Presented to Cornell Trustees. Ted Dodds CIO and VP Cornell University Thursday, March 28, 2013
|
|
- Hilda Bridges
- 8 years ago
- Views:
Transcription
1 Presented to Cornell Trustees Ted Dodds CIO and VP Cornell University Thursday, March 28, 2013
2 is is becoming
3 Cost Cost is a complexity challenge Common Infrastructure Complexity Planning Virtualization Cloud services Managed desktop Software consolidation Scale/Value
4 is a community 54% 46% 60% 40% Units Center Units Center IT staff IT staff
5 Central IT is rightsized FY09 FY10 FY11 FY12 FY13 0 FY09 FY10 FY11 FY12 FY13 FUNDING STAFF
6 is multiple organizations Deans, VPs 55% of IT staff work in colleges, schools, units
7
8
9 is well connected
10 is well connected
11 1,500 web sites, 9.5M hits/day 3,800 wi-fi access points, 200 buildings 28,000 active network ports 39,000 people using 103,000 devices is well connected
12 is connected to the world
13 is more than 1,100 software applications
14 is structured development of new IT services Identify Service Need Capture and refine the idea Determine Type Service/Informatio n Request? Change to existing service? New service? N IT Service Desk IT Request? Change Mgmt? Project Initiation? Y Governance/ Advisory committee Y Service Development & Project Initiation Develop Project Proposal Cost & Pricing Plan Service Requirements Resource Plan Service Levels Service Metrics Service Quality Service Roadmap Service Development Checklist Keep for future review Notify client of service status N Review move forward? Y Develop Opportunity Statement Have Leadership support? Know who needs to be involved? Resources could be available? Is the technology new?
15 is a catalogue of services
16 is cloud services 24,000 faculty/staff on Office ,000 students use Google mail 83,000 alumni forward to cornell.edu 2M incoming messages daily, 70% blocked 1.5M outgoing messages sent daily
17 is cloud services Office productivity Exchange, Word, Excel, Powerpoint, Sharepoint Student and Faculty Portfolios Digication, Mahara High Performance Computing RedCloud, Amazon Web Services, Azure Staff Skill Building SkillSoft Survey Tools Qualtrix Plagiarism Detection Turnitin Video Conferencing WebEx Multimedia Storage and Delivery Kaltura Human Resource Management WorkDay Customer Relationship SalesForce, Microsoft CRM Knowledge Management RightAnswers, IntelliResponse Website Hosting & Content Acquia/Drupal, Edublogs, Bluehost
18 is Red Cloud
19 is Cyber Security Threat Assessment External expertise Internal practices Incident assessment Directed change ITSO learning Reassess threats Remediation and Improvement Breach Prevention Policies Practices Technologies Awareness Monitoring Best practices Decision-making Breach Management 19
20 Student Use Content is increasingly focused on learning 100% Time Time 95% of all Ithaca-based students use BlackBoard, learning management system
21 is increasingly focused on learning Lecture capture etextbooks Lab Notebook software Classroom technologies Online learning
22
23 IT Strategic Planning - Framework Student Experience Learning Technologies Research PEOPLE Enterprise Systems IT Career Framework Service Excellence 28
24 The Planning Process Multiple advisory committees Faculty Advisory Board (FABIT) Interviews with researchers Student focus groups Question of the week IT planning conference Draft plan complete February 2013
25 Today, IT Expenditures Look Like This 10% Differentiators Academic technologies Analytics Research computing Mobility 90% Utilities Messaging/calendaring Most administrative systems Voice and most data networking Desktop support
26 We Aspire to a More Equal Balance 50% Utilities 50% Differentiators Academic technologies Usability Analytics Research support Mobility Messaging/calendaring Most administrative systems Voice and most data networking Desktop support
27 Initial Priorities 1. Build capacity for online learning 2. Enhance student experience 3. Transform IT skills 4. Extend utility services to research community 5. Improve usability of systems and services 6. Increase access to management information
