Connecting to the NC Education Cloud

Size: px
Start display at page:

Download "Connecting to the NC Education Cloud"

Transcription

1 NC Education Cloud Connecting to the NC Education Cloud March 29, 2012 Phil Emer, Friday Institute 1

2 First Things First Year one was about planning we are at month 15 Over $30M of the $34M cloud budget will be used to procure services and wares for LEAs and Charters We are focused on sustainability Our Identity and Access Management approach has gained national traction including with the SBAC We have met with over 50 vendors and providers Software as a service has made the turn NC ITS is heading into the turn Online application and content stores matter 2

3 NC Education Cloud Basics De-emphasize buying and hosting infrastructure Emphasize procuring services Raise the bar on reliability Towards 24x7 access to services The cloud isn t the backup it s the primary Defragmentation fewer providers, more competition Avoid custom integration adopt standards Fill in the gaps 3

4 Behind the Curtain Cloud Services Identity and access management Automatically create user accounts Provide mechanisms for those accounts to be used to login to many services (including IIS and SBAC assessments) Require all future providers to adhere to identity standards Data integration to automate ingestion of student, staff, parent data Instructional content services Learning object repository (LOR) Digital card catalog to search, contribute, and manage content Provisioning and procuring learning management systems Annual media and technology report (AMTR) 3.0 Automated collection and reporting Supporting readiness determinations 4

5 Identity and Access Management NC#Education#Cloud# #User#Experience 1 User%logs%into%a%cloud%service%once 2 Cloud%service%passes%user%request%to% IAM%for%authentication 4 User%granted%access%to%all %relevant%cloud%services 3 IAM%passes%user%authorization%information% back%to%cloud%service Image%Sources: Google%Apps:%% Microsoft%Live@EDU:%% NC%Public%Libraries:%% Moodle:%% Blackboard:%% NC%DPI:%% 5

6 Learning Object Repository 6

7 AMTR 3.0 7

8 In Front of the Curtain Supporting bring your own device (BYOD) Mobile device management Desktop virtualization Desktop malware protection Hosted voice over IP Wireless services and management and collaboration AS/400 hosting finance/hr system modernization Performance monitoring and management 8

9 Timeline Operate Deploy Design & Build Planning

10 NC RttT Project Deployment Roadmap 10

11 Shared infrastructure Project Summary Q1/Q Project Lead Deliverable Comple3on Date Iden3ty and Access Management Iden/ty and Access management plan Iden/ty and access management plagorm Iden/ty and access management service management Data integra/on Sammie Carter Sammie Carter Sammie Carter Sammie Carter Dra? 5 (Final) Plan Request for Proposal to NC ITS Scope of Work Request for Proposal March 2, 2012 April 1, 2012 April 13, 2012 April 16, 2012 Instruc3onal Content Services Learning object repository plagorm Learning object repository integra/on and hos/ng Learning management system James Robinson James Robinson James Robinson Joint procurement with NCCCS Request for proposal Procurement aligned with IIS April 1, 2012 May 1, 2012 August 2012 Business System Op3miza3on iseries service deployment Vendor Vendor work begins April 1, 2012 Business process review ITng Lab Finance and HR system report June 1,

12 Enterprise Services Project Summary Q1/Q Project Lead Deliverable Comple3on Date Student access to end- user devices BYOD Strategies Frank Jou Recommended Prac/ces April 13, 2012 Desktop Virtualiza/on remote hosted desktops and remote virtual applica/ons Frank Jou Feasibility Study April 20, 2012 Mobile device management (MDM) Consultant Market Study April 13, 2012 Desktop malware protec/on Dave Furiness Request for Proposal April 27, 2012 Sustainable infrastructure Wireless services and management Dave Furiness Feasibility Study April 27, 2012 Hosted IP Telephony Don Smith Market Study April 13, 2012 Server virtualiza/on/iaas Dave Furiness Feasibility Study June 30, 2012 Enterprise applica3ons /Collabora/on John Warf Google Apps Migra/on Support On- going /Collabora/on John Warf Google Apps Administrator Training Course April 20, 2012 Performance monitoring/management Performance monitoring/management end user applica/on performance management, and network monitoring and analy/cs Frank Jou Service Architecture June 15,

