SlideShare a Scribd company logo
1 of 18
IT Services




Conducting at the
Piazza Venezia
                               A View from the
                                   Intersection
Mike Roch
Director of IT Services

21 May, 2009       © University of Reading 2009   www.reading.ac.uk/ITS
IT Services




              © University of Reading 2009   www.reading.ac.uk/ITS
• Extension college of Christ Church 1892
• Royal Charter awarded 1926


• 13,000 undergrads; 5,000 postgrads
• 3,000 staff (700 researchers)
• 87 % of research is of International Standing
• Turnover £200M; Research income £30M

                                                  3
IT Services - Responsibilities
• Data networks                    • Corporate systems
  – 4 x switched Gb Ethernet         –   MS Exchange email (staff)
    campus networks                  –   MS IIS/CMS webhosting
  – 2 x 1Gb connections to JANET     –   Agresso Finance
    via TVN MAN                      –   Trent HR
  – 5000 room ResNet                 –   SITS SR
• Voice networks                     –   Blackboard VLE
• Infrastructure services • Research support
  – Infoblox DNS/DHCP                –   Infrastructure
  – MS Active Directory              –   Hardware
  – 2 x 50TB NetApp Filers           –   Software
                                     –   Help and advice
• Classroom technology
                                                                     4
IT Services – Partnerships
•   Communications – PTS Consulting
•   Networks – Data Integration
•   Windows – Microsoft Educational Support Centre
•   Virtualisation – VMware
•   Disaster Recovery – Sungard
•   Offsite backup - Recall
•   Student Email – T.B.A.
•   Identity Management – Oxford Computing Group
•   Access Management – Eduserv
                                                     5
IT Services - Culture
•   Services more important than IT
•   We work for them - ‘Can-do’, ‘Here to Help’
•   Good value for money - £270/fte user/yr
•   Standards and working practices
    –   Service desk & workflow - ITIL
    –   Change management - ITIL
    –   Project management - PRINCE-lite
    –   Information security management - BS7799/ISO27002
• Pragmatism – ‘Utility not ideology ’
• Risk management – proportionality


                                                            6
Risk Management


      Plan        Prevent


      Accept      Reduce
                  Impact



                            7
Research Support
• Computational resources
   – Thames Blue IBM BladeCenter
   – 600 node Campus Grid & NGS Affilliate
• Storage resources
   – Mirrored NetApp Filers & Enterprise Vault
   – Institutional Repository - ePrints
• Software
   – ArcGIS, Matlab, SAS, SPSS, ATLAS-ti, NVivo, …
• Support
   – Advice, documentation, certification, AccessGRID, Globus g/w
   – Partnerships – Oxford eResearch Centre, eResearch South, NGS


                                                                    8
Identity Management - background
• Mainframe s and UNIX minis from 1970s
• Distributed UNIX workstations + NFS filestore - 1988
   – TCP/IP, PC-NFS for PCs, CAP etc for Macs
   – Yellow Pages/NIS directory services
• Common University Username (= email LHS for students)
• Active Directory synched with NIS from 2001
Science Faculty        Registration Year

        s p u 0 3 c h 3
Physics Dept      Undergraduate           Initials + serial
                                                              9
Identity Management - update
• New format usernames for accounts from Oct 2008
   – 2 random letters followed by 6 digits
   – New format email addresses for students
     a.n.other@student.reading.ac.uk
• Microsoft Identity Lifecycle Manager service summer 2009
   – ADAM (Active Directory Application Mode) to replace NIS
   – Parallel running from launch
• Remote authentication and authorisation
   – OpenAthens subscription for 3 years from 1/8/08
   – Eduroam for visitors and working away
   – Digital Certificates for accessing research computing resources


                                                                       10
So, is IdM Utopia Builded Here?
                                                                                                                                 User
                                                                                    Communications
                                               Remedy                               Directory
                                                                                                                      Communications
                                                                                                                      Directory Interface
       HR                                                 SQL
                                                                                           ADAM