28 Thanks for Listening Questions? Presented to Cornell Trustees Ted Dodds CIO and VP Cornell University Thursday, March 28,
29 is Cyber Security Threat Assessment External expertise Internal practices Incident assessment Directed change ITSO learning Reassess threats Remediation and Improvement Breach Prevention Policies Practices Technologies Awareness Monitoring Best practices Decision-making Breach Management 38
30 Threat Assessment External Expertise National Regional Sector independent Internal Practices Active scanning Targeted penetration testing 39
31 Breach Prevention University Policy Practices Security assessments Security training Technologies Encryption Unit firewalls Anti-virus Awareness 40
32 Breach Management Active monitoring Contemporary practices = rapid response Decision making Role clarity Decision rights Governance 41
33 Remediation & Improvement Assess unit practices to standard Direct change in practices that caused incident Identify any ITSO lessons learned Reassess threat landscape 42
Information Technology Master Plan Presentation November 2013
Information Technology Master Plan Presentation November 2013 Trends Educause Top 10 (2009 2014) 1. Governance, Planning, Funding and Staffing 1. Establishing and implementing IT governance throughout
More informationUNIVERSITY OF WISCONSIN SYSTEM INFORMATION TECHNOLOGY SUMMARY FISCAL YEAR 2015
UNIVERSITY OF WISCONSIN SYSTEM INFORMATION TECHNOLOGY SUMMARY FISCAL YEAR 2015 This page intentionally left blank. UW System IT Summary FY 2015 Page 2 CONTENTS INTRODUCTION... 5 GENERAL IT SERVICES...
More informationBusiness Plan: Information Technology Services (ITS)
Business Plan: Information Technology Services (ITS) How does this service contribute to the results identified in the City of London Strategic Plan? A Sustainable Infrastructure A Caring Community Fundamental
More informationIf you have questions regarding this survey, contact Ken Johnson at itsurvey@fsu.edu, or call the ITS Service Center at 850-644-HELP.
Information Technology Resources Survey For Faculty Thank you for your interest in completing this survey. Your response is sincerely appreciated. This survey is designed to evaluate the usage of technology
More informationThe University of Information Technology -UCSC
The primary mission of ITS is to provide high quality infrastructure, support, and innovation in the delivery of information technology products and services to continually advance UCSC s reputation as
More informationUniversity of Cincinnati. Strategic Directions
University of Cincinnati Information Technologies (UCit) Strategic Directions Academic Year 2009 2010 http://www.uc.edu/ucit/ A high-performance organization, UCit fulfills an essential role at the University
More informationBYOD & MOBILE SECURITY
2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own
More informationDRAFT. FY15 UW-Stout Institutional IT Plan
DRAFT FY15 UW-Stout Institutional IT Plan A. & University Strategic Objectives [1-2 pages] 1. How was the plan developed? The UW-Stout IT Planning is tightly integrated into the campus planning model.
More informationProgram Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission
Program Summary DoIT provides collaboration and conferencing tools for hosting academic classes, training courses, webinars and demonstrations; attending virtual meetings through audio or video conferencing;
More informationMcAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
More informationICT Category Sub Category Description Architecture and Design
A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking
More informationA Primer on Cloud Computing. By Anand Ganesan Byteonic.com
A Primer on Cloud Computing By Anand Ganesan Byteonic.com Background Cloud Computing Defined Taxonomy Value Proposition Cloud Providers Who uses it Opportunities for Improvement Agenda The Challenges Make
More informationInformation Technology 2016-2021 Strategic Plan
Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...
