Not Our Problem But Ours to Solve - PowerPoint PPT Presentation

1 / 26
About This Presentation
Title:

Not Our Problem But Ours to Solve

Description:

Unclaimed Problem 1. CITES. May 28| Slide 4 'Haves' and 'Have Nots' ... Unclaimed Problem 4. CITES. May 28| Slide 18. Fragmented Cyberinfrastructure. CI Elements ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 27
Provided by: cmcl9
Category:

less

Transcript and Presenter's Notes

Title: Not Our Problem But Ours to Solve


1
Not Our ProblemBut Ours to Solve
  • Sally Jackson
  • Chief Information Officer

2
Who Owns a Problem?
  • The person whose job description contains the
    problem.
  • The person who caused it.
  • The person who most wants it solved.
  • The person who has means for solving it.

3
Unclaimed Problem 1
4
Haves and Have Nots
5
Haves and Have Nots
  • Haves
  • Equipment on regular refresh cycle
  • Fully staffed IT support
  • Abundant bandwidth
  • Flexible resources for experimentation
  • Have Nots
  • Aging equipment, not up to date
  • Overtaxed IT support
  • Substandard network
  • All resources locked in to current use

6
Haves and Have Nots
  • We cant afford any true Have Nots
  • Security compromises
  • Obstacles to campus-level change
  • Cost displacement
  • Degradation of overall IT environment

7
Haves and Have Nots
  • Solution components
  • ICTs seen not as personal amenities but as
    platform for an expected level of performance
  • Entitlements defined to meet that level

8
Unclaimed Problem 2
9
Duplication, not Abundance
10
Duplication, not Abundance
  • Despite constrained resources, we duplicate
  • System administration
  • Email services
  • Course management systems
  • Collaboration tools
  • Business application development

11
Duplication, not Abundance
  • Why we duplicate
  • Difference between what something costs the
    campus and what it costs the doer
  • Significant costs concealed by longstanding
    financial practices

12
Duplication, not Abundance
  • Solution components
  • Hidden costs exposed through decentralization
  • Activity Based Costing
  • Transparently priced Shared Services

13
Unclaimed Problem 3
14
High Risk Handling of Data
15
High Risk Handling of Data
  • Breached systems are not the problem!
  • In 2007, 22 of security incidents were due to
    system penetration (source ESI)
  • Loss, theft, and unauthorized release are far
    more common

16
High Risk Handling of Data
  • Solution components
  • Equip departments adequately
  • Focus on people and behavior
  • Make data safer for ordinary use

17
Unclaimed Problem 4
18
Fragmented Cyberinfrastructure
  • CI Elements
  • Computing
  • Data, tools, visualization
  • Virtual organizations
  • Workforce

19
Fragmented Cyberinfrastructure
  • Highlights
  • High performance computinglatest Blue Waters
  • Advanced network
  • Superb programs
  • Deficiencies
  • No entitlement HPC
  • Virtual organizations not well supported
  • Balkanized collaboration environments
  • CI not integrated with campus plan

20
Fragmented Cyberinfrastructure
  • Solution components
  • Review campus CI against national vision
    statements
  • Align research proposals with plan for filling
    known gaps
  • Build CI Impact Analysis into proposal process

21
Unclaimed Problem 5
22
Conservatism
23
Conservatism
  • Conservative in the oddest places
  • Collaboration technologies
  • Virtualization
  • Business informatics of all kinds
  • Open Source/Community Source

24
Conservatism
  • Why isnt Illinois first and best?
  • Tolerance for have nots reduces ambition
  • Duplication uses up fungible resources
  • Heterogeneity makes change unpredictable
  • Fragmentation makes change ponderous

25
Lets claim these problems
26
Ours to Deliver
  • Ambition
  • Abundance
  • Self-assurance
  • Edginess
Write a Comment
User Comments (0)
About PowerShow.com