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

NC Education Cloud Work Plan

NC Education Cloud Work Plan NC Education Cloud Work Plan NC Education Cloud Team August 11, 2011 Page 1 Introduction This report outlines a plan for the deployment of the NC Education Cloud (NCEdCloud) program as specified in the

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager

Managing Enterprise Devices and Apps using System Center Configuration Manager Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains

More information

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing

More information

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients

More information

Cloud Compu)ng in Educa)on and Research

Cloud Compu)ng in Educa)on and Research Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research

More information

Mobile and BYOD Strategy

Mobile and BYOD Strategy Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring

More information

Building your cloud porbolio APS Connect

Building your cloud porbolio APS Connect Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy

More information

20696B: Administering System Center Configuration Manager and Intune

20696B: Administering System Center Configuration Manager and Intune 20696B: Administering System Center Configuration Manager and Intune Course Details Course Code: Duration: Notes: 20696B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,

More information

The NCED Cloud Network Infrastructure

The NCED Cloud Network Infrastructure 1 Introduction and Objective Initiative: NC Education Cloud Project Coordinator: Phil Emer We will create the NC Education Cloud (NCEdCloud) to provide a highly reliable, highly available, server infrastructure

More information

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider

More information

CLOUD AND AUTOMATION FOR SMBS: Simple strategies for success

CLOUD AND AUTOMATION FOR SMBS: Simple strategies for success CLOUD AND AUTOMATION FOR SMBS: Simple strategies for success Know what s good for you We ve all heard about the benefits of cloud technologies and automation, but should the estimated thousands of small

More information

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013 Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty

More information

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for

More information

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS20696A Managing Enterprise Devices and Apps using

More information

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.

Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients

More information

IT Strategy 2013 2017

IT Strategy 2013 2017 IT Strategy 2013 2017 V3.2 August 2013 Contents Part I Context Drivers Workplace Strategy Benefits of the Strategy Contents Part II Business Strategy Strategic Themes: Strong Line of Business Applications

More information

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g RM-C A R o a d t o y o u r C l o u d Professional Service C R M a n d C l o u d C o n s u l t i n g CRM-C Highlights! A Unique Cloud CRM Consulting service firm! Specializing in cloud CRM and Office Collaboration

More information

MPS & VPS: Not Just for Hos1ng!

MPS & VPS: Not Just for Hos1ng! MPS & VPS: Not Just for Hos1ng! Ivan Hur) Sr. Product Manager Verio Inc Privileged and Confiden/al: NDA Required for External Disclosure 2/11/10 1 Privileged and Confiden/al: NDA Required for External

More information

Evaluating Mobile Device Management

Evaluating Mobile Device Management Evaluating Mobile Device Management Lester S. Stoltzfus Director of Technology lester_stoltzfus@l-spioneers.org Michael I. DeBakey Network and Systems Administrator michael_debakey@l-spioneers.org Delivering

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

ITSM & Enterprise Mobility Management

ITSM & Enterprise Mobility Management ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does

More information

Cyber Essentials Questionnaire

Cyber Essentials Questionnaire Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

Information Technology 2016-2021 Strategic Plan

Information Technology 2016-2021 Strategic Plan Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...

More information

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over

More information

Findings from NC Education Cloud Interview and Survey Process

Findings from NC Education Cloud Interview and Survey Process Findings from NC Education Cloud Interview and Survey Process Introduction On the surface, both the NC Education Cloud (NCEdCloud) and the Instructional Improvement System (IIS) seem to be large technology

More information

2015-16 ITS Strategic Plan Enabling an Unbounded University

2015-16 ITS Strategic Plan Enabling an Unbounded University 2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave

More information

State of the States: IT Trends, Priorities and Issues

State of the States: IT Trends, Priorities and Issues State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

Building Your Cloud Strategy with Parallels and APS. Aubrey Smoot Sr. Vice President, Sales and Business Development