  Midland Trent                                                 Student XMA
                                                                                          ADAM MA
  (Staff)                                     Employee External XMA                                                                                    Active Directory &
                                                                                                                                                       Exchange 2003
            SQL                                    ILM                                                              Employee/Xternal Active Directory MA
                              Employees XMA

                                                                                                                                                                 AD
                             Trent Users XMA                                                                             Student Active Directory MA

                                                                                    SQL




  RISIS (Students)                                          Actions Logging          Group
                                                                                    Populator       Delayed             Employee/Xternal ADAM MA
                           Tutors Delimited File
                                                                          Post                       Action
                                                                                                                                                       Unix Mail
                                                                       Processing
                                                                                                                          Student ADAM MA
                                Students XMA
                                                    SQL               SQL             SQL                     SQL
                                                                                                                                                              ADAM

          SQL                                               Post Processing
                                                             Drive Creation
                                                                                    NIS Export
                                                     Home Drive/File Storage


                                                                                                                              Message Delivery
                                                                                                  NIS
                                                                                                 Export
Students at Registration                                                                          File

                                                                                                                                                       User

                                                                                                                                                                            11
UCISA Top Concerns 2008
Rank Concern
1     Funding and sustainable resourcing of IT
2=    IT strategy and planning
2=    Organisational change and process improvement
4     Business systems to support the institution
5     quot;Environmentally friendlyquot; computing / energy efficiency
6=    IT/IS service quality
6=    Service availability and resilience
8     Governance of IT
9     E-learning
10=   The development of an architected, enterprise-wide IT Infrastructure
10=   Data centres
12    Mobile computing, anytime, anywhere computing, home working
13    Identity & access management


                                                                      12
Transatlantic Top Concerns
EDUCAUSE ISSUE                             EDUCAUSE UCISA
Security                                       1     >13
Administrative / ERP Information Systems      2       4
Funding IT                                    3       1
Infrastructure                                4       10
Identity / Access management                  5       13
Disaster recovery / Business Continuity       6      >13
Governance, organisation and leadership       7       8
Change management                             8       2
E-learning / Distributed teaching and
learning                                       9      9
Staffing / HR management / Training           10      -

    http://www.ucisa.ac.uk/members/surveys/tc

                                                            13
Challenges to IdAM in HEIs
• Porous boundaries and fluid structures
   –   Open campuses, open libraries, open access
   –   Open resources – research & T&L outputs
   –   Re-organisations, mergers, spin-offs, closures
   –   Nomadic academic careers
• Individual behaviours - PBSK
   – Serendipitous discovery ignores boundaries
   – Research collaborators identified and trusted by personal
     estimation not external validation
   – Web2.0 take-up - *FREE* of cost/authority/bureaucracy
   – Sharing and trading identities


                                                                 14
Project FLAME – London School of Economics
• Technical Strand – investigated systems supporting:
   – Delegated Authority Management (DAM)
   – Attribute Release Policy (ARP)
   – Virtual Organisation Management (VOM)
• Social study - large scale studies of typical user
  attitudes, exploring:
   – the extent to which users (students and staff) value and
     manage their personal data
   – their understanding of what data is held by service providers
   – the extent to which this data is exchanged




                                                                     15
Project FLAME – Social Study Experiment
• What is your LSE username?         91 %
• What is your LSE library number?   63 %
• What is your Facebook password?    40 %
• What is your LSE logon password?   14 %
• What is your term-time address?    90 %
• What is your date of birth?        73 %
• What is your mobile number?        67 %
• What is your credit card number?   30 %

                                            16
Risk, Identity and Access Management
• Vital to mitigate risks:
   –   Resource misallocation
   –   Breaches of contractual obligations
   –   Breaches of confidentiality, integrity and availability
   –   Quality assurance failures …
• Mitigation must always be proportional to risk:
   – Big risks need strong controls
   – Small risks less so …
   Else
   – Excessive costs
   – Inflexible processes
   – Missed opportunities …

