1 / 21

New Opportunities: Evolving and Emerging Technologies

New Opportunities: Evolving and Emerging Technologies. Leslie Maltz Columbia University. NETWORKING. Ubiquitous Wireless Learning takes place everywhere and all the time Issue: Upgrade wired infrastructure or Install/upgrade wireless infrastructure. NETWORKING.

yuval
Télécharger la présentation

New Opportunities: Evolving and Emerging Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. New Opportunities: Evolving and Emerging Technologies Leslie Maltz Columbia University

  2. NETWORKING • Ubiquitous Wireless Learning takes place everywhere and all the time Issue: Upgrade wired infrastructure or Install/upgrade wireless infrastructure

  3. NETWORKING • The technology to watch is broadband over power lines • Relatively inexpensive devices can be used with existing computers • Will the power companies see the opportunity or will they be too late?

  4. DISASTER RECOVERY • In the post-Katrina world, disaster recovery and business continuity plans are essential -DR and BC were hot topics after 9/11, but memories fade and budgets disappear -Opportunities for assisting each other

  5. SECURITY • We need help! The bad guys are killing us! • Bots, DOS, root kits, Windows vulnerabilities/updates • Authorization, authentication • Spam, phishing

  6. SECURITY • Funding • Staffing • Tools • User awareness and training • Secure protocols – local and remote • Anti-virus/malware/phishing/spam/…

  7. IDENTITY MANAGEMENT • Need a uniform process for establishing user identification • Reduction in the number of sign-ons and passwords • Greater security to protect information • Legal regulations • Lack of standards

  8. AUTHENTICATION • 2 Factor Authentication • Password plus a token • Biometrics • Even banks are seeing the need

  9. PUBLIC KEY INFRASTRUCTURE (PKI) • Need for a secure means of transmitting sensitive, confidential data • PKI is not intuitive or easy to support • But it may be the best of breed

  10. PORTALS • Continue to evolve and grow • Flexible, customizable, personalized access and view of information based on the interests and roles of individuals • Open source is mainstream • Branded gateway to resources

  11. COLLABORATION TOOLS • Blogs • Wikis • Courseware sites • Electronic facebooks • Chats, instant messaging, SMS/text messaging • Web conferencing • Digital repositories (i.e. DSpace) • e-portfolios

  12. EDUCATIONAL GAMING • Games aren’t just for fun Learning can be fun • Kids have load of experience • Games are engaging and adaptable to almost any subject • Interactive learning experience; Lessons learned from games stay with students

  13. INSTITUTIONAL REPOSITORIES • What information to keep? Legal requirements Institutional archives • What media will last? CD has limited life Fiche is ancient technology

  14. INTELLIGENT SEARCHING • Personal desktop search “bots” • Specialized search interfaces like Google Scholar • Remember search parameters over time • Searching of multiple archives, repositories, and databases with a single query

  15. GRID COMPUTING • Shared, distributed, heterogeneous computers • Lots of horsepower for computational needs Harness distributed cycles High data demand is more suited to clusters • Relatively inexpensive

  16. PODCASTING • New means for anywhere, anytime learning • Subscription model Files are delivered because subscribers want to get the information regularly • “Feeds” via RSS (Really Simple Syndication) • Usually MP3 audio format • Vodcasting – video enabled podcasting

  17. PEER-TO-PEER FILE SHARING • Concept is valid • There are lawful uses • Industry pressure is growing for Content monitoring • Watch for legislation • EDUCAUSE as voice for higher ed

  18. OUTSOURCING • It’s like politics; which side are you on? • Financially attractive • Expectations high; delivery sometimes high • Caution - Quality varies

  19. Phone, What Phone • Traditional phones are fading • Cost per call based on distance model is broken • Phones in dorm rooms are only for 911 • VoIP works, but will the funding model continue as is?

  20. CONVERGENCE DEVICES • All in one handheld devices • Phone • PDA • Calendar • Email • Web • SMS/Text messaging • TV

  21. CONVERGENCE DEVICES • Support issues • Security issues • Lost devices, confidential data, vulnerabilities and viruses • Data and usage policies • Device ownership

More Related