ucisa 2013 presentation

20
IT Services in Higher Education – what Enterprise can learn from the Universities

Upload: dataintegration

Post on 15-Jan-2015

62 views

Category:

Documents


0 download

DESCRIPTION

Adrian Taylor, Data Integration CTO presented at this year's UCISA conference.

TRANSCRIPT

Page 1: UCISA 2013 Presentation

IT Services in Higher Education – what Enterprise can learn from the Universities

Page 2: UCISA 2013 Presentation

2

• Cloud Computing (and SDN)

• BYOD/T/S

• The “internet of things”

• Mobility (consumerization)

• Consumption based service provision

• Multi – tenancy

• Virtualisation

• HPC

• “Big” Data

Industry Hot Topics – does it all seem familiar?

Page 3: UCISA 2013 Presentation

3

Some numbers

• 95% of organizations allow employee-owned devices in the workplace

• 84% of respondents also provide some support

• 36% provide full support for ANY device

• By 2014, the average connected devices per white collar worker will be 3.3

Why is this happening in the enterprise at all?

• 76% of IT Leaders consider BYO to be “very” or “extremely” positive..

• Benefits of between $300 and $1300 per employee are estimated

Why is this really happening in the enterprise at all?

• 69% of employees want to use “unapproved” applications at work

• 40% cited “device choice” as their top reason – above “work capability”

• The CxO factor

Sources Cisco / Absolute Software / BBC

BYO – the hottest topic of all

Page 4: UCISA 2013 Presentation

4

More Numbers

Page 5: UCISA 2013 Presentation

5

• Residential students have always “Brought their own”

• Universities very rarely have separate infrastructure

• Universities always support pretty much whatever arrives

• Student populations are among the most demanding user demographics

• Research and Academic populations are THE most demanding demographic

• Universities get both, and have to work with limited funds

• These challenges have been met by HE for many years, before “BYO” was coined

So do we actually need special “BYO” technology in the enterprise?

BYO = BAU for HE

Page 6: UCISA 2013 Presentation

6

Students are the “connected generation”

Source: Cisco

Page 7: UCISA 2013 Presentation

7

With the rest of us not far behind

Page 8: UCISA 2013 Presentation

8

• Understand your existing environment

• Don’t let technology capabilities dictate policy

• HAVE a policy

• Enforce that policy but pick your battles – what’s really important?

• It’s still about productivity first – the internet is the student application, it may not be for you

• No amount of MDM, Endpoint control or NAC on top of “bad” design will help

• There is no such thing as a supportless model – you WILL have to do it

• Take steps with what you already have – there is so much unused capability

• Don’t lump BYO and mobility in together – they are distinct

The lessons we take from HE to BYO

Page 9: UCISA 2013 Presentation

9

The Enterprise Picture

• Cloud service provision and consumption is driving multi-tenancy models

• Reduced funding in traditionally recalcitrant sectors (finance) is changing opinions

• Network design has moved on – things like SDN have caused a re-examination

• In parallel, refresh cycles are being pushed up to and beyond EOL notifications

• “Doing more with less” is a recurring theme

• Space, power, cooling – much more relevant in a recession

Multi – Tenancy, isn’t that just using your infrastructure?

Suddenly this all means REAL money to enterprise

Page 10: UCISA 2013 Presentation

10

It’s the new BYO!

• Kevin Ashton, MIT coined the term in 1999 – the vision was ubiquitous RFID

• Asset tracking was the first practical use

How does it look today?

• APIs and Service Buses, effectively

Why is enterprise suddenly excited by it?

• Smart metering

• Connected cars

• Buildings Management Systems

• Power and cooling micro-control

Why is enterprise suddenly excited by it then?

The “internet of things”

Page 11: UCISA 2013 Presentation

11

There cannot be a proprietary solution

Page 12: UCISA 2013 Presentation

12

Not so much has changed – we’re still sharing networks

This….

Page 13: UCISA 2013 Presentation

13

(Bob Metcalfe preceded Visio..)

And this (Alohanet)…

Page 14: UCISA 2013 Presentation

14

And segmenting..

Allowed this…

Page 15: UCISA 2013 Presentation

15

And virtualising (Unsigned by the artist)

With some of this…

Page 16: UCISA 2013 Presentation

16

It’s just bigger

To Become this…

Page 17: UCISA 2013 Presentation

17

And works even over 185 Meters

Page 18: UCISA 2013 Presentation

18

1913 Panama Canal (40,000 people – warning, this may be engineering!)

1939 ULTRA decoding project at Bletchley Park (10,000 people)

1942 The Manhattan Project (130,000 people)

1969 The Apollo Project (400,000 people)

2002 Alzheimer’s Disease Neuroimaging Initiative (ADNI; 30,000 people, 90 orgs)

2003 Human Genome Sequencing (100,000 people, 120 countries)

2008 Large Hadron Collider (10,000 people, 100 countries)

Real-time collaboration, instant result sharing

Academic and Research projects In HE force innovation and create markets

HE Leads the way in developing HPC, and “big” data analysis – Hadoop is open source

Big Science >> Big Data >> Big IT

Page 19: UCISA 2013 Presentation

19

• Cloud computing (Virtualisation, HPC, Orchestration, NAC)

• IPv6 ratification (through IETF membership) and early adoption

• Big Data (Hadoop / MapReduce techniques)

• Collaboration on an enormous scale, without the travel (research, VLE, MOOC)

• Performance demands (speed, density, distance and quality control)

• BYO (endpoint control, service delivery, session tracking and reporting)

Academic and Research projects In HE force innovation and create markets

Page 20: UCISA 2013 Presentation

20

Next Generation Security• Application visibility and control (Web 2.0 issues). You should have security and privacy safeguards that are fit-for-purpose in the age of Facebook, Twitter,

LinkedIn and other social networks. They should also be able to securely enable WebEx, Instant Messaging, remote diagnostics and other technologies that bypass traditional communication protocols.

• Endpoint protection and data leak prevention. As laptops, smartphones, tablets and other devices become an everyday business tool, they are now accessing potentially sensitive information that needs to be protected wherever it is distributed to.

• Regulation and compliance (Governance). Most businesses are affected by regulation to some extent. The need to maintain compliance is essential to protect information and avoid financial penalties or reputational damage.

• Malware attack. The Internet is replacing email as the primary channel for distribution and communication. Malware that is script-based can evade traditional / common antivirus and anti-malware software because of its inherent signature-based weaknessNext Generation Security

Mobile and BYO• monitor and manage your mobile devices (MDM);

• backup and restore data;

• protect against virus and malware attack;

• mitigate against loss or theft (GPS location remote wipe / remote locking);

• control spam and other unwanted traffic (content management).

Network Consolidation• Eliminating layers of switching to flatten and collapse the network from today’s 3-tier architecture to 2 layers and, ultimately, to just 1.

• Simplification; achieved by interconnecting multiple physical switches, creating a single, logical device that combines the performance and simplicity of a switch with the connectivity and resilience of a network.

• Reduction of complexity and acceleration of performance by the creation of a single data centre-wide fabric that provides any-to-any connection.

• Cost and emissions; you can expect to see up to a 40% reduction in power consumption, a 30% reduction in heat output and a 20% increase in mean time between failure (MTBF) of major network components.

Thankyou – we (really) couldn’t do it without you..