New Opportunities: New Opportunities: Evolving and Emerging Evolving and Emerging
TechnologiesTechnologies
Leslie MaltzLeslie MaltzColumbia UniversityColumbia University
NETWORKINGNETWORKING
Ubiquitous WirelessUbiquitous WirelessLearning takes place everywhere andLearning takes place everywhere and all the timeall the time
Issue:Issue: Upgrade wired infrastructure or Upgrade wired infrastructure or
Install/upgrade wireless infrastructureInstall/upgrade wireless infrastructure
NETWORKINGNETWORKING
The technology to watch is broadband The technology to watch is broadband over power linesover power lines
– Relatively inexpensive devices can be Relatively inexpensive devices can be used with existing computersused with existing computers
– Will the power companies see the Will the power companies see the opportunity or will they be too late?opportunity or will they be too late?
DISASTER RECOVERYDISASTER RECOVERY
In the post-Katrina world, disaster recovery In the post-Katrina world, disaster recovery and business continuity plans are essentialand business continuity plans are essential
-DR and BC were hot topics after -DR and BC were hot topics after 9/11, but memories fade and 9/11, but memories fade and
budgets budgets disappear disappear-Opportunities for assisting -Opportunities for assisting each othereach other
SECURITYSECURITY
We need help!We need help!The bad guys are killing us!The bad guys are killing us!
Bots, DOS, root kits, Windows Bots, DOS, root kits, Windows vulnerabilities/updatesvulnerabilities/updatesAuthorization, authenticationAuthorization, authenticationSpam, phishingSpam, phishing
SECURITYSECURITY
FundingFundingStaffingStaffingToolsToolsUser awareness and trainingUser awareness and trainingSecure protocols – local and remoteSecure protocols – local and remoteAnti-virus/malware/phishing/spam/…Anti-virus/malware/phishing/spam/…
IDENTITY MANAGEMENTIDENTITY MANAGEMENT
Need a uniform process for establishing Need a uniform process for establishing user identificationuser identificationReduction in the number of sign-ons and Reduction in the number of sign-ons and passwords passwords Greater security to protect informationGreater security to protect informationLegal regulationsLegal regulationsLack of standardsLack of standards
AUTHENTICATIONAUTHENTICATION
2 Factor Authentication2 Factor Authentication
– Password plus a tokenPassword plus a token
– BiometricsBiometrics
– Even banks are seeing the needEven banks are seeing the need
PUBLIC KEY PUBLIC KEY INFRASTRUCTURE (PKI)INFRASTRUCTURE (PKI)
Need for a secure means of transmitting Need for a secure means of transmitting sensitive, confidential datasensitive, confidential data
PKI is not intuitive or easy to supportPKI is not intuitive or easy to support
But it may be the best of breedBut it may be the best of breed
PORTALSPORTALS
Continue to evolve and growContinue to evolve and growFlexible, customizable, personalized Flexible, customizable, personalized access and view of information based on access and view of information based on the interests and roles of individualsthe interests and roles of individualsOpen source is mainstreamOpen source is mainstreamBranded gateway to resourcesBranded gateway to resources
COLLABORATIONCOLLABORATIONTOOLSTOOLS
BlogsBlogsWikisWikisCourseware sitesCourseware sitesElectronic facebooksElectronic facebooksChats, instant messaging, SMS/text Chats, instant messaging, SMS/text messagingmessagingWeb conferencingWeb conferencingDigital repositories (i.e. DSpace)Digital repositories (i.e. DSpace)e-portfoliose-portfolios
EDUCATIONALEDUCATIONALGAMINGGAMING
Games aren’t just for funGames aren’t just for funLearning can be funLearning can be fun
Kids have load of experienceKids have load of experienceGames are engaging and adaptable to Games are engaging and adaptable to almost any subjectalmost any subjectInteractive learning experience;Interactive learning experience;
Lessons learned from games Lessons learned from games stay with studentsstay with students
INSTITUTIONALINSTITUTIONALREPOSITORIESREPOSITORIES
What information to keep?What information to keep?Legal requirementsLegal requirementsInstitutional archivesInstitutional archives
What media will last?What media will last?CD has limited lifeCD has limited lifeFiche is ancient technologyFiche is ancient technology
INTELLIGENTINTELLIGENTSEARCHINGSEARCHING
Personal desktop search “bots” Personal desktop search “bots” Specialized search interfaces like Google Specialized search interfaces like Google ScholarScholarRemember search parameters over timeRemember search parameters over timeSearching of multiple archives, repositories, Searching of multiple archives, repositories, and databases with a single query and databases with a single query
GRID COMPUTINGGRID COMPUTING
Shared, distributed, heterogeneous Shared, distributed, heterogeneous computers computers Lots of horsepower for computational Lots of horsepower for computational needsneeds
Harness distributed cyclesHarness distributed cyclesHigh data demand is more suited to High data demand is more suited to
clusters clusters Relatively inexpensiveRelatively inexpensive
PODCASTINGPODCASTING
New means for anywhere, New means for anywhere, anytime learninganytime learning
Subscription modelSubscription modelFiles are delivered because subscribers want to Files are delivered because subscribers want to get the information regularly get the information regularly ““Feeds” via RSS (Feeds” via RSS (Really Simple SyndicationReally Simple Syndication))Usually MP3 audio formatUsually MP3 audio formatVodcasting – video enabled podcastingVodcasting – video enabled podcasting
PEER-TO-PEER PEER-TO-PEER FILE SHARING FILE SHARING
Concept is validConcept is validThere There areare lawful uses lawful usesIndustry pressure is growing forIndustry pressure is growing forContent monitoringContent monitoring
Watch for legislationWatch for legislationEDUCAUSE as voice for higher edEDUCAUSE as voice for higher ed
OUTSOURCINGOUTSOURCING
It’s like politics; It’s like politics; which side are you on?which side are you on?
Financially attractive Financially attractive Expectations high; delivery Expectations high; delivery
sometimes highsometimes highCaution - Quality variesCaution - Quality varies
Phone, What PhonePhone, What Phone
Traditional phones are fadingTraditional phones are fadingCost per call based on distance model is Cost per call based on distance model is brokenbrokenPhones in dorm rooms are only for 911Phones in dorm rooms are only for 911VoIP works, but will the funding model VoIP works, but will the funding model continue as is?continue as is?
CONVERGENCECONVERGENCEDEVICESDEVICES
All in one handheld devicesAll in one handheld devices– PhonePhone– PDAPDA– CalendarCalendar– EmailEmail– WebWeb– SMS/Text messagingSMS/Text messaging– TVTV
CONVERGENCE DEVICESCONVERGENCE DEVICES
Support issuesSupport issuesSecurity issuesSecurity issues– Lost devices, confidential data, Lost devices, confidential data,
vulnerabilities and virusesvulnerabilities and viruses– Data and usage policiesData and usage policies– Device ownershipDevice ownership