                                                                 17
Links
• JISC Project FLAME
   https://gabriel.lse.ac.uk/twiki/bin/view/Projects/Flame/WebHome
• UCISA Top Concerns
   http://www.ucisa.ac.uk/members/surveys/tc
• Reading eResearch pages
   http://www.reading.ac.uk/e-research
• Piazza Venetzia Traffic Cop
   http://www.youtube.com/watch?v=wBJa0W49ayI




                                                                     18

More Related Content

Viewers also liked

Rand Kannenberg Deviance And Criminal Behavior
Rand Kannenberg    Deviance And Criminal BehaviorRand Kannenberg    Deviance And Criminal Behavior
Rand Kannenberg Deviance And Criminal BehaviorRand Kannenberg
 
Resume2
Resume2Resume2
Resume2vic123
 
Shifting Identity
Shifting IdentityShifting Identity
Shifting Identitytamjeekong
 
Rand Kannenberg Theories And Models Of Helping Offenders Change
Rand Kannenberg   Theories And Models Of Helping Offenders ChangeRand Kannenberg   Theories And Models Of Helping Offenders Change
Rand Kannenberg Theories And Models Of Helping Offenders ChangeRand Kannenberg
 
Capital Budget Presentation
Capital Budget PresentationCapital Budget Presentation
Capital Budget Presentationbigsteve
 
Presenting The P.A.P.E.
Presenting The P.A.P.E.Presenting The P.A.P.E.
Presenting The P.A.P.E.bigsteve
 
Rand Kannenberg Communication Techniques With Offenders
Rand Kannenberg   Communication Techniques With OffendersRand Kannenberg   Communication Techniques With Offenders
Rand Kannenberg Communication Techniques With OffendersRand Kannenberg
 
Medication Abuse by Rand L. Kannenberg
Medication Abuse by Rand L. KannenbergMedication Abuse by Rand L. Kannenberg
Medication Abuse by Rand L. KannenbergRand Kannenberg
 
20130606 презентация дрожжинова евразийский форум
20130606  презентация дрожжинова евразийский форум20130606  презентация дрожжинова евразийский форум
20130606 презентация дрожжинова евразийский форумE-government competence center
 

Viewers also liked (18)

Rand Kannenberg Deviance And Criminal Behavior
Rand Kannenberg    Deviance And Criminal BehaviorRand Kannenberg    Deviance And Criminal Behavior
Rand Kannenberg Deviance And Criminal Behavior
 
Resume2
Resume2Resume2
Resume2
 
Shifting Identity
Shifting IdentityShifting Identity
Shifting Identity
 
Rand Kannenberg Theories And Models Of Helping Offenders Change
Rand Kannenberg   Theories And Models Of Helping Offenders ChangeRand Kannenberg   Theories And Models Of Helping Offenders Change
Rand Kannenberg Theories And Models Of Helping Offenders Change
 
Russia:the way from electronic to open government
Russia:the way from electronic to open governmentRussia:the way from electronic to open government
Russia:the way from electronic to open government
 
Capital Budget Presentation
Capital Budget PresentationCapital Budget Presentation
Capital Budget Presentation
 
Madaleine’S Designs
Madaleine’S DesignsMadaleine’S Designs
Madaleine’S Designs
 
Presenting The P.A.P.E.
Presenting The P.A.P.E.Presenting The P.A.P.E.
Presenting The P.A.P.E.
 
Intention Economy
Intention EconomyIntention Economy
Intention Economy
 
Who will be next google?
Who will be next google?Who will be next google?
Who will be next google?
 
Five ways to bring a real star in your child
Five ways to bring a real star in your childFive ways to bring a real star in your child
Five ways to bring a real star in your child
 
Thinking Tools for Creative Kids An Introduction
Thinking Tools for Creative Kids An IntroductionThinking Tools for Creative Kids An Introduction
Thinking Tools for Creative Kids An Introduction
 
Rand Kannenberg Communication Techniques With Offenders
Rand Kannenberg   Communication Techniques With OffendersRand Kannenberg   Communication Techniques With Offenders
Rand Kannenberg Communication Techniques With Offenders
 