More informationHow To Improve Your University'S Reputation
2015 Work Programme other projects Customer Services Projects Review Start of Term for 2015 Rollout of new AJ build in conjunction with Teaching and Learning IT Lab Removals Preparation of communications
More informationStrategic Plan FY 2014-2016
Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION
More informationThe Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
More informationLeveraging the Cloud for Your Business
Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and
More informationISE Northeast Executive Forum and Awards
ISE Northeast Executive Forum and Awards October 3, 2013 Company Name: Project Name: Presenter: Presenter Title: University of Massachusetts Embracing a Security First Approach Larry Wilson Chief Information
More informationQuick guide: Using the Cloud to support your business
Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses
More informationstate of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative
Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed
More informationHead of User Experience Information Services (IS)
Head of User Experience Information Services (IS) Reporting to: Director of Global IT Programmes and Solutions Salary: 47,787-57,031 per annum (pro rata) depending on skills and experience. Salary progression
More informationX 420.5 Network, Operating System, and Database Security. Fall 2014, Registration Number 249343W. UCLA EXTENSION: Computer Science.
X 420.5 Network, Operating System, and Database Security Fall 2014, Registration Number 249343W UCLA EXTENSION: Computer Science Course Syllabus 12 Sessions: Mondays, 6-9 pm, September 29 - December 15,
More informationCloud Computing Overview
Cloud Computing Overview Presented by: Luis Ledezma, SMP Tech, Inc. Cloud Computing Overview 2 Defining Cloud Computing Definition Characteristics Layers / Service Models Deployment Schemes Business Drivers
More informationThe Pennsylvania State University IT Assessment Executive Summary
The Pennsylvania State University IT Assessment Executive Summary Final Summary of Recommendations June 16, 2011 Goldstein & Associates, LLC Contents Section Page Introduction 3 Summary Recommendations
More informationAppendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
More informationInformation Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
More informationPhilosophy of Community and Technical College Education
Philosophy of Community and Technical College Education CTL0900 Course Description Minnesota State Colleges & Universities Phone: 651-201-1888 Fax: 651-649-5409 http://facultycourses.mnscu.edu/ SYLLABUS
More informationThank you for your time and consideration
Generation 7 Built To Serve Businesses Thank you for your time and consideration POPP.com, Inc. All rights reserved. 1 - AP 4/28/15 POPP.com, Inc. All rights reserved. 2 - AP 4/28/15 Past And Present POPP
More informationSubject: Overview of Information Technology Services and the Strategic Technology Plan. Proposed Committee Action No Action Required Information Only.
AGENDA ITEM: IV Florida Polytechnic University Board of Trustees Technology Committee Subject: Overview of Information Technology Services and the Strategic Technology Plan Proposed Committee Action No
More informationRole and Mandate of Computing and Communications (C&C) Memorial University
Role and Mandate of Computing and Communications (C&C) Memorial University Mission: Our goal is to promote quality and excellence in the delivery of information services to the university community. We
More informationIntegrated Technology Plan (FY10 FY12)
(FY10 FY12) Anne Arundel Community College embraces and promotes a seamless integration of appropriate technologies in support of the learning community within the framework of the college s mission and
More informationIRM Incident Communication and Response Plan
I. Purpose A crisis communication plan provides policies and procedures for the communication of IT service interruption within the university. The goal of this communication plan is to establish guidelines
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More informationA HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
More informationWSU Vancouver Information Technology Service Catalog
WSU Vancouver Information Technology Service Catalog Overview The VIT Service Catalog documents the technology services and support delivered by VIT to its customers. Included are the general levels of
More informationLeveraging the Cloud for your Business
Leveraging the Cloud for your Business Save money and time by moving to the cloud Learn how Moving to the Cloud 3 from small and mid-sized businesses (SMBs) to Enterprise Companies. What problems can cloud
More informationUnisys Innovation Plan