Building Your Cloud Strategy with Parallels and APS. Aubrey Smoot Sr. Vice President, Sales and Business Development Building Your Cloud Strategy with Parallels and APS Aubrey Smoot Sr. Vice President, Sales and Business Development Agenda Putting the Pieces Together - Self Hosted, APS Integrated, Working with a hosted

More information

Emerging Trends in Information. Impacting the States

Emerging Trends in Information. Impacting the States Emerging Trends in Information Technology and Policies Impacting the States Doug Robinson, Executive Director National Association of State Chief Information Officers About NASCIO National association

More information

County of Hanover. Board Meeting: May 28, 2014. Presentation - Information Technology Department 2014-2019 Strategic Plan

County of Hanover. Board Meeting: May 28, 2014. Presentation - Information Technology Department 2014-2019 Strategic Plan VI. Agenda Item County of Hanover Board Meeting: May 28, 2014 Subject: Summary of Agenda Item: Presentation - 2014-2019 Strategic Plan The IT 2014-2019 Strategic Plan defines goals, objectives, and strategies

More information

Roadmap to Solving Enterprise Mobility

Roadmap to Solving Enterprise Mobility Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all

More information

NETWORK SECURITY SOLUTIONS

NETWORK SECURITY SOLUTIONS NETWORK SECURITY SOLUTIONS Protecting Your Environment While Maintaining Connectivity OVERVIEW Network security and design is significantly more complex than it was even just a few years ago, and the pace

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

Adapting to a Mobile World

Adapting to a Mobile World Adapting to a Mobile World Kimberly Hancher Chief Information Officer U.S. Equal Employment Opportunity Commission March 2014 STATUS OF MOBILITY IN GOVERNMENT According to Mobile Work Exchange research:

More information

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987 BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information

More information

NC Education Cloud Identity and Access Management Working Group 10 AM Thursday April 25, 2013

NC Education Cloud Identity and Access Management Working Group 10 AM Thursday April 25, 2013 NC Education Cloud Identity and Access Management Working Group 10 AM Thursday April 25, 2013 Outline General IAM Review Current Status of IAM-Managed Service with Updated Timeline Introduce the IAM-Managed

More information

Unified Communications Overview

Unified Communications Overview A CBTS White Paper Unified Communications Overview Craig Chavis Solution Architect, CBTS 10/5/2012 www.cbts.cinbell.com Table of Contents Unified Communications Overview...3 Unified Communications as a

More information

Realizing the Value Proposition of Cloud Computing

Realizing the Value Proposition of Cloud Computing Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need

More information

Cisco estore Modernizes Shopping for IT Services

Cisco estore Modernizes Shopping for IT Services Customer Case Study Cisco estore Modernizes Shopping for IT Services Cisco IT s estore replaces multiple service request systems with unified service catalog for ordering any type of IT service. EXECUTIVE

More information

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &

More information

Ralston Public Schools - Technology Project For district Administrators

Ralston Public Schools - Technology Project For district Administrators IT EFFECTIVENESS & STRATEGIC PLANNING PROJECT Technology Strategic & Tactical Plan Executive Summary April, 2013 Contents The purpose of this document is to summarize the Technology Tactical Plan for Ralston

More information

Open Source Telephony. for Government

Open Source Telephony. for Government Open Source Telephony for Government Open Source has the power to improve established industries Open Source has the power to improve established industries and is offering a real alternative to proprietary

More information

Website Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com

Website Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com Website Design A Crash Course Monique Sherre, monique@boxcarmarke4ng.com When & Why Do We Re- Design no mobile BoxcarMarke6ng.com aesthe6c update Raincoast.com legacy CMS ABCBookWorld.com new company,

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana

More information

Management of IT environment end users and the impact of new technological solutions

Management of IT environment end users and the impact of new technological solutions Management of IT environment end users and the impact of new technological solutions Eva Oláhová Slovak University of Agriculture in Nitra Faculty of Economics and Management, Centre of Information Technologies

More information

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1 BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President

More information

Important Software Technologies and Trends: 2004

Important Software Technologies and Trends: 2004 Important Software Technologies and Trends: 2004 January 29, 2004 Laurie M. Orlov Vice President, Research Director Forrester Research Do technology investments still matter? Theme The technology recession

More information

Mobilize your Enterprise in 60 Minutes!