Medication Abuse by Rand L. Kannenberg
Medication Abuse by Rand L. KannenbergMedication Abuse by Rand L. Kannenberg
Medication Abuse by Rand L. Kannenberg
 
20130606 презентация дрожжинова евразийский форум
20130606  презентация дрожжинова евразийский форум20130606  презентация дрожжинова евразийский форум
20130606 презентация дрожжинова евразийский форум
 
20130511 дрожжинов ио 4 0 pp 97 2003
20130511 дрожжинов ио 4 0 pp 97 200320130511 дрожжинов ио 4 0 pp 97 2003
20130511 дрожжинов ио 4 0 pp 97 2003
 
Horari
HorariHorari
Horari
 
Sara I Lucas
Sara I LucasSara I Lucas
Sara I Lucas
 

Similar to Mike Roch Esym09 Final

Data-intensive profile for the VAMDC
Data-intensive profile for the VAMDCData-intensive profile for the VAMDC
Data-intensive profile for the VAMDCAstroAtom
 
LUXproject functionality overview
LUXproject functionality overviewLUXproject functionality overview
LUXproject functionality overviewAlexander Zagvozdin
 
LUXproject functionality overview R11.7
LUXproject functionality overview R11.7LUXproject functionality overview R11.7
LUXproject functionality overview R11.7Alexander Zagvozdin
 
Live to e-Learning, 
a lecture capture and delivery service based on MediaMosa
Live to e-Learning, 
a lecture capture and delivery service based on MediaMosaLive to e-Learning, 
a lecture capture and delivery service based on MediaMosa
Live to e-Learning, 
a lecture capture and delivery service based on MediaMosaMediaMosa
 
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)WSO2
 
Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ AGILE LABS,INDIA
 
Crushing, Blending, and Stretching Data
Crushing, Blending, and Stretching DataCrushing, Blending, and Stretching Data
Crushing, Blending, and Stretching DataRay Schwartz
 
Sammys Cv November2010
Sammys Cv November2010Sammys Cv November2010
Sammys Cv November2010speasah
 
Enterprise Sharepoint Portal
Enterprise Sharepoint PortalEnterprise Sharepoint Portal
Enterprise Sharepoint PortalCurtis Timmons
 
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...IMEX Research
 
Open Digital Education Software Kit
Open Digital Education Software KitOpen Digital Education Software Kit
Open Digital Education Software Kitischool webboard
 
Getting Connected And Trusting The Connection
Getting Connected And Trusting The ConnectionGetting Connected And Trusting The Connection
Getting Connected And Trusting The ConnectionSuhaimi Nordin
 
ROLE Vision RWTH Aachen
ROLE Vision RWTH AachenROLE Vision RWTH Aachen
ROLE Vision RWTH AachenRalf Klamma
 
Scalable Computing Labs (SCL).
Scalable Computing Labs (SCL).Scalable Computing Labs (SCL).
Scalable Computing Labs (SCL).Mindtree Ltd.
 

Similar to Mike Roch Esym09 Final (20)

Data-intensive profile for the VAMDC
Data-intensive profile for the VAMDCData-intensive profile for the VAMDC
Data-intensive profile for the VAMDC
 
LUXproject functionality overview
LUXproject functionality overviewLUXproject functionality overview
LUXproject functionality overview
 
LUXproject functionality overview R11.7
LUXproject functionality overview R11.7LUXproject functionality overview R11.7
LUXproject functionality overview R11.7
 
MySQL Cluster
MySQL ClusterMySQL Cluster
MySQL Cluster
 
Skillset
SkillsetSkillset
Skillset
 
Live to e-Learning, 
a lecture capture and delivery service based on MediaMosa
Live to e-Learning, 
a lecture capture and delivery service based on MediaMosaLive to e-Learning, 
a lecture capture and delivery service based on MediaMosa
Live to e-Learning, 
a lecture capture and delivery service based on MediaMosa
 
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
 
Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™ Integrated Campus Management System on Axpert™
Integrated Campus Management System on Axpert™
 
Crushing, Blending, and Stretching Data
Crushing, Blending, and Stretching DataCrushing, Blending, and Stretching Data
Crushing, Blending, and Stretching Data
 
