Connecting to the NC Education Cloud
|
|
- Earl Fox
- 8 years ago
- Views:
Transcription
1 NC Education Cloud Connecting to the NC Education Cloud March 29, 2012 Phil Emer, Friday Institute 1
2 First Things First Year one was about planning we are at month 15 Over $30M of the $34M cloud budget will be used to procure services and wares for LEAs and Charters We are focused on sustainability Our Identity and Access Management approach has gained national traction including with the SBAC We have met with over 50 vendors and providers Software as a service has made the turn NC ITS is heading into the turn Online application and content stores matter 2
3 NC Education Cloud Basics De-emphasize buying and hosting infrastructure Emphasize procuring services Raise the bar on reliability Towards 24x7 access to services The cloud isn t the backup it s the primary Defragmentation fewer providers, more competition Avoid custom integration adopt standards Fill in the gaps 3
4 Behind the Curtain Cloud Services Identity and access management Automatically create user accounts Provide mechanisms for those accounts to be used to login to many services (including IIS and SBAC assessments) Require all future providers to adhere to identity standards Data integration to automate ingestion of student, staff, parent data Instructional content services Learning object repository (LOR) Digital card catalog to search, contribute, and manage content Provisioning and procuring learning management systems Annual media and technology report (AMTR) 3.0 Automated collection and reporting Supporting readiness determinations 4
5 Identity and Access Management NC#Education#Cloud# #User#Experience 1 User%logs%into%a%cloud%service%once 2 Cloud%service%passes%user%request%to% IAM%for%authentication 4 User%granted%access%to%all %relevant%cloud%services 3 IAM%passes%user%authorization%information% back%to%cloud%service Image%Sources: Google%Apps:%% Microsoft%Live@EDU:%% NC%Public%Libraries:%% Moodle:%% Blackboard:%% NC%DPI:%% 5
6 Learning Object Repository 6
7 AMTR 3.0 7
8 In Front of the Curtain Supporting bring your own device (BYOD) Mobile device management Desktop virtualization Desktop malware protection Hosted voice over IP Wireless services and management and collaboration AS/400 hosting finance/hr system modernization Performance monitoring and management 8
9 Timeline Operate Deploy Design & Build Planning
10 NC RttT Project Deployment Roadmap 10
11 Shared infrastructure Project Summary Q1/Q Project Lead Deliverable Comple3on Date Iden3ty and Access Management Iden/ty and Access management plan Iden/ty and access management plagorm Iden/ty and access management service management Data integra/on Sammie Carter Sammie Carter Sammie Carter Sammie Carter Dra? 5 (Final) Plan Request for Proposal to NC ITS Scope of Work Request for Proposal March 2, 2012 April 1, 2012 April 13, 2012 April 16, 2012 Instruc3onal Content Services Learning object repository plagorm Learning object repository integra/on and hos/ng Learning management system James Robinson James Robinson James Robinson Joint procurement with NCCCS Request for proposal Procurement aligned with IIS April 1, 2012 May 1, 2012 August 2012 Business System Op3miza3on iseries service deployment Vendor Vendor work begins April 1, 2012 Business process review ITng Lab Finance and HR system report June 1,
12 Enterprise Services Project Summary Q1/Q Project Lead Deliverable Comple3on Date Student access to end- user devices BYOD Strategies Frank Jou Recommended Prac/ces April 13, 2012 Desktop Virtualiza/on remote hosted desktops and remote virtual applica/ons Frank Jou Feasibility Study April 20, 2012 Mobile device management (MDM) Consultant Market Study April 13, 2012 Desktop malware protec/on Dave Furiness Request for Proposal April 27, 2012 Sustainable infrastructure Wireless services and management Dave Furiness Feasibility Study April 27, 2012 Hosted IP Telephony Don Smith Market Study April 13, 2012 Server virtualiza/on/iaas Dave Furiness Feasibility Study June 30, 2012 Enterprise applica3ons /Collabora/on John Warf Google Apps Migra/on Support On- going /Collabora/on John Warf Google Apps Administrator Training Course April 20, 2012 Performance monitoring/management Performance monitoring/management end user applica/on performance management, and network monitoring and analy/cs Frank Jou Service Architecture June 15,
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
More informationNC Education Cloud Work Plan
NC Education Cloud Work Plan NC Education Cloud Team August 11, 2011 Page 1 Introduction This report outlines a plan for the deployment of the NC Education Cloud (NCEdCloud) program as specified in the
More informationManaging Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
More informationCourse Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led
Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing
More informationDEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment
More informationManaging Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients
More informationCloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
More informationMobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
More informationBuilding your cloud porbolio APS Connect
Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy
More information20696B: Administering System Center Configuration Manager and Intune
20696B: Administering System Center Configuration Manager and Intune Course Details Course Code: Duration: Notes: 20696B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,
More informationThe NCED Cloud Network Infrastructure
1 Introduction and Objective Initiative: NC Education Cloud Project Coordinator: Phil Emer We will create the NC Education Cloud (NCEdCloud) to provide a highly reliable, highly available, server infrastructure
More informationBPO. Accerela*ng Revenue Enhancements Through Sales Support Services
BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider
More informationCLOUD AND AUTOMATION FOR SMBS: Simple strategies for success
CLOUD AND AUTOMATION FOR SMBS: Simple strategies for success Know what s good for you We ve all heard about the benefits of cloud technologies and automation, but should the estimated thousands of small
More informationUsing FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty
More informationQubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for
More informationCourse MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS20696A Managing Enterprise Devices and Apps using
More informationExpert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.
Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients
More informationIT Strategy 2013 2017
IT Strategy 2013 2017 V3.2 August 2013 Contents Part I Context Drivers Workplace Strategy Benefits of the Strategy Contents Part II Business Strategy Strategic Themes: Strong Line of Business Applications
More informationA R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g
RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration
More informationMPS & VPS: Not Just for Hos1ng!
MPS & VPS: Not Just for Hos1ng! Ivan Hur) Sr. Product Manager Verio Inc Privileged and Confiden/al: NDA Required for External Disclosure 2/11/10 1 Privileged and Confiden/al: NDA Required for External
More informationEvaluating Mobile Device Management
Evaluating Mobile Device Management Lester S. Stoltzfus Director of Technology lester_stoltzfus@l-spioneers.org Michael I. DeBakey Network and Systems Administrator michael_debakey@l-spioneers.org Delivering
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationITSM & Enterprise Mobility Management
ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does
More informationCyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
More informationProject Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
More informationInformation Technology 2016-2021 Strategic Plan
Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...
More informationUnderstanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology
Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over
More informationFindings from NC Education Cloud Interview and Survey Process
Findings from NC Education Cloud Interview and Survey Process Introduction On the surface, both the NC Education Cloud (NCEdCloud) and the Instructional Improvement System (IIS) seem to be large technology
More information2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
More informationState of the States: IT Trends, Priorities and Issues
State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are
More informationSophos Mobile Control
Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce
More informationBuilding Your Cloud Strategy with Parallels and APS. Aubrey Smoot Sr. Vice President, Sales and Business Development
Building Your Cloud Strategy with Parallels and APS Aubrey Smoot Sr. Vice President, Sales and Business Development Agenda Putting the Pieces Together - Self Hosted, APS Integrated, Working with a hosted
More informationEmerging Trends in Information. Impacting the States
Emerging Trends in Information Technology and Policies Impacting the States Doug Robinson, Executive Director National Association of State Chief Information Officers About NASCIO National association
More informationCounty of Hanover. Board Meeting: May 28, 2014. Presentation - Information Technology Department 2014-2019 Strategic Plan
VI. Agenda Item County of Hanover Board Meeting: May 28, 2014 Subject: Summary of Agenda Item: Presentation - 2014-2019 Strategic Plan The IT 2014-2019 Strategic Plan defines goals, objectives, and strategies
More informationRoadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
More informationNETWORK SECURITY SOLUTIONS
NETWORK SECURITY SOLUTIONS Protecting Your Environment While Maintaining Connectivity OVERVIEW Network security and design is significantly more complex than it was even just a few years ago, and the pace
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationAdapting to a Mobile World
Adapting to a Mobile World Kimberly Hancher Chief Information Officer U.S. Equal Employment Opportunity Commission March 2014 STATUS OF MOBILITY IN GOVERNMENT According to Mobile Work Exchange research:
More informationBYOD Strategy and Solutions. www.nexusis.com 877.286.3987
BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information
More informationNC Education Cloud Identity and Access Management Working Group 10 AM Thursday April 25, 2013
