Over the past several years we have seen a rapidly developing increase in the need for research-based data storage across the academic disciplines. The organization has seen many examples of individuals who change roles (e.g., marketing prospect to applicant, then student, then alumni, then employee) over time. We are confident that through this planning process, Duke is being well directed in providing a technical and support infrastructure capable of supporting its mission through the coming years. Duke University has demonstrated the user-centered and mobile-first paradigm of system design with its Duke Mobile app, which provides a simple interface to a broad range of functions. U9vzin(AnC_s>|+ J

Duke University should develop and promote some governing principles about the choice of cloud versus in-house data storage and applications. Individuals at Duke can help each other and model open-source principles across the university. Risks: Top down approach carries risk of missing important requirements or unknown business needs or activities in different Duke organizations. After class sessions, students expect to have access to recorded presentations, guests and lecturettes for review. You must have JavaScript enabled in your browser to utilize the functionality of this website. Duke has made good progress in recent years by increasing the degree of automation we bring to bear in monitoring and diagnosing network performance. 2 0 obj Important data from each of the niche systems is required to help a PI and GM manage the entire research portfolio over the full research lifecycle. Modernizing the science and computational infrastructure. IT staff can view their requests/incidents utilizing Support@Duke. 21st century students move between formal and informal learning and between classrooms, labs and makerspaces or innovation studios as they turn a course concept into an experimental design or develop a computer program to do text mining on an historical text. Maintaining a modern and secure IT infrastructure to protect network resources at the levels required and help make Duke a hub for local-to-global problem solving and two-way engagement with external stakeholders. In order to meet existing and emerging needs, progress is needed on a number of additional fronts. When data are sensitive, they will reside in secure environments, and when they are gathered through mobile devices, they will be readily accessible. Currently the following collaborative tools are known to be used on campus by non-negligible numbers of students, staff and researchers: GIT repositories and development environments, Outlining/Prototyping/simple information management, [1] Relating to working group recommendations ABS1, SMPL4, SMPL5, and OPWM, [2] Relating to working group recommendations ABS2, ABS3, and OPWM. Health data and student data are DIFFERENT and have different regulations. For example, many cities already provide clear, real-time digital signage and communication about bus schedules and availability - but Dukes internal bus system only offers simple tracking through an app[23]. Since it will be a necessary for us to develop applications and mechanisms that permit these essentially insecure devices to nonetheless conduct safe transactions, we should focus on ensuring the security and privacy of Duke data consumed and used by these applications, especially ones developed internally. All of this takes place on phones, tablets and other personal mobile devices. In addition, the group identified a need to establish a wireless planning group to plan for anticipated rapid growth in wireless devices (e.g., Internet of Things) and to evaluate potential to reduce costs in new buildings by right-sizing wired endpoints in an increasingly wireless world. This requires that Duke Enterprise somehow identify and define all data sources. This catalog should include the stewards, locations, and access procedures, costs, and security. Description: Describing the current environment and strategic priority): The Duke enterprise needs to move toward cloud-based information technology services. Having procurement flag purchases of similar equipment that were not purchased through the Duke Technology Center and utilize discovery to add non computer store purchased devices in the asset management tool. We should: Meeting the mandates of our funding agencies and the expectations of our community to preserve data and other digital research products for posterity requires new ways of thinking about data archiving. All data administrators must feel a responsibility to make data available for appropriate and secure use. stream Notify users of outages and their expected resolution in a timely fashion. Many constituents will still feel a lack of effort in communications if they choose not to utilize the endpoint support offerings. Some units possess the technical and/or financial capacity to maintain modern, useful, useable, current websites, while others struggle to keep even basic sites updated, secured, and on-line. Increased availability of flexible, informal learning spaces benefits students and faculty by alleviating concerns about how project-based or team-based coursework can