200 likes | 353 Views
The [216:1 Ratio]. Bridging the Growing Support Gap Through the Proactive Deployment of Emerging Technologies Johnathon A. Mohr, MBA Philadelphia University School House Lane and Henry Ave Philadelphia, PA 19144-5497 Tel. 215.951.6814 Mohrj@philau.edu . Overview. Background
E N D
The [216:1 Ratio] Bridging the Growing Support Gap Through the Proactive Deployment of Emerging Technologies Johnathon A. Mohr, MBA Philadelphia University School House Lane and Henry Ave Philadelphia, PA 19144-5497Tel. 215.951.6814 Mohrj@philau.edu
Overview • Background • Overview of Philadelphia University • The Epidemics of 2002 and 2003 • Defining Containment and Prevention Measures in the wake of the outbreak • The “Cat in the Hat” meets SMA • The Cerberus at the Gate • Hardware protections • The Epidemiology of the next generation of Outbreaks
Overview (Continued) • Student Leadership in the 21st Century • PAIR’ing Model • Lines of Demarcation and Demographics • Defining response (PERT Modeling) • Conclusions • Adaptive Emergent Computing • Doing more with Less • Student ownership and Empowerment
What is Philadelphia University? • Defining a University in the wake of institutional evolution. • Punctuated Equilibrium in Growth • Dramatic Transformation in the Nature of the University • The Evolution of an Organization
Philadelphia University: Evolution The University evolved dramatically over time. As such, the needs technologically, have changed dramatically as well.
The Outbreak Various contributing factors lead to crippling epidemics in 2002-2003. Thus, the etiology manifested as a result of these interrelated casualties.
The Tools of the Trade The various technologies that enable a lean, agile organization and a secure end-user computing experience.
On the Frontlines The steps for a student to access the network and internet.
Transparent Protection The Backend technologies and methodologies protecting our network.
Lastly…the Ω Directive Physically Disabling or Shutting Down sections of the Network Ω
Response Evolution • SUS/WSUS Experience • Centrally Managed Antivirus Experience • The “Client Assessment Tool” Experience • Enter SMA (System Management Application) • Security Criteria for SMA • The Application Deployment and Updates
Trends • Prevention of Outbreaks • Decrease in Support Calls • Drive by and passive infections Dramatically Decreased • The weakness – the user. • Instant Messaging • MySpace • Facebook • P2P Applications
Student Support The Foundations of Student Support.
Projections • Resident Student Population Increase. • Increased Demand for Resources. • Nature of Programs Require Cutting Edge Hardware and Software. • Increased Reliance on Technology and Demand for Technology. • Evolution of the agile institution.
Response Time • 14 Day open to Close (Peak) • 7 Day Open to Close (Normal Demand) • Te = (a+4m + b) / 6 • Where: • Te= Expected Activity Duration • a = Optimistic Time • m = Most Likely Time • B = Pessimistic Time
Calculations: Te = (a+4m + b) / 6 • Normal Period • a: 5, m: 7, b:10 • Te = 7.16 Days • Peak Periods • a: 7, m: 10, b: 14 • Te = 10.16 days
Conclusions • Forced Adaptation • Funding is Constant does not meet demand • Required to innovate • University Evolution: The Punctuated Equilibrium • Constant Vigilance by IT • The Trojan Horse: • The Risk Now is with the user.
Questions? Comments? Thank you! Johnathon A. Mohr, MBA Philadelphia University School House Lane and Henry Ave Philadelphia, PA 19144-5497Tel. 215.951.6814 Mohrj@philau.edu