NC Education Cloud Identity and Access Management Working Group 10 AM Thursday April 25, 2013 Outline General IAM Review Current Status of IAM-Managed Service with Updated Timeline Introduce the IAM-Managed
More informationUnified Communications Overview
A CBTS White Paper Unified Communications Overview Craig Chavis Solution Architect, CBTS 10/5/2012 www.cbts.cinbell.com Table of Contents Unified Communications Overview...3 Unified Communications as a
More informationRealizing the Value Proposition of Cloud Computing
Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need
More informationCisco estore Modernizes Shopping for IT Services
Customer Case Study Cisco estore Modernizes Shopping for IT Services Cisco IT s estore replaces multiple service request systems with unified service catalog for ordering any type of IT service. EXECUTIVE
More informationModernizing EDI: How to Cut Your Migra6on Costs by Over 50%
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &
More informationRalston Public Schools - Technology Project For district Administrators
IT EFFECTIVENESS & STRATEGIC PLANNING PROJECT Technology Strategic & Tactical Plan Executive Summary April, 2013 Contents The purpose of this document is to summarize the Technology Tactical Plan for Ralston
More informationOpen Source Telephony. for Government
Open Source Telephony for Government Open Source has the power to improve established industries Open Source has the power to improve established industries and is offering a real alternative to proprietary
More informationWebsite Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com
Website Design A Crash Course Monique Sherre, monique@boxcarmarke4ng.com When & Why Do We Re- Design no mobile BoxcarMarke6ng.com aesthe6c update Raincoast.com legacy CMS ABCBookWorld.com new company,
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana
More informationManagement of IT environment end users and the impact of new technological solutions
Management of IT environment end users and the impact of new technological solutions Eva Oláhová Slovak University of Agriculture in Nitra Faculty of Economics and Management, Centre of Information Technologies
More informationBT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
More informationImportant Software Technologies and Trends: 2004
Important Software Technologies and Trends: 2004 January 29, 2004 Laurie M. Orlov Vice President, Research Director Forrester Research Do technology investments still matter? Theme The technology recession
More informationMobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationOracle Solu?ons for Higher Educa?on
Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement
More informationAccenture Development Partnerships Cloud Lessons Learned
Accenture Development Partnerships Cloud Lessons Learned Agenda Introducing Accenture Development Partnerships Speaking The Same Language Best Practices For Cloud Projects Project Based Lessons Learned
More informationData Center Op+miza+on
Data Center Op+miza+on Sept 2014 Jitender Sunke VP Applications, ITC Holdings Ajay Arora Sr. Director, Centroid Systems Justin Youngs Principal Architect, Oracle 1 Agenda! Introductions! Oracle VCA An
More informationManaging Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in
More informationEnterprise Data Center Networks
Enterprise Data Center Networks Isabelle Guis Big Switch Networks Vice President of Outbound Marketing ONF Market Education Committee Chair 1 This Session Objectives Leave with an understanding of Data
More informationDepartment of Technology Services
Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic
More informationAn Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
More informationVMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
More informationNAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat
NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona The Legal Cloud What is Cloud Computing? Working in the Cloud Cloud Computing is A way to work
More informationCourse 20688A: Managing and Maintaining Windows 8
Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how
More informationMobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
More informationCisco Data Center Optimization Services
Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization
More informationLot 3 Service Specification MANAGED MOBILE SERVICE
Lot 3 Service Specification MANAGED MOBILE SERVICE Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED MOBILE SERVICE Fujitsu Managed Mobile is a global service providing lifecycle management services
More information2013 Cloud Storage Expectations
2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout
More informationManaged Services. An essen/al set of tools for today's businesses
Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng
More informationK-12 Perspective on Cloud Computing Services: A Vision for Shared Services and Cloud Computing in North Carolina s Schools
K-12 Perspective on Cloud Computing Services: A Vision for Shared Services and Cloud Computing in North Carolina s Schools Neill Kimrey Director, Instructional Technology NCDPI February 2010 How does Wikipedia
More informationKantara Initiative Workshop. Identity as Security Glue for the Cloud. Matthew Gardiner CA Inc. & Chris Sharp MEDecision. Title of Presentation
