New Opportunities: Evolving and Emerging Technologies

Preview:

DESCRIPTION

New Opportunities: Evolving and Emerging Technologies. Leslie Maltz Columbia University. NETWORKING. Ubiquitous Wireless Learning takes place everywhere and all the time Issue: Upgrade wired infrastructure or Install/upgrade wireless infrastructure. NETWORKING. - PowerPoint PPT Presentation

Citation preview

New Opportunities: New Opportunities: Evolving and Emerging Evolving and Emerging

TechnologiesTechnologies

Leslie MaltzLeslie MaltzColumbia UniversityColumbia University

NETWORKINGNETWORKING

Ubiquitous WirelessUbiquitous WirelessLearning takes place everywhere andLearning takes place everywhere and all the timeall the time

Issue:Issue: Upgrade wired infrastructure or Upgrade wired infrastructure or

Install/upgrade wireless infrastructureInstall/upgrade wireless infrastructure

NETWORKINGNETWORKING

The technology to watch is broadband The technology to watch is broadband over power linesover power lines

– Relatively inexpensive devices can be Relatively inexpensive devices can be used with existing computersused with existing computers

– Will the power companies see the Will the power companies see the opportunity or will they be too late?opportunity or will they be too late?

DISASTER RECOVERYDISASTER RECOVERY

In the post-Katrina world, disaster recovery In the post-Katrina world, disaster recovery and business continuity plans are essentialand business continuity plans are essential

-DR and BC were hot topics after -DR and BC were hot topics after 9/11, but memories fade and 9/11, but memories fade and

budgets budgets disappear disappear-Opportunities for assisting -Opportunities for assisting each othereach other

SECURITYSECURITY

We need help!We need help!The bad guys are killing us!The bad guys are killing us!

Bots, DOS, root kits, Windows Bots, DOS, root kits, Windows vulnerabilities/updatesvulnerabilities/updatesAuthorization, authenticationAuthorization, authenticationSpam, phishingSpam, phishing

SECURITYSECURITY

FundingFundingStaffingStaffingToolsToolsUser awareness and trainingUser awareness and trainingSecure protocols – local and remoteSecure protocols – local and remoteAnti-virus/malware/phishing/spam/…Anti-virus/malware/phishing/spam/…

IDENTITY MANAGEMENTIDENTITY MANAGEMENT

Need a uniform process for establishing Need a uniform process for establishing user identificationuser identificationReduction in the number of sign-ons and Reduction in the number of sign-ons and passwords passwords Greater security to protect informationGreater security to protect informationLegal regulationsLegal regulationsLack of standardsLack of standards

AUTHENTICATIONAUTHENTICATION

2 Factor Authentication2 Factor Authentication

– Password plus a tokenPassword plus a token

– BiometricsBiometrics

– Even banks are seeing the needEven banks are seeing the need

PUBLIC KEY PUBLIC KEY INFRASTRUCTURE (PKI)INFRASTRUCTURE (PKI)

Need for a secure means of transmitting Need for a secure means of transmitting sensitive, confidential datasensitive, confidential data

PKI is not intuitive or easy to supportPKI is not intuitive or easy to support

But it may be the best of breedBut it may be the best of breed

PORTALSPORTALS

Continue to evolve and growContinue to evolve and growFlexible, customizable, personalized Flexible, customizable, personalized access and view of information based on access and view of information based on the interests and roles of individualsthe interests and roles of individualsOpen source is mainstreamOpen source is mainstreamBranded gateway to resourcesBranded gateway to resources

COLLABORATIONCOLLABORATIONTOOLSTOOLS

BlogsBlogsWikisWikisCourseware sitesCourseware sitesElectronic facebooksElectronic facebooksChats, instant messaging, SMS/text Chats, instant messaging, SMS/text messagingmessagingWeb conferencingWeb conferencingDigital repositories (i.e. DSpace)Digital repositories (i.e. DSpace)e-portfoliose-portfolios

EDUCATIONALEDUCATIONALGAMINGGAMING

Games aren’t just for funGames aren’t just for funLearning can be funLearning can be fun

Kids have load of experienceKids have load of experienceGames are engaging and adaptable to Games are engaging and adaptable to almost any subjectalmost any subjectInteractive learning experience;Interactive learning experience;

Lessons learned from games Lessons learned from games stay with studentsstay with students

INSTITUTIONALINSTITUTIONALREPOSITORIESREPOSITORIES

What information to keep?What information to keep?Legal requirementsLegal requirementsInstitutional archivesInstitutional archives

What media will last?What media will last?CD has limited lifeCD has limited lifeFiche is ancient technologyFiche is ancient technology

INTELLIGENTINTELLIGENTSEARCHINGSEARCHING

Personal desktop search “bots” Personal desktop search “bots” Specialized search interfaces like Google Specialized search interfaces like Google ScholarScholarRemember search parameters over timeRemember search parameters over timeSearching of multiple archives, repositories, Searching of multiple archives, repositories, and databases with a single query and databases with a single query

GRID COMPUTINGGRID COMPUTING

Shared, distributed, heterogeneous Shared, distributed, heterogeneous computers computers Lots of horsepower for computational Lots of horsepower for computational needsneeds

Harness distributed cyclesHarness distributed cyclesHigh data demand is more suited to High data demand is more suited to

clusters clusters Relatively inexpensiveRelatively inexpensive

PODCASTINGPODCASTING

New means for anywhere, New means for anywhere, anytime learninganytime learning

Subscription modelSubscription modelFiles are delivered because subscribers want to Files are delivered because subscribers want to get the information regularly get the information regularly ““Feeds” via RSS (Feeds” via RSS (Really Simple SyndicationReally Simple Syndication))Usually MP3 audio formatUsually MP3 audio formatVodcasting – video enabled podcastingVodcasting – video enabled podcasting

PEER-TO-PEER PEER-TO-PEER FILE SHARING FILE SHARING

Concept is validConcept is validThere There areare lawful uses lawful usesIndustry pressure is growing forIndustry pressure is growing forContent monitoringContent monitoring

Watch for legislationWatch for legislationEDUCAUSE as voice for higher edEDUCAUSE as voice for higher ed

OUTSOURCINGOUTSOURCING

It’s like politics; It’s like politics; which side are you on?which side are you on?

Financially attractive Financially attractive Expectations high; delivery Expectations high; delivery

sometimes highsometimes highCaution - Quality variesCaution - Quality varies

Phone, What PhonePhone, What Phone

Traditional phones are fadingTraditional phones are fadingCost per call based on distance model is Cost per call based on distance model is brokenbrokenPhones in dorm rooms are only for 911Phones in dorm rooms are only for 911VoIP works, but will the funding model VoIP works, but will the funding model continue as is?continue as is?

CONVERGENCECONVERGENCEDEVICESDEVICES

All in one handheld devicesAll in one handheld devices– PhonePhone– PDAPDA– CalendarCalendar– EmailEmail– WebWeb– SMS/Text messagingSMS/Text messaging– TVTV

CONVERGENCE DEVICESCONVERGENCE DEVICES

Support issuesSupport issuesSecurity issuesSecurity issues– Lost devices, confidential data, Lost devices, confidential data,

vulnerabilities and virusesvulnerabilities and viruses– Data and usage policiesData and usage policies– Device ownershipDevice ownership

Recommended