Connecting to the NC Education Cloud
|
|
|
- Earl Fox
- 10 years ago
- Views:
Transcription
1 NC Education Cloud Connecting to the NC Education Cloud March 29, 2012 Phil Emer, Friday Institute 1
2 First Things First Year one was about planning we are at month 15 Over $30M of the $34M cloud budget will be used to procure services and wares for LEAs and Charters We are focused on sustainability Our Identity and Access Management approach has gained national traction including with the SBAC We have met with over 50 vendors and providers Software as a service has made the turn NC ITS is heading into the turn Online application and content stores matter 2
3 NC Education Cloud Basics De-emphasize buying and hosting infrastructure Emphasize procuring services Raise the bar on reliability Towards 24x7 access to services The cloud isn t the backup it s the primary Defragmentation fewer providers, more competition Avoid custom integration adopt standards Fill in the gaps 3
4 Behind the Curtain Cloud Services Identity and access management Automatically create user accounts Provide mechanisms for those accounts to be used to login to many services (including IIS and SBAC assessments) Require all future providers to adhere to identity standards Data integration to automate ingestion of student, staff, parent data Instructional content services Learning object repository (LOR) Digital card catalog to search, contribute, and manage content Provisioning and procuring learning management systems Annual media and technology report (AMTR) 3.0 Automated collection and reporting Supporting readiness determinations 4
5 Identity and Access Management NC#Education#Cloud# #User#Experience 1 User%logs%into%a%cloud%service%once 2 Cloud%service%passes%user%request%to% IAM%for%authentication 4 User%granted%access%to%all %relevant%cloud%services 3 IAM%passes%user%authorization%information% back%to%cloud%service Image%Sources: Google%Apps:%% Microsoft%Live@EDU:%% NC%Public%Libraries:%% Moodle:%% Blackboard:%% NC%DPI:%% 5
6 Learning Object Repository 6
7 AMTR 3.0 7
8 In Front of the Curtain Supporting bring your own device (BYOD) Mobile device management Desktop virtualization Desktop malware protection Hosted voice over IP Wireless services and management and collaboration AS/400 hosting finance/hr system modernization Performance monitoring and management 8
9 Timeline Operate Deploy Design & Build Planning
10 NC RttT Project Deployment Roadmap 10
11 Shared infrastructure Project Summary Q1/Q Project Lead Deliverable Comple3on Date Iden3ty and Access Management Iden/ty and Access management plan Iden/ty and access management plagorm Iden/ty and access management service management Data integra/on Sammie Carter Sammie Carter Sammie Carter Sammie Carter Dra? 5 (Final) Plan Request for Proposal to NC ITS Scope of Work Request for Proposal March 2, 2012 April 1, 2012 April 13, 2012 April 16, 2012 Instruc3onal Content Services Learning object repository plagorm Learning object repository integra/on and hos/ng Learning management system James Robinson James Robinson James Robinson Joint procurement with NCCCS Request for proposal Procurement aligned with IIS April 1, 2012 May 1, 2012 August 2012 Business System Op3miza3on iseries service deployment Vendor Vendor work begins April 1, 2012 Business process review ITng Lab Finance and HR system report June 1,
12 Enterprise Services Project Summary Q1/Q Project Lead Deliverable Comple3on Date Student access to end- user devices BYOD Strategies Frank Jou Recommended Prac/ces April 13, 2012 Desktop Virtualiza/on remote hosted desktops and remote virtual applica/ons Frank Jou Feasibility Study April 20, 2012 Mobile device management (MDM) Consultant Market Study April 13, 2012 Desktop malware protec/on Dave Furiness Request for Proposal April 27, 2012 Sustainable infrastructure Wireless services and management Dave Furiness Feasibility Study April 27, 2012 Hosted IP Telephony Don Smith Market Study April 13, 2012 Server virtualiza/on/iaas Dave Furiness Feasibility Study June 30, 2012 Enterprise applica3ons /Collabora/on John Warf Google Apps Migra/on Support On- going /Collabora/on John Warf Google Apps Administrator Training Course April 20, 2012 Performance monitoring/management Performance monitoring/management end user applica/on performance management, and network monitoring and analy/cs Frank Jou Service Architecture June 15,
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
NC Education Cloud Work Plan
NC Education Cloud Work Plan NC Education Cloud Team August 11, 2011 Page 1 Introduction This report outlines a plan for the deployment of the NC Education Cloud (NCEdCloud) program as specified in the
Managing Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led
Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients
Cloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
Mobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
Building your cloud porbolio APS Connect
Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy
20696B: Administering System Center Configuration Manager and Intune
20696B: Administering System Center Configuration Manager and Intune Course Details Course Code: Duration: Notes: 20696B 5 days This course syllabus should be used to determine whether the course is appropriate
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management
Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management Presented by: Toby Emden Prac0ce Director Iden0ty Management and Access Governance Agenda Typical Business Drivers for
Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: [email protected] Web: www.discoveritt.com Course MS20696A Managing Enterprise Devices and Apps using
Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks.
Expert. Trusted. Effective. IT managed services tailored to you. From Modern Networks. A Complete End-to-End Portfolio Established in 1999, Modern Networks is a managed service provider helping clients
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
ITSM & Enterprise Mobility Management
ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does
Cyber Essentials Questionnaire
Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.
Project Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
Information Technology 2016-2021 Strategic Plan
Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...
Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology
Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over
2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
State of the States: IT Trends, Priorities and Issues
State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are
Sophos Mobile Control
Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce
County of Hanover. Board Meeting: May 28, 2014. Presentation - Information Technology Department 2014-2019 Strategic Plan
VI. Agenda Item County of Hanover Board Meeting: May 28, 2014 Subject: Summary of Agenda Item: Presentation - 2014-2019 Strategic Plan The IT 2014-2019 Strategic Plan defines goals, objectives, and strategies
Roadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
NETWORK SECURITY SOLUTIONS
NETWORK SECURITY SOLUTIONS Protecting Your Environment While Maintaining Connectivity OVERVIEW Network security and design is significantly more complex than it was even just a few years ago, and the pace
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
BYOD Strategy and Solutions. www.nexusis.com 877.286.3987
BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information
Unified Communications Overview
A CBTS White Paper Unified Communications Overview Craig Chavis Solution Architect, CBTS 10/5/2012 www.cbts.cinbell.com Table of Contents Unified Communications Overview...3 Unified Communications as a
Realizing the Value Proposition of Cloud Computing
Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need
Cisco estore Modernizes Shopping for IT Services
Customer Case Study Cisco estore Modernizes Shopping for IT Services Cisco IT s estore replaces multiple service request systems with unified service catalog for ordering any type of IT service. EXECUTIVE
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%
Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &
Open Source Telephony. for Government
Open Source Telephony for Government Open Source has the power to improve established industries Open Source has the power to improve established industries and is offering a real alternative to proprietary
Website Design. A Crash Course. Monique Sherre, [email protected]
Website Design A Crash Course Monique Sherre, [email protected] When & Why Do We Re- Design no mobile BoxcarMarke6ng.com aesthe6c update Raincoast.com legacy CMS ABCBookWorld.com new company,
BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
Mobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Accenture Development Partnerships Cloud Lessons Learned
Accenture Development Partnerships Cloud Lessons Learned Agenda Introducing Accenture Development Partnerships Speaking The Same Language Best Practices For Cloud Projects Project Based Lessons Learned
Data Center Op+miza+on
Data Center Op+miza+on Sept 2014 Jitender Sunke VP Applications, ITC Holdings Ajay Arora Sr. Director, Centroid Systems Justin Youngs Principal Architect, Oracle 1 Agenda! Introductions! Oracle VCA An
Managing Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services [email protected] BYOD is Accelerating 350 million employee-owned devices in
Enterprise Data Center Networks
Enterprise Data Center Networks Isabelle Guis Big Switch Networks Vice President of Outbound Marketing ONF Market Education Committee Chair 1 This Session Objectives Leave with an understanding of Data
Department of Technology Services
Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic
An Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
Course 20688A: Managing and Maintaining Windows 8
Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how
Mobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
Cisco Data Center Optimization Services
Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization
Information Technology Services. Roadmap 2014-2016
Information Technology Services Roadmap 2014-2016 Introduction This document charts the direction for Humboldt State University s Information Technology Services department over the next three years. It
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
Deep Dive BYOD, COPE & MDM
Deep Dive BYOD, COPE & MDM Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD
Remote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE
CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring
CARLETON UNIVERSITY POSITION DESCRIPTION. Position Title: Manager, HR Systems Position No.: 298879. Approved by:
CARLETON UNIVERSITY POSITION DESCRIPTION Position Title: Manager, HR Systems Position No.: 298879 Reports to: Department: Assistant Director HR, Talent Programs Human Resources Approved by: (Incumbent/Date)
Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
Eng. Ismail Torky Chief Information Technology Officer [email protected] www.mohp.gov.eg
Ministry of Health and Population Egypt Eng. Ismail Torky Chief Information Technology Officer [email protected] www.mohp.gov.eg Without planning Disease Surv. Health Unit HIS, EIS GIS Apps. Data Center
Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan
Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
VMware Cloud Automation Design and Deploy IaaS Service
DATASHEET VMware Cloud Automation AT A GLANCE The VMware Cloud Automation Design and Deploy IaaS Service expands the power of virtualization and moves IT services away from existing infrastructure delivery
HP FlexNetwork Architecture
HP Networking HP Networking 1 HP FlexNetwork Architecture FlexFabric Flex Campus FlexBranch FlexManagement Converges Network Management and Orchestration Open Scalable Secure Agile Consistent 2 Innovative
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
Title goes here. Critical Access Hospital Workshop Affordable Information Technology For Smaller Health Care Organizations
Critical Access Hospital Workshop Affordable Information Technology For Smaller Health Care Organizations WIPFLI HEALTH CARE PRACTICE Title goes here February 4, 2010 8:30 a.m. 10:15 a.m. Date or subtitle
Microsoft 20336 - Core Solutions of Microsoft Lync Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20336 - Core Solutions of Microsoft Lync Server 2013 Length 5 days Price $4070.00 (inc GST) Version B Overview This instructor-led course teaches IT professionals
SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT
SAM Benefits Overview SAM SAM is critical to managing an IT environment because effectiveness is seriously compromised when an organization doesn t know what software assets it has, where they are located,
Dell Desktop Virtualization Solutions Enterprise Offering Overview
Dell Desktop Virtualization Solutions Enterprise Offering Overview Dell Desktop Virtualization Solutions Enterprise are designed to help you get up and running faster, with less risk, and optimal end user
Overview of SOTI. www.so%.net
Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