Kantara Initiative Workshop Title of Presentation Identity as Security Glue for the Cloud Matthew Gardiner CA Inc. & Chris Sharp MEDecision Identity is Central to Cloud Security & Management 2 3 The Cloud
More informationInformation Technology Services. Roadmap 2014-2016
Information Technology Services Roadmap 2014-2016 Introduction This document charts the direction for Humboldt State University s Information Technology Services department over the next three years. It
More informationT141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
More informationUnlocking Potential Conference 2015 #AUP
Conference 2015 To Host or Not To Host? Karl Robinson Cloud Adoption Survey In July 2015, we asked our network of 1,000 senior business personnel five questions about their cloud adoption strategy, frustrations
More informationDeep Dive BYOD, COPE & MDM
Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD
More informationRemote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
More informationStrategic Plan 2015-2017
Strategic Plan 2015-2017 Page 1 Table of Contents Information Technology Mission... 5 Information Technology Vision Statement... 5 Information Technology Values... 5 The Information Technology s Alignment
More informationGOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
More informationCREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring
More informationCARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by:
CARLETON UNIVERSITY POSITION DESCRIPTION Position Title: Manager, HR Systems Position No.: 298879 Reports to: Department: Assistant Director HR, Talent Programs Human Resources Approved by: (Incumbent/Date)
More informationData Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
More informationEng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg
Ministry of Health and Population Egypt Eng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg Without planning Disease Surv. Health Unit HIS, EIS GIS Apps. Data Center
More information5 Add-ons to Deliver Value to Customer Projects
5 Add-ons to Deliver Value to Customer Projects David Bowen Product Manager Peter Yeung Director of Business Development The Choice for Leaders in Digital Delivery Model Sites Managed service Scales by
More informationStephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan
Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD
More informationEnterprise Mobile Management
Enterprise Mobile Management Enterprise Mobile Management Ben Santing, HP Changing Face of Enterprise Mobility Consumerisation has transformed mobility Line between corporate and private blurring Cloud
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationThe Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization
The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization You have critical data scattered throughout your organization on back-office servers, desktops, mobile endpoints
More informationVMware Cloud Automation Design and Deploy IaaS Service
DATASHEET VMware Cloud Automation AT A GLANCE The VMware Cloud Automation Design and Deploy IaaS Service expands the power of virtualization and moves IT services away from existing infrastructure delivery
More informationThe Future of Service Management: Addressing The Impact of Consumeriza<on
The Future of Service Management: Addressing The Impact of Consumeriza
More informationHP FlexNetwork Architecture
HP Networking HP Networking 1 HP FlexNetwork Architecture FlexFabric Flex Campus FlexBranch FlexManagement Converges Network Management and Orchestration Open Scalable Secure Agile Consistent 2 Innovative
More informationCisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationFundamentals for EHR Success
Fundamentals for EHR Success Angie Chew Monksfield Principal of Portfolio Lim Shih Hsien Deputy Director, Information Security Knowing the Pain Points This material contains information that is confidential
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationTitle goes here. Critical Access Hospital Workshop Affordable Information Technology For Smaller Health Care Organizations
Critical Access Hospital Workshop Affordable Information Technology For Smaller Health Care Organizations WIPFLI HEALTH CARE PRACTICE Title goes here February 4, 2010 8:30 a.m. 10:15 a.m. Date or subtitle
More informationMicrosoft 20336 - Core Solutions of Microsoft Lync Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20336 - Core Solutions of Microsoft Lync Server 2013 Length 5 days Price $4070.00 (inc GST) Version B Overview This instructor-led course teaches IT professionals
More informationSAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT
SAM Benefits Overview SAM SAM is critical to managing an IT environment because effectiveness is seriously compromised when an organization doesn t know what software assets it has, where they are located,
More informationDell Desktop Virtualization Solutions Enterprise Offering Overview
Dell Desktop Virtualization Solutions Enterprise Offering Overview Dell Desktop Virtualization Solutions Enterprise are designed to help you get up and running faster, with less risk, and optimal end user
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationOverview of SOTI. www.so%.net
Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More information