200 likes | 312 Vues
This paper by Johnathon Mohr, MBA, explores the evolving needs of Philadelphia University in response to past epidemics and emerging technologies. It details the integration of cutting-edge hardware and software to enhance student support, streamline operations, and address increasing demands for resources. The work emphasizes the necessity of adaptive strategies, student empowerment, and the embrace of proactive measures for effective containment and prevention of future outbreaks, illustrating a clear trajectory for institutional evolution in the face of technological challenges.
E N D
The [216:1 Ratio] Bridging the Growing Support Gap Through the Proactive Deployment of Emerging Technologies Johnathon A. Mohr, MBA Philadelphia University School House Lane and Henry Ave Philadelphia, PA 19144-5497Tel. 215.951.6814 Mohrj@philau.edu
Overview • Background • Overview of Philadelphia University • The Epidemics of 2002 and 2003 • Defining Containment and Prevention Measures in the wake of the outbreak • The “Cat in the Hat” meets SMA • The Cerberus at the Gate • Hardware protections • The Epidemiology of the next generation of Outbreaks
Overview (Continued) • Student Leadership in the 21st Century • PAIR’ing Model • Lines of Demarcation and Demographics • Defining response (PERT Modeling) • Conclusions • Adaptive Emergent Computing • Doing more with Less • Student ownership and Empowerment
What is Philadelphia University? • Defining a University in the wake of institutional evolution. • Punctuated Equilibrium in Growth • Dramatic Transformation in the Nature of the University • The Evolution of an Organization
Philadelphia University: Evolution The University evolved dramatically over time. As such, the needs technologically, have changed dramatically as well.
The Outbreak Various contributing factors lead to crippling epidemics in 2002-2003. Thus, the etiology manifested as a result of these interrelated casualties.
The Tools of the Trade The various technologies that enable a lean, agile organization and a secure end-user computing experience.
On the Frontlines The steps for a student to access the network and internet.
Transparent Protection The Backend technologies and methodologies protecting our network.
Lastly…the Ω Directive Physically Disabling or Shutting Down sections of the Network Ω
Response Evolution • SUS/WSUS Experience • Centrally Managed Antivirus Experience • The “Client Assessment Tool” Experience • Enter SMA (System Management Application) • Security Criteria for SMA • The Application Deployment and Updates
Trends • Prevention of Outbreaks • Decrease in Support Calls • Drive by and passive infections Dramatically Decreased • The weakness – the user. • Instant Messaging • MySpace • Facebook • P2P Applications
Student Support The Foundations of Student Support.
Projections • Resident Student Population Increase. • Increased Demand for Resources. • Nature of Programs Require Cutting Edge Hardware and Software. • Increased Reliance on Technology and Demand for Technology. • Evolution of the agile institution.
Response Time • 14 Day open to Close (Peak) • 7 Day Open to Close (Normal Demand) • Te = (a+4m + b) / 6 • Where: • Te= Expected Activity Duration • a = Optimistic Time • m = Most Likely Time • B = Pessimistic Time
Calculations: Te = (a+4m + b) / 6 • Normal Period • a: 5, m: 7, b:10 • Te = 7.16 Days • Peak Periods • a: 7, m: 10, b: 14 • Te = 10.16 days
Conclusions • Forced Adaptation • Funding is Constant does not meet demand • Required to innovate • University Evolution: The Punctuated Equilibrium • Constant Vigilance by IT • The Trojan Horse: • The Risk Now is with the user.
Questions? Comments? Thank you! Johnathon A. Mohr, MBA Philadelphia University School House Lane and Henry Ave Philadelphia, PA 19144-5497Tel. 215.951.6814 Mohrj@philau.edu