Sammys Cv November2010
Sammys Cv November2010Sammys Cv November2010
Sammys Cv November2010
 
Enterprise Sharepoint Portal
Enterprise Sharepoint PortalEnterprise Sharepoint Portal
Enterprise Sharepoint Portal
 
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
 
Open Digital Education Software Kit
Open Digital Education Software KitOpen Digital Education Software Kit
Open Digital Education Software Kit
 
Getting Connected And Trusting The Connection
Getting Connected And Trusting The ConnectionGetting Connected And Trusting The Connection
Getting Connected And Trusting The Connection
 
ROLE Vision RWTH Aachen
ROLE Vision RWTH AachenROLE Vision RWTH Aachen
ROLE Vision RWTH Aachen
 
Resume
ResumeResume
Resume
 
SALEEM_CV
SALEEM_CVSALEEM_CV
SALEEM_CV
 
Why Cloud Computing is Different
Why Cloud Computing is DifferentWhy Cloud Computing is Different
Why Cloud Computing is Different
 
Scalable Computing Labs (SCL).
Scalable Computing Labs (SCL).Scalable Computing Labs (SCL).
Scalable Computing Labs (SCL).
 
Shakawath's Profile
Shakawath's ProfileShakawath's Profile
Shakawath's Profile
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Mike Roch Esym09 Final