Mobilize your Enterprise in 60 Minutes! Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

Oracle Solu?ons for Higher Educa?on

Oracle Solu?ons for Higher Educa?on Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement

More information

Accenture Development Partnerships Cloud Lessons Learned

Accenture Development Partnerships Cloud Lessons Learned Accenture Development Partnerships Cloud Lessons Learned Agenda Introducing Accenture Development Partnerships Speaking The Same Language Best Practices For Cloud Projects Project Based Lessons Learned

More information

Data Center Op+miza+on

Data Center Op+miza+on Data Center Op+miza+on Sept 2014 Jitender Sunke VP Applications, ITC Holdings Ajay Arora Sr. Director, Centroid Systems Justin Youngs Principal Architect, Oracle 1 Agenda! Introductions! Oracle VCA An

More information

Managing Mobility in the BYOD Era:

Managing Mobility in the BYOD Era: Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in

More information

Enterprise Data Center Networks

Enterprise Data Center Networks Enterprise Data Center Networks Isabelle Guis Big Switch Networks Vice President of Outbound Marketing ONF Market Education Committee Chair 1 This Session Objectives Leave with an understanding of Data

More information

Department of Technology Services

Department of Technology Services Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic

More information

An Econocom Group company. Your partner in the transi4on towards Mobile IT

An Econocom Group company. Your partner in the transi4on towards Mobile IT An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona The Legal Cloud What is Cloud Computing? Working in the Cloud Cloud Computing is A way to work

More information

Course 20688A: Managing and Maintaining Windows 8

Course 20688A: Managing and Maintaining Windows 8 Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how

More information

Mobile Security and Management Opportunities for Telcos and Service Providers

Mobile Security and Management Opportunities for Telcos and Service Providers Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile

More information

Cisco Data Center Optimization Services

Cisco Data Center Optimization Services Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization

More information

Lot 3 Service Specification MANAGED MOBILE SERVICE

Lot 3 Service Specification MANAGED MOBILE SERVICE Lot 3 Service Specification MANAGED MOBILE SERVICE Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED MOBILE SERVICE Fujitsu Managed Mobile is a global service providing lifecycle management services

More information

2013 Cloud Storage Expectations

2013 Cloud Storage Expectations 2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout

More information

Managed Services. An essen/al set of tools for today's businesses

Managed Services. An essen/al set of tools for today's businesses Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng

More information

K-12 Perspective on Cloud Computing Services: A Vision for Shared Services and Cloud Computing in North Carolina s Schools

K-12 Perspective on Cloud Computing Services: A Vision for Shared Services and Cloud Computing in North Carolina s Schools K-12 Perspective on Cloud Computing Services: A Vision for Shared Services and Cloud Computing in North Carolina s Schools Neill Kimrey Director, Instructional Technology NCDPI February 2010 How does Wikipedia

More information

Kantara Initiative Workshop. Identity as Security Glue for the Cloud. Matthew Gardiner CA Inc. & Chris Sharp MEDecision. Title of Presentation

Kantara Initiative Workshop. Identity as Security Glue for the Cloud. Matthew Gardiner CA Inc. & Chris Sharp MEDecision. Title of Presentation Kantara Initiative Workshop Title of Presentation Identity as Security Glue for the Cloud Matthew Gardiner CA Inc. & Chris Sharp MEDecision Identity is Central to Cloud Security & Management 2 3 The Cloud

More information

Information Technology Services. Roadmap 2014-2016

Information Technology Services. Roadmap 2014-2016 Information Technology Services Roadmap 2014-2016 Introduction This document charts the direction for Humboldt State University s Information Technology Services department over the next three years. It

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

Unlocking Potential Conference 2015 #AUP

Unlocking Potential Conference 2015 #AUP Conference 2015 To Host or Not To Host? Karl Robinson Cloud Adoption Survey In July 2015, we asked our network of 1,000 senior business personnel five questions about their cloud adoption strategy, frustrations