be accomplished. [12] Relating to working group recommendation SMPL3. JavaScript seems to be disabled in your browser. In-class technologies can also be inconsistent. This should leverage campus infrastructure such as light posts, blue lights, and perhaps signage. Hotel style, lower power/reach APs should be deployed to segregate traffic and deliver an excellent in-room experience for students. barnett regina tyler senate leadership staff vsu Most staff and faculty use smart phones as well. It is conceivable that a school might buying cloud solution for a niche app that is not too IT focused (so OIT would not be involved.) Door upgrade / Duke card upgrade projects, SDN specific security threats (add to disruption), Determind lifecycle of devices / CMDB / device identification / device owner identification, Terry Oas (Faculty Chair)(SoM, Biochemistry), Rochelle Newton (Law School User Services Manager), Purchased with Duke funds refers to the definition within the faculty handbook and the finance administration office. In years since, experiments have led to an increase in easily accessible video tools (VoiceThread, Flip cameras, HD cameras for checkout), Dukes WordPress instance, and more. <> = To meet university strategic planning goals. [24] http://www.educause.edu/eli/initiatives/learning-space-rating-system The Educause Learning Space Rating System might be a good place to start. Progress towards this can be made by: Resource implications: Stanford, Harvard IT academy models: security is one of many possible angles for this pilot of security academy with 40 people this spring so Duke IT Academy requires enhanced training headcount. Security expertise needs to be present in IT units at all levels as a routine part of IT work. Vice President of Information Technology and Chief Information Officer, Information TechnologyStrategic Planning Leadership, Linda Franzoni, Pratt / Lynne OBrien, Library, Rachel Richesson, Nursing / Brenda Franks, OIT, Jeff Chase, A&S Computer Science / Charles Kneifel, OIT, Stephen Bass, A&S Physics / Kristen Brown, Public Affairs, Terry Oas, School of Medicine / Paula Batton, OIT, John Board (Chair) Associate CIO and Professor, Pratt School of Engineering, Timothy McGeary (Co-Chair), Associate University Librarian for IT, Duke Libraries, Joanne Van Tuyl, ITAC Chair, and Professor of Slavic and Eurasian Studies, Charles Kneifel, Sr. Technical Director, OIT, Julian Lombardi, Assistant Vice President, OIT, Richard Biever, Chief Information Security Officer, Julian Lombardi, Assistant Vice President, Robert Johnson, Senior Director of Communications Infrastructure and Global Strategies, Christopher Meyer, Senior Director, Enterprise Systems & Support, Jennifer Vizas, Director, Projects, Service Adoption & Engagement. OIT can provide leadership here by defining expectations for this kind of documentation and transparency, and can provide training to Duke IT leaders. ( 1 &. Moving forward, Duke should encourage different approaches to coordinate data collection and re-use data. Dukes wireless data network should support universal coverage and seamless roaming throughout the campus, and interconnect transparently with the health system wireless network. As often the original email doesnt include the needed information or detail, solutions are slower, regularly resulting in much lower customer satisfaction ratings.) Benefit: Increased satisfaction and efficiency/productivity. Funding associated with 2.1.2 does not accommodate future fiber initiatives in support of research networking, outdoor WiFi, and/or physical security connectivity. Costs for data storage and CPUs are going down, yet information technology related costs continue to go up. <> 8 0 obj Finally, we should investigate new tools that support adaptive learning as the field continues to mature - looking for solutions that might help increase flexibility in the curriculum and/or scheduling. This group needs to be visible and transparent. ***$50K annually is already committed by Library. A team of 10 IT leaders and representatives from different Duke schools and entities was convened in November 2015 to explore strategies to support and improve the administrative and financial systems of Duke University. Dukes advanced technological environment is strategically important to its academic mission since information technology is an indispensable presence and fundamental enabler of world-class research, educational practices, and the fundamental operations of our globally integrated university community. Durham, NC 27701 21st century classrooms should allow students to move easily between large and small scale learning activities. Currently the computer store processes are managed without insight from local or centralized IT units. Ideally, faculty and grant administrators should be shielded from the complexities of the underlying enterprise applications so that PIs and GMs can do their jobs without really know what system they use. Ability to digitally capture and share activities in a space should be the common default for any learning space. Promoting the development of learning communities and building technological capabilities into informal communal spaces.