  • 1. IT Services Conducting at the Piazza Venezia A View from the Intersection Mike Roch Director of IT Services 21 May, 2009 © University of Reading 2009 www.reading.ac.uk/ITS
  • 2. IT Services © University of Reading 2009 www.reading.ac.uk/ITS
  • 3. • Extension college of Christ Church 1892 • Royal Charter awarded 1926 • 13,000 undergrads; 5,000 postgrads • 3,000 staff (700 researchers) • 87 % of research is of International Standing • Turnover £200M; Research income £30M 3
  • 4. IT Services - Responsibilities • Data networks • Corporate systems – 4 x switched Gb Ethernet – MS Exchange email (staff) campus networks – MS IIS/CMS webhosting – 2 x 1Gb connections to JANET – Agresso Finance via TVN MAN – Trent HR – 5000 room ResNet – SITS SR • Voice networks – Blackboard VLE • Infrastructure services • Research support – Infoblox DNS/DHCP – Infrastructure – MS Active Directory – Hardware – 2 x 50TB NetApp Filers – Software – Help and advice • Classroom technology 4
  • 5. IT Services – Partnerships • Communications – PTS Consulting • Networks – Data Integration • Windows – Microsoft Educational Support Centre • Virtualisation – VMware • Disaster Recovery – Sungard • Offsite backup - Recall • Student Email – T.B.A. • Identity Management – Oxford Computing Group • Access Management – Eduserv 5
  • 6. IT Services - Culture • Services more important than IT • We work for them - ‘Can-do’, ‘Here to Help’ • Good value for money - £270/fte user/yr • Standards and working practices – Service desk & workflow - ITIL – Change management - ITIL – Project management - PRINCE-lite – Information security management - BS7799/ISO27002 • Pragmatism – ‘Utility not ideology ’ • Risk management – proportionality 6
  • 7. Risk Management Plan Prevent Accept Reduce Impact 7
  • 8. Research Support • Computational resources – Thames Blue IBM BladeCenter – 600 node Campus Grid & NGS Affilliate • Storage resources – Mirrored NetApp Filers & Enterprise Vault – Institutional Repository - ePrints • Software – ArcGIS, Matlab, SAS, SPSS, ATLAS-ti, NVivo, … • Support – Advice, documentation, certification, AccessGRID, Globus g/w – Partnerships – Oxford eResearch Centre, eResearch South, NGS 8
  • 9. Identity Management - background • Mainframe s and UNIX minis from 1970s • Distributed UNIX workstations + NFS filestore - 1988 – TCP/IP, PC-NFS for PCs, CAP etc for Macs – Yellow Pages/NIS directory services • Common University Username (= email LHS for students) • Active Directory synched with NIS from 2001 Science Faculty Registration Year s p u 0 3 c h 3 Physics Dept Undergraduate Initials + serial 9
  • 10. Identity Management - update • New format usernames for accounts from Oct 2008 – 2 random letters followed by 6 digits – New format email addresses for students a.n.other@student.reading.ac.uk • Microsoft Identity Lifecycle Manager service summer 2009 – ADAM (Active Directory Application Mode) to replace NIS – Parallel running from launch • Remote authentication and authorisation – OpenAthens subscription for 3 years from 1/8/08 – Eduroam for visitors and working away – Digital Certificates for accessing research computing resources 10
  • 11. So, is IdM Utopia Builded Here? User Communications Remedy Directory Communications Directory Interface HR SQL ADAM Midland Trent Student XMA ADAM MA (Staff) Employee External XMA Active Directory & Exchange 2003 SQL ILM Employee/Xternal Active Directory MA Employees XMA AD Trent Users XMA Student Active Directory MA SQL RISIS (Students) Actions Logging Group Populator Delayed Employee/Xternal ADAM MA Tutors Delimited File Post Action Unix Mail Processing Student ADAM MA Students XMA SQL SQL SQL SQL ADAM SQL Post Processing Drive Creation NIS Export Home Drive/File Storage Message Delivery NIS Export Students at Registration File User 11
  • 12. UCISA Top Concerns 2008 Rank Concern 1 Funding and sustainable resourcing of IT 2= IT strategy and planning 2= Organisational change and process improvement 4 Business systems to support the institution 5 quot;Environmentally friendlyquot; computing / energy efficiency 6= IT/IS service quality 6= Service availability and resilience 8 Governance of IT 9 E-learning 10= The development of an architected, enterprise-wide IT Infrastructure 10= Data centres 12 Mobile computing, anytime, anywhere computing, home working 13 Identity & access management 12
  • 13. Transatlantic Top Concerns EDUCAUSE ISSUE EDUCAUSE UCISA Security 1 >13 Administrative / ERP Information Systems 2 4 Funding IT 3 1 Infrastructure 4 10 Identity / Access management 5 13 Disaster recovery / Business Continuity 6 >13 Governance, organisation and leadership 7 8 Change management 8 2 E-learning / Distributed teaching and learning 9 9 Staffing / HR management / Training 10 - http://www.ucisa.ac.uk/members/surveys/tc 13
  • 14. Challenges to IdAM in HEIs • Porous boundaries and fluid structures – Open campuses, open libraries, open access – Open resources – research & T&L outputs – Re-organisations, mergers, spin-offs, closures – Nomadic academic careers • Individual behaviours - PBSK – Serendipitous discovery ignores boundaries – Research collaborators identified and trusted by personal estimation not external validation – Web2.0 take-up - *FREE* of cost/authority/bureaucracy – Sharing and trading identities 14
  • 15. Project FLAME – London School of Economics • Technical Strand – investigated systems supporting: – Delegated Authority Management (DAM) – Attribute Release Policy (ARP) – Virtual Organisation Management (VOM) • Social study - large scale studies of typical user attitudes, exploring: – the extent to which users (students and staff) value and manage their personal data – their understanding of what data is held by service providers – the extent to which this data is exchanged 15
  • 16. Project FLAME – Social Study Experiment • What is your LSE username? 91 % • What is your LSE library number? 63 % • What is your Facebook password? 40 % • What is your LSE logon password? 14 % • What is your term-time address? 90 % • What is your date of birth? 73 % • What is your mobile number? 67 % • What is your credit card number? 30 % 16
  • 17. Risk, Identity and Access Management • Vital to mitigate risks: – Resource misallocation – Breaches of contractual obligations – Breaches of confidentiality, integrity and availability – Quality assurance failures … • Mitigation must always be proportional to risk: – Big risks need strong controls – Small risks less so … Else – Excessive costs – Inflexible processes – Missed opportunities … 17
  • 18. Links • JISC Project FLAME https://gabriel.lse.ac.uk/twiki/bin/view/Projects/Flame/WebHome • UCISA Top Concerns http://www.ucisa.ac.uk/members/surveys/tc • Reading eResearch pages http://www.reading.ac.uk/e-research • Piazza Venetzia Traffic Cop http://www.youtube.com/watch?v=wBJa0W49ayI 18