Unisys Innovation Plan June 12th, 2015 Our View of the Market Unisys regards user support, cloud/datacenter, applications, data, analytics, social, service management and security as essential components
More informationSyllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management
Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2014 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering
More informationDesigning & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012
Designing & Implementing Enterprise Security Programs MBA Bank Expo 2012 April 11, 2012 Session Purpose G R O U P Premise: Security is institutionalized, but the enterprise is evolving. the enterprise
More informationChanging the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationIT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More informationCitrus College. Technology Master Plan 2009-2014 Adopted 2011
Citrus College Technology Master Plan 2009-2014 Adopted 2011 Citrus College District Information Technology Master Plan 2009-2014 2011 Update Table of Contents Planning Overview... 3 Background... 4 Factors
More informationSyllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management
Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2013 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering
More informationINFORMATION AND COMMUNICATIONS TECHNOLOGY
W I N T E R 2016, I SS U E 1 INFORMATION AND COMMUNICATIONS TECHNOLOGY COMMUNITY UPDATE SUPPORTING TEACHING AND LEARNING Classroom Renewal Project In the summer of 2015, a number of classrooms were renewed
More informationNAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat
NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona The Legal Cloud What is Cloud Computing? Working in the Cloud Cloud Computing is A way to work
More informationTraining Catalog. Information Technology and Computing Services
Information Technology and Computing Services Training Catalog ITCS provides technology training to help you enhance and expand your classroom or office, communicate and collaborate with colleagues or
More informationMoraine Valley Community College. Strategic Technology Priorities and Goals
Moraine Valley Community College Strategic Technology Priorities and Goals FY 2016-2019 Letter from the President Moraine Valley Community College s mission of providing a learning-centered environment
More informationStrategic Goals. 1. Information Technology Infrastructure in support of University Strategic Goals
Strategic Goals 1. Information Technology Infrastructure in support of University Strategic Goals a. Work toward building a modern data center and providing data services that support campus units and
More informationInformation Technology Strategic Plan 2014-2017
Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents
More informationIT Strategic Planning at Princeton University. Nadine Stern Associate CIO for Operations and Planning December, 2013
IT Strategic Planning at Princeton University Nadine Stern Associate CIO for Operations and Planning December, 2013 Office of Information Technology: OIT Slide 2 Princeton University About me: VP for IT
More informationdbp delivering business performance business optimization services
delivering business performance business optimization services Expert level consulting services + Business management + Sales and marketing + Customer retention + Technology Complete business planning
More informationExternal Review Service
External Review Service Proposal Using the AACSB accreditation process as a model, the AACSB Affinity Group Technology in Business Schools Roundtable (TBSr), will conduct an IT External Review Service
More informationMicrosoft Office 365 From Vodafone 2015 Update
Microsoft Office 365 From Vodafone 2015 Update What is Microsoft Office 365? Microsoft Office 365 offered by Vodafone is a hosted, cloud-based IT solution that combines Microsoft s suite of communication
More informationContinued Investigation of Risks and Concerns with
August 7, 2015 Continued Investigation of Risks and Concerns with Cloud-based Solutions and Storage of Personal Data Team Members Name College/Affiliation Email Phone Linda Baer Comptroller s Office lbaer@purdue.edu
More informationService Catalog. Office of Information Technology Lenoir-Rhyne University
Service Catalog Office of Information Technology Lenoir-Rhyne University Updated July 28, 2014 Service Catalog Communication and Collaboration Campus Cable Television Service Campus Telephone Service (Nortel,
More informationUniversity of London Computer Centre Moodle Plugin Matrix
age 1 The University of London Computer Centre () Moodle lugin Matrix identifies available plugins for each installation including their support level. egular updates will be made to the list of available
More informationSoftware Defined Hybrid IT. Execute your 2020 plan
Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.
