovery In the post-Katrina world, disaster recovery and business continuity plans are essentialand business continuity plans are essential

-DR and BC were hot topics after -DR and BC were hot topics after 9/11, but memories fade and 9/11, but memories fade and

budgets budgets disappear disappear

-Opportunities for assisting -Opportunities for assisting

each othereach other

SECURITYSECURITY

We need help!We need help!

The bad guys are killing us!The bad guys are killing us!

Bots, DOS, root kits, Windows Bots, DOS, root kits, Windows vulnerabilities/updatesvulnerabilities/updates

Authorization, authenticationAuthorization, authentication

Spam, phishingSpam, phishing

SECURITYSECURITY

FundingFunding

StaffingStaffing

ToolsTools

User awareness and trainingUser awareness and training

Secure protocols – local and remoteSecure protocols – local and remote

Anti-virus/malware/phishing/spam/…Anti-virus/malware/phishing/spam/…

IDENTITY MANAGEMENTIDENTITY MANAGEMENT

Need a uniform process for establishing Need a uniform process for establishing user identificationuser identification

Reduction in the number of sign-ons and Reduction in the number of sign-ons and passwords passwords

Greater security to protect informationGreater security to protect information

Legal regulationsLegal regulations

Lack of standardsLack of standards

AUTHENTICATIONAUTHENTICATION

2 Factor Authentication2 Factor Authentication

– Password plus a tokenPassword plus a token

– BiometricsBiometrics

– Even banks are seeing the needEven banks are seeing the need

PUBLIC KEY PUBLIC KEY INFRASTRUCTURE (PKI)INFRASTRUCTURE (PKI)

Need for a secure means of transmitting Need for a secure means of transmitting sensitive, confidential datasensitive, confidential data

PKI is not intuitive or easy to supportPKI is not intuitive or easy to support

But it may be the best of breedBut it may be the best of breed

PORTALSPORTALS

Continue to evolve and growContinue to evolve and grow

Flexible, customizable, personalized Flexible, customizable, personalized access and view of information based on access and view of information based on the interests and roles of individualsthe interests and roles of individuals

Open source is mainstreamOpen source is mainstream

Branded gateway to resourcesBranded gateway to resources

COLLABORATIONCOLLABORATIONTOOLSTOOLS

BlogsBlogsWikisWikisCourseware sitesCourseware sitesElectronic facebooksElectronic facebooksChats, instant messaging, SMS/text Chats, instant messaging, SMS/text messagingmessagingWeb conferencingWeb conferencingDigital repositories (i.e. DSpace)Digital repositories (i.e. DSpace)e-portfoliose-portfolios

EDUCATIONALEDUCATIONALGAMINGGAMING

Games aren’t just for funGames aren’t just for fun

Learning can be funLearning can be fun

Kids have load of experienceKids have load of experience

Games are engaging and adaptable to Games are engaging and adaptable to almost any subjectalmost any subject

Interactive learning experience;Interactive learning experience;

Lessons learned from games Lessons learned from games stay with studentsstay with students

INSTITUTIONALINSTITUTIONALREPOSITORIESREPOSITORIES

What information to keep?What information to keep?

Legal requirementsLegal requirements

Institutional archivesInstitutional archives

What media will last?What media will last?

CD has limited lifeCD has limited life

Fiche is ancient technologyFiche is ancient technology

INTELLIGENTINTELLIGENTSEARCHINGSEARCHING

Personal desktop search “bots” Personal desktop search “bots”

Specialized search interfaces like Google Specialized search interfaces like Google ScholarScholar

Remember search parameters over timeRemember search parameters over time

Searching of multiple archives, repositories, Searching of multiple archives, repositories, and databases with a single query and databases with a single query

GRID COMPUTINGGRID COMPUTING

Shared, distributed, heterogeneous Shared, distributed, heterogeneous computers computers

Lots of horsepower for computational Lots of horsepower for computational needsneeds

Harness distributed cyclesHarness distributed cycles

High data demand is more suited to High data demand is more suited to clusters clusters

Relatively inexpensiveRelatively inexpensive

PODCASTINGPODCASTING

New means for anywhere, New means for anywhere,

anytime learninganytime learning

Subscription modelSubscription model

Files are delivered because subscribers want to Files are delivered because subscribers want to get the information regularly get the information regularly

““Feeds” via RSS (Feeds” via RSS (Really Simple SyndicationReally Simple Syndication))

Usually MP3 audio formatUsually MP3 audio format

Vodcasting – video enabled podcastingVodcasting – video enabled podcasting

PEER-TO-PEER PEER-TO-PEER FILE SHARING FILE SHARING

Concept is validConcept is valid

There There areare lawful uses lawful uses

Industry pressure is growing forIndustry pressure is growing for

Content monitoringContent monitoring

Watch for legislationWatch for legislation

EDUCAUSE as voice for higher edEDUCAUSE as voice for higher ed

OUTSOURCINGOUTSOURCING

It’s like politics; It’s like politics;

which side are you on?which side are you on?

Financially attractive Financially attractive Expectations high; delivery Expectations high; delivery

sometimes highsometimes highCaution - Quality variesCaution - Quality varies

Phone, What PhonePhone, What Phone

Traditional phones are fadingTraditional phones are fading

Cost per call based on distance model is Cost per call based on distance model is brokenbroken

Phones in dorm rooms are only for 911Phones in dorm rooms are only for 911

VoIP works, but will the funding model VoIP works, but will the funding model continue as is?continue as is?

CONVERGENCECONVERGENCEDEVICESDEVICES

All in one handheld devicesAll in one handheld devices

– PhonePhone

– PDAPDA

– CalendarCalendar

– EmailEmail

– WebWeb

– SMS/Text messagingSMS/Text messaging

– TVTV

CONVERGENCE DEVICESCONVERGENCE DEVICES

Support issuesSupport issues

Security issuesSecurity issues

– Lost devices, confidential data, Lost devices, confidential data, vulnerabilities and virusesvulnerabilities and viruses

– Data and usage policiesData and usage policies

– Device ownershipDevice ownership