Editor's Notes

  1. Good Afternoon. My name is Mike Roch and I am Director of IT Services at the University of Reading.When Andy Powell asked me to speak at this event, he described the intersection of identity management, access management and Research, and where a University IT director fits into that. Reflecting on this, the IMAGE which popped into my mind wasn’t a Venn Diagram, but this:VIDEO
  2. 20s – Ok - The university IT Director as a Traffic Cop. 25s - So, how deeply can I mine this metaphor?30s - Well, my first impression is that for all the arm waving, no-one appears to be taking much notice …35s – However, if we take a broader view then it’s clearer that something CRUCIAL is going on … 40s – Here we have a complex, potentially chaotic, high entropy environment …45s – We can’t simply let White Van Man muscle his way through50s – Someone has to manage and prioritise for the general good, and reliably identifying and distinguishing who’s who is central to this.55s – Not that we know who’s who amongst the Twitterati ……
  3. Ok, let me describe my context, and then I’ll focus in on the topic at hand. University of Reading is a research intensive, medium sized university Its 4 campuses are green and luscious; our boundary has a fence, but no barbed wire.CLICKThe University ‘s origins go back more than a century. Its culture and values are traditional and collegial. The 2008 Research Assessment Exercise confirmed that we are an archipelago of research excellence and we also score highly in the National Student Survey and other measures of the Student Experience.
  4. My department has a fairly typical spread of responsibilities.Our electronic infrastructure is of high quality, it’s resilientand highly available.
  5. This range of responsibilities is too broad for us to cover to the appropriate depth with our own people, and so we make extensive use of commercial partnerships.
  6. Services are much more important to me than the IT itselfWe work for them - ‘Can-do’, ‘Here to Help’We represent good value for money - All of usWe don’t just wing it – we adopt common Standards and professional working practices Service desk & workflow - ITILChange management - ITILProject management - PRINCE-liteInformation security management - BS7799/ISO27002We exercise pragmatism – ‘Utility not ideology ’Risk management informs all our decisions allowing us to apply proportionality in decision making.
  7. How do we decide ANYTHING? Not by exhaustive analysis, but not by intuition either. We manage risks by assessing their probability and their impact. HIGH and LOW categories give us plenty of granularity; more categories give us more permutations and make decisions harder.PreventionEither stop the threat from occurring or prevent it having any impact on the project or business. Reduce ImpactTake action to control limit the impact on the project to acceptable levels. AcceptTolerate the risk − perhaps because nothing can be done at a reasonable cost to mitigate it or the likelihood and impact of the risk occurring are at an acceptable level. PlanThese are actions planned and organised to come into force as and when the risk occurs.
  8. Ok, so that’s IT Services in general. How do we relate to University research? For many years it was Reading’s policy that ITS should provide a standard IT environment for all and that research groups should sort out their own specialised needs. That has changed over the past few years as the eSCIENCE/eRESEARCH agenda emerged and NEW LOCAL NEEDS emerged, for example in BIOINFORMATICS where new potential users were not COMPUTATIONALLY SELF SUFFICIENT in the way that (say) our METEOROLOGISTS and PURE SCIENTISTS always were. We responded by appointing an eScience Development Officer who surveyed and mapped out unmet needs across the University and guided the development of provision. Once again, we have sought out and participated in PARTNERSHIPS in order to allow us to PUNCH ABOVE OUR WEIGHT.Mian Zhu is using GABOR features in facial recognition - 30,240 different Gabor features are compared in pairs to eliminate those which have mutual information; 457 million comparisons take 105 days on a workstation but 20 hours on the Campus Grid.