More information

Deep Dive BYOD, COPE & MDM

Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD

More information

Remote Management Services Portfolio Overview

Remote Management Services Portfolio Overview Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On

More information

Strategic Plan 2015-2017

Strategic Plan 2015-2017 Strategic Plan 2015-2017 Page 1 Table of Contents Information Technology Mission... 5 Information Technology Vision Statement... 5 Information Technology Values... 5 The Information Technology s Alignment

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring

More information

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by:

CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by: CARLETON UNIVERSITY POSITION DESCRIPTION Position Title: Manager, HR Systems Position No.: 298879 Reports to: Department: Assistant Director HR, Talent Programs Human Resources Approved by: (Incumbent/Date)

More information

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute

More information

Eng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg

Eng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg Ministry of Health and Population Egypt Eng. Ismail Torky Chief Information Technology Officer istorky@mohp.gov.eg www.mohp.gov.eg Without planning Disease Surv. Health Unit HIS, EIS GIS Apps. Data Center

More information

5 Add-ons to Deliver Value to Customer Projects

5 Add-ons to Deliver Value to Customer Projects 5 Add-ons to Deliver Value to Customer Projects David Bowen Product Manager Peter Yeung Director of Business Development The Choice for Leaders in Digital Delivery Model Sites Managed service Scales by

More information

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD

More information

Enterprise Mobile Management

Enterprise Mobile Management Enterprise Mobile Management Enterprise Mobile Management Ben Santing, HP Changing Face of Enterprise Mobility Consumerisation has transformed mobility Line between corporate and private blurring Cloud

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization You have critical data scattered throughout your organization on back-office servers, desktops, mobile endpoints

More information

VMware Cloud Automation Design and Deploy IaaS Service

VMware Cloud Automation Design and Deploy IaaS Service DATASHEET VMware Cloud Automation AT A GLANCE The VMware Cloud Automation Design and Deploy IaaS Service expands the power of virtualization and moves IT services away from existing infrastructure delivery

More information

The Future of Service Management: Addressing The Impact of Consumeriza<on

The Future of Service Management: Addressing The Impact of Consumeriza<on The Future of Service Management: Addressing The Impact of Consumeriza

More information

HP FlexNetwork Architecture

HP FlexNetwork Architecture HP Networking HP Networking 1 HP FlexNetwork Architecture FlexFabric Flex Campus FlexBranch FlexManagement Converges Network Management and Orchestration Open Scalable Secure Agile Consistent 2 Innovative

More information

Cisco Secure BYOD Solution

Cisco Secure BYOD Solution Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice

More information

Fundamentals for EHR Success

Fundamentals for EHR Success Fundamentals for EHR Success Angie Chew Monksfield Principal of Portfolio Lim Shih Hsien Deputy Director, Information Security Knowing the Pain Points This material contains information that is confidential

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

Title goes here. Critical Access Hospital Workshop Affordable Information Technology For Smaller Health Care Organizations

Title goes here. Critical Access Hospital Workshop Affordable Information Technology For Smaller Health Care Organizations Critical Access Hospital Workshop Affordable Information Technology For Smaller Health Care Organizations WIPFLI HEALTH CARE PRACTICE Title goes here February 4, 2010 8:30 a.m. 10:15 a.m. Date or subtitle

More information

Microsoft 20336 - Core Solutions of Microsoft Lync Server 2013

Microsoft 20336 - Core Solutions of Microsoft Lync Server 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20336 - Core Solutions of Microsoft Lync Server 2013 Length 5 days Price $4070.00 (inc GST) Version B Overview This instructor-led course teaches IT professionals

More information

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT SAM Benefits Overview SAM SAM is critical to managing an IT environment because effectiveness is seriously compromised when an organization doesn t know what software assets it has, where they are located,

More information

Dell Desktop Virtualization Solutions Enterprise Offering Overview

Dell Desktop Virtualization Solutions Enterprise Offering Overview Dell Desktop Virtualization Solutions Enterprise Offering Overview Dell Desktop Virtualization Solutions Enterprise are designed to help you get up and running faster, with less risk, and optimal end user

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Overview of SOTI. www.so%.net

Overview of SOTI. www.so%.net Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information