Not much done, but we are early enough that the SAP that we can start to build a catalog. The ideal place for business rules is the service layer where the rules are applied consistently across user interfaces.

Faculty benefit from more spaces that can support an increasingly diverse set of pedagogical strategies (Team Based Learning, Active Learning, Group and Project-based Learning, Flipped Classroom, etc.). We will therefore need to: We must build capacity and provide support for emerging forms of online teaching and learning. Accessibility is a key consideration for those with disabilities with the increased use of technology. Leverage identity and/or access tokens for third-party applications. stream It must include OIT but also be a university-wide group. Other drivers may emerge (e.g., telemedicine). In addition to the primary research support systems of SPS and SAP, there are a number of niche systems which play a role in supporting research administration including eIRB for Medical School human subjects protocols; SES for sponsored effort tracking; ECRT for institution effort reporting; KSS for research contract tracking; CoreResearch for research core services and billing; and a number of other applications. Adopting a strategic stance to embracing the above benefits students and faculty dealing with an increasingly complex learning environment. The rate of this change, both technological and cultural, is having a dramatic impact on university life and the academic enterprise. The form knows who he is due to previous authentication to another site, so he only has to answer 2-3 questions regarding his general usage, and to confirm that the serial number and model of the computer that we have on record from him is accurate. Information technology is now so integral to modern university life that IT organizations must act more as partners within the academic enterprise rather than as only the providers of secure and reliable IT infrastructures and services. Another issue found between the campus and the SOM (it may occur between schools, departments, centers and institutes as well) is the inability to adopt similar processes so common IT systems can be shared across the entities. When and how should we vet and monitor devices entering the network? While log and data collection can be of benefit, the sheer mass of data requires a reimagining of how the data is analyzed to identify critical security issues. 3-Closure of ticket: Including the automated closure and often a manual response from the analyst stating details about the resolution. Dukes classroom configurations vary significantly across the academic units; many rooms are already capable of recording and delivering excellent media experiences, while others are in need of reconfiguration and upgrade. So-called adaptive learning tools have the potential to provide students with customized/customizable pathways to work through. 43, Appendix VI: Report of the Working Group on Support Models, Procurement and Licensing.. 47, Appendix VII: Report of the Working Group on Online Presence, Web and Mobile. 52. Product was successfully added to your shopping cart. Upon requesting assistance or reporting known issues, knowledge, and common automated requests would be prompted in hopes to increase self-service prior to requesting assistance. Having the data in a common database might make data extraction and reporting much easier, but this can be better accomplished via making the data available via APIs as well as via the Tableau reporting tool. In the past we have attacked this problem by using existing platforms (e.g., dFac built on SAP). Sadly, the creativity and energy of the attackers appears to be unbounded, with new and serious threats appearing with concerning frequency. Improve and grow current data collection mechanisms for Duke network and systems. The model of having a large team devoted to security, and other IT workers who treat security as not their area, is inefficient and ineffective. However, the rapidly changing nature of the technology industry requires that any approach to planning incorporate a continuous survey of the technology landscape and constant course correction. Duke as an enterprise should be ready to accommodate them as they emerge. Duke has recently obtained (through RENCI) connectivity to Internet2 circuit service (I2-AL2S), enabling on-demand high-speed connectivity to other academic institutions and national labs. Seven university-wide IT working groups were constituted in order to develop a comprehensive IT plan for Duke that can support needs and ambitions of the broad range of university IT stakeholders. Though security is very difficult to guarantee on personally owned smartphones and the like, nonetheless our users are expecting to be able to manage aspects of their research data activities, even those involving sensitive data, from their mobile devices, making use of applications developed for this purpose. These can also be used as authorization bearer tokens for service accounts in internal server-to-server authorization. Residential ISPs in the region are improving last-mile service to home users, which will feed this trend increase demands. To achieve this future vision, services need to be developed in front of each of the applications. password change pc desktop lock screen computer option campus enter