More informationCALS COMMUNICATIONS AND CYBER TECHNOLOGIES 2021 STRATEGIC PLAN. PURPOSE: To help CALS become the most cyber-savvy Land Grant University in the nation
CALS COMMUNICATIONS AND CYBER TECHNOLOGIES 2021 STRATEGIC PLAN PURPOSE: To help CALS become the most cyber-savvy Land Grant University in the nation 2021 VISION: To become a hybridized team of data specialists,
More informationCreating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing
Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing White Paper Date: 12/9/2011 Version: 0.4 (Final) Author: Matt Baker, Clarity Business and IT Solutions Creating Dynamic IT Infrastructure
More informationVirginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
More informationJumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
More informationITS Executive Steering Committee (ITESC) Agenda and Materials October 09, 2014
ITS Executive Steering Committee (ITESC) Agenda and Materials October 09, 2014 1 Agenda Technology Briefing S. Malisch Anytime Anywhere Access Strategy Discussion M. Konda Upcoming ITESC Meeting Schedule
More informationIntroduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
More informationUniversity of San Diego
University of San Diego Academic Technology Services An Online Orientation -- Services at a Glance! 1 Updated: 8/14/15 Welcome to USD This guide is developed to assist faculty with instructional resources
More informationIowa State University Proposal for HR-01 ISU HR Operating Model
Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and
More information2011 NASCIO Recognition Award Nomination State of Georgia
2011 NASCIO Recognition Award Nomination State of Georgia Nomination Category: Enterprise IT Management Initiatives Title of Nomination: Georgia Enterprise Technology Services Nomination Submitted By:
More informationN/A. Yes. Students are expected to review and understand all areas of the course outline.
Course Outline School: Department: Course Title: Business Graduate Studies Sales Force Automation and Technology Course Code: MKTG 756 Course Hours/Credits: 28 Prerequisites: MKTG 751 Co-requisites: Eligible
More informationFundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic
Fundamentals of Secure Collaboration in the Mobile Workforce Sinisha Patkovic 1 DISCUSSION Hyper connected X-Times future and blurring of lines between personal, social cloud, & enterprise. CIO Challenge:
More informationINFORMATION TECHNOLOGY PROFILE
INFORMATION TECHNOLOGY PROFILE February, 2013 IT Services Miami University www.miamioh.edu/uit Technology Profile, rev. February 2013 This report, published in February, 2013, is updated annually to reflect
More informationCore Data Service 2015 IT Domain Definition Change Overview
Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning
More informationCurrent Developments Concerning Cybersecurity. ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016
Current Developments Concerning Cybersecurity ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016 AGENDA Why is Cybersecurity Important? Top Cybersecurity
More informationSolution Requirements and Process Flow
CHAPTER 2 Scope The Cisco Virtual Expert Management solution is a powerful, flexible communication solution that addresses a variety of technical, business, and associated service preferences. Deployment
More informationCybersecurity in an All-IP World Are You Prepared?
Cybersecurity in an All-IP World Are You Prepared? Executive Summary Get started Produced by: In partnership with: Introduction: The distinctions between today s data, voice, wireless and video networks
More informationHow can Cloud help your Security. Christophe Van Mollekot Solution Advisor Microsoft
How can Cloud help your Security Christophe Van Mollekot Solution Advisor Microsoft Global datacenter footprint 100+ Datacenters in over 40 countries Integral to business transformation 71% of strategic
More information2016-2018 Strategic Report and Plan
UB Information Technology 2016-2018 Strategic Report and Plan Building Differentiating Cultures Office of the Vice President and Chief Information Officer University at Buffalo, North Campus UB Information
More informationA Cybersecurity Strategy
A Cybersecurity Strategy How Stop Worrying and Love the Cybersecurity Strategy Lockdown 2015 University of Wisconsin Madison 2 Elements of a Cybersecurity Strategy 1. Have a commonly agreed to purpose
More informationInformation Technology Plan Technology Vision for the Community College
Information Technology Plan Technology Vision for the Community College At Caldwell Community College and Technical Institute, information technology will be a primary resource for students, faculty, staff,