  9. We’ve had UNIX systems at Reading since the late 70s and in the 1980s Reading was the first UK university to spend its COMPUTER BOARD mainframe grant on a UNIX based distributed computing system and the TCP/IP/NFS environment has stood us in good stead for 20 years. We never dabbled with Novell; Never fell for Appletalk. Nor Token Ring. Nor ATM. ClickOur UNIX-compliant University-wide Usernames were ingeniously crafted and encoded a great deal of identity information. CLICKThis USERNAME FORMAT lasted us 30 years and the PASSWORD FILE and later, the NIS MAP, was our IdM DATABASE
  10. So, why change?Well, whereas the University in 1978, or 1988, or even 1998 was relatively static, by 2008 it was inescapable that some or all of the attributes encoded in the University Username were likely to change during the user’s identity lifecycle with the University. We – IT Services as IDENTITY PROVIDER needed to keep up to date values for these attributes, but changing the USERNAME was problematic for the user and for the multitude of systems which shared that Identity.So … new format usernames and a single central system for managing identities, Microsoft Identity Lifecycle Manager – ILM.
  11. Well, if I’m to be the traffic cop, I need a DVLC!Here we have a simplified picture of what is going on. ILM at the centre harvests user information from authoritative sources – the STUDENT RECORD and HUMAN RESOURCES systems – and builds a master table (a METAVERSE) of users and their SIGNIFICANT ATTRIBUTES. ILM can generate its own attributes, eg USERNAMES or HOME DIRECTORIES, which can be passed on to other systems, including back to the SR and HR systems.Subsets of users with selected attributes are then supplied to secondary information systems, such as the LIBRARY MANAGEMENT SYSTEM, ATHENS DA, the Blackboard VLE, MAILERSs, etc. Handover for acceptance testing is set for 30th MAY 2009.We are the new REGISTRARS !
  12. So, to what extent is Reading typical of UK university IT departments? Well, my list would be subtly different from that collated from across the membership of the UNIVERSITIES AND COLLEGES INFORMATION SYSTEMS ASSOCIATION recently. IdAM is not a great concern this year – it’s under control at Reading and (APPARENTLY) elsewhere in the UK.
  13. It’s interesting to compare UCISA’s rankings with those of EDUCAUSE A commentary can be found at the URL given, but a legal requirement in the US to report and publicise incidents in which PRIVACY INFORMATION (SENSITIVE PERSONAL DATA) may have been compromised seems to me to be particularly significant.RISK AVERSION may be the spirit of our age but we never seem to be worrying in advance about the thing that actually hurts us next ….
  14. So, to draw things to a conclusion, some personal reflections on where Identity and Access Management fit into universities, and on where that fit chafes ….The BIG CHALLENGE is that we work for HIGH ENTROPYORGANISATIONS and the OLDEST, the STRONGEST, the MOST SUCCESSFUL institutions are often the MOST ANARCHIC. SLIDE BULLETS
  15. So, how valuable, how precious are our electronic identities? I’ll pause to highlight a JISC funded project that has looked into this. John Paschoud of LSE is here today and can tell all about the project, but I’d like to focus on the latter part, the study of user attitudes. The project carried out an experiment, involving hundreds of students, in order to highlight the limits of institutions’ influence over users’ independent actions. RE-ENACTMENT!
  16. They carried out an experiment, involving 327 freshers. In return for answering these questions, they received sweets. These young adults consciously traded identity elements for chocolate. Other surveys asked about actual practice in sharing accounts, access cards, library cards, etcBusy, sensible but pragmatic researchers collaborate with people they know and trust. They will share accounts across research groups and these may be geographically and organisationally dispersed. They will continue to use the accounts of departees. They will read journals others have subscribed to.So long as they feel that their systems and data are secure, their tolerance for our bureacracy, our procedures will be very limited.
  17. So from where I stand, at the intersection of identity management, access management, researchand a host of other fast-moving objects,I worry that we may build IdAM solutions which are finer grained, more rigorous, more rigid than the institutions we work for. If this happens, then the tail will WAG THE DOG, We will GET IN THE WAY, We WILL IMPEDE THE TRAFFICAnd IT’S MY JOB to keep the traffic moving, Thank you very much for your attention.