More informationTHE POWER OF THE CLOUD IS CLOSER THAN YOU THINK. Michael Lee Aaron Saposnik SWC Technology Partners
THE POWER OF THE CLOUD IS CLOSER THAN YOU THINK Michael Lee Aaron Saposnik SWC Technology Partners #SWCEvents Agenda SWC Introduction Cloud Definition & Market Overview Our Approach to the Cloud Cloud
More informationKlickstart Business Solutions & Services
About us With an Engineering background & vast experience spanning across two decades with an expertise in Technology Marketing, Branding, Business development & Sales we set out to create a platform every
More informationOffice of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
More informationProgram Re-development for Continuing + Distance Education
Program Re-development for Continuing + Distance Education Submitted to: Freda Robinson Program Manager, Business and Management Portfolio School of Continuing and Distance Education (C+DE) Red River College
More informationMobile Applications And Services for Converged Networks
Mobile Applications And Services for Converged Networks Russ Clark Matt Sanders CS 4261/8803 MAS Fall 2011 Mobile Apps and Services What are we talking about here? Mobile - not tied to your desktop cell
More informationQUESTIONS & RESPONSES #2
QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL procurement@portoftacoma.com PHONE NUMBER 253-428-8608 SUBMITTAL
More informationAnthony Caragol Gonzalo Escarrá
Anthony Caragol Gonzalo Escarrá #SWCEvents Agenda SWC Introduction Unified Communications Technology Landscape Introduction of Skype for Business 2015 Demonstration Getting Started About SWC Technology
More informationStructuring Information Management (IM) around a Service Centric Framework. Date: 6th May 2015. www.inl.gov. Ian Mckirdy
Structuring Information Management (IM) around a Service Centric Framework Date: 6th May 2015 www.inl.gov Ian Mckirdy Information Management (IM) Service Management Approach to Service Portfolio and Service
More informationBUS311: Essentials of IS
University of Wisconsin Oshkosh College of Business Administration Instructor: Class Meeting: Office Hours: BUS311: Essentials of IS Fall 2012 Syllabus John M. Muraski, MS, PMP Office: SAGE 2444 Email:
More informationI T @ C O R N E L L : T E C H N O L O G Y I N A STR A T EGIC PLA N FOR I NFOR MA TI ON TE CHNO LO GY, 2 0 1 3-2017
I T @ C O R N E L L : T E C H N O L O G Y I N S E R V I C E T O O N E C O R N ELL A STR A T EGIC PLA N FOR I NFOR MA TI ON TE CHNO LO GY, 2 0 1 3-2017 MAY 2013 CONTENTS Letter from the CIO... 2 Executive
More informationNetwork Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
More informationWAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
More informationSteps on a Computer Compared to Steps on an ipad
Steps on a Computer Compared to Steps on an Task Steps on a Computer Steps on an Additional Information Moving/ Navigating 1. Click or drag with a mouse to navigate to different programs, move files or
More informationCloud Roadmap to Success. October, 2014
Cloud Roadmap to Success October, 2014 Catapult Systems & Level 3 Today s Presenters Aneal.Roney@CatapultSystems.com Roger.Greene@level3.com What is the Cloud Technology trends: driving cloud adoption
More informationOffice of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
More informationCourse Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0
Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5
More informationBoard of Trustees IT Subcommittee Meeting. November 3, 2014 2:00-2:50 PM Harper Center 3023
Board of Trustees IT Subcommittee Meeting November 3, 2014 2:00-2:50 PM Harper Center 3023 Agenda Introductions June 2, 2014 Meeting Minutes Creighton University Digital Strategy Information Technology
More informationMicrosoft Exchange and Google Mail Solutions
Microsoft Exchange and Google Mail Solutions Executive Summary: Email has become a critical application in most Education entities. When considering what systems are going to be used, a great deal of investigation
More informationMitel MiCollab Client
Mitel MiCollab Client Making In the Moment Communications More Dynamic In today s fast-paced, competitive world of business how can employees work together efficiently & effectively to help drive the success
More informationImproving Residual Risk Management Through the Use of Security Metrics
Improving Residual Risk Management Through the Use of Security Metrics Every investment in security should be effective in reducing risk, but how do you measure it? Jonathan Pagett and Siaw-Lynn Ng introduce
More informationCritical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
More information