Wireless Directions University of California, Davis Wireless Technology Team February, 2001.

Slides:



Advertisements
Similar presentations
IMPLEMENTING FINANCIAL AND ACCOUNTING SYSTEMS FOR GOVERNMENT CHRISTIAN T. SOTTIE THE CONTROLLER AND ACCOUNTANT-GENERAL GHANA.
Advertisements

Internal Control–Integrated Framework
Course: e-Governance Project Lifecycle Day 1
Common Management System – CMS “CMS Status & Future” 1 Financial Officers Association April 2004 “CMS Status & Future” William Griffith Vice President,
Lotus Notes - the University of Nebraska Experience Greg Gray University of Nebraska Central Administration Computing Services Network.
Simplifying Application Management CIO Strategies SummIT, Mumbai 23 Jun 2011 Rajesh Raghavan.
Introduction to Unitas Global Managed IT Infrastructure Service Provider February 2012 North America Los Angeles, USA
VoipNow Core Solution capabilities and business value.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
Health Informatics Series
IACT 901 Module 9 Establishing Technology Strategy - Scope & Purpose.
1 July 23, 2002 Strategic Technology Plan Briefing to LOT Committee.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
CMMI Overview Quality Frameworks.
Resource Allocation in Canada Evaluation, Accountability and Control Brian Pagan Expenditure Operations and Estimates Treasury Board of Canada Secretariat.
DRIVING INNOVATION AND ABILITY TO COMPETE THROUGH OUTSOURCING Anthony (Tony) C. Bernardo, Alloy Polymers Inc. NPE 2003 bernardo:
Accessing the EA – Smart Procurement NHS Regional Workshops.
United Nations Development Program India Coordination & Decision Support System (CDSS) on External Assistance Department of Economic Affairs Ministry of.
IT ASSET MANAGEMENT (From Booz-Allen & Hamilton).
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Banking Clouds V International Youth Banking Forum.
Motorola Mobility Services Platform
FY2010 PEMP Notable Outcomes October 15, FRA, LLC Board of Directors 10/15-16/2009 Office of Quality and Best Practices Performance Evaluation Management.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Introduction to RUP Spring Sharif Univ. of Tech.2 Outlines What is RUP? RUP Phases –Inception –Elaboration –Construction –Transition.
1 IS 8950 Managing and Leading a Networked IT Organization.
SEMINAR ON :. ORGANISATION Organizations are formal social units devoted to attainment of specific goals. Organizations use certain resources to produce.
1. 1. Overview: Telecommunications Project  Planning and implementation (2007-today) 2. Discussion: Proposal to Improve Infrastructure  Upgrade horizontal.
Strategic Management of IS/IT: Organization and Resources
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Installation and Maintenance of Health IT Systems
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
ERP. What is ERP?  ERP stands for: Enterprise Resource Planning systems  This is what it does: attempts to integrate all data and processes of an organization.
Service Transition & Planning Service Validation & Testing
CPSC 871 John D. McGregor Module 6 Session 3 System of Systems.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
Hazards Identification and Risk Assessment
E-TechServices's IT Strategy Open. Virtualize. Rationalize. A Strategy for Optimal IT Deployment.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Lecture 4. IS Planning & Acquisition To be covered: To be covered: – IS planning and its importance Cost-benefit analysis Cost-benefit analysis Funding.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
Developing an Investment Governance Framework
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Enterprise Portal Discussions Status & Proposed Next Steps.
State of Georgia Release Management Training
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Selecting the Best Alternative Design Strategy. Two basic steps 1.Generate a comprehensive set of alternative design strategies 2.Select the one design.
Project Management Strategies Hidden in the CMMI Rick Hefner, Northrop Grumman CMMI Technology Conference & User Group November.
Baird MacGregor, established in 1979, is Canadian owned insurance brokerage operating its head office in Toronto's core. Managing creative, customer focused,
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
The NIST Special Publications for Security Management By: Waylon Coulter.
OHSAS Occupational health and safety management system.
CS223: Software Engineering Lecture 32: Software Maintenance.
MIS 2000 Class 20 System Development Process Updated 2016.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.

READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Data and database administration
Information Technology (IT) Department
9/16/2018 The ACT Government’s commitment to Performance and Accountability – the role of Evaluation Presentation to the Canberra Evaluation Forum Thursday,
Windows® MultiPoint™ Server 2010
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
Agenda The current Windows XP and Windows XP Desktop situation
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Wireless Directions University of California, Davis Wireless Technology Team February, 2001

UC Davis Wireless Evaluation Team2 Market View Market Acceptance Time in the Market Place Market Expectations Reality Check Demonstration of Value Productivity Trigger Months

February, 2001UC Davis Wireless Evaluation Team3 Wireless in Transition Favors exposure to the widest possible set of campus users Cannot achieve Favors unique solutions May interfere with public areas May exclude Instructional areas Always possible Comprehensive Specific Areas Coverage DecentralizedCentralized Control The basic deployment of wireless technologies will follow directions that are typically mutually exclusive.

February, 2001UC Davis Wireless Evaluation Team4 Service Deployment  Uniform Service Model  Aggregation of Demand  Standardized Interfaces  Minimized Interference Cannot achieve  Department defines coverage  No Standardized Interface  Interdepartmental Interference likely  Dept. Managed Service Model  No common funding or Support models  Public areas covered  Managed incremental growth  Greatest coverage to the largest user base at the least cost  Client irritation Comprehensive Specific Areas Coverage DecentralizedCentralized Control The basic deployment strategy is driven by a composite set of “general public” and “departmental specific” functional need assessments

February, 2001UC Davis Wireless Evaluation Team5 Policy Development/Enforcement  Standard Access policies  Standard hardware & software policies  Central monitoring of use  Central Interference policy  Campus wide funding model Cannot achieve  High flexibility on use policies  Dept control of access  Dept control of hardware & software  Dept control of interference issues  Dept control of funding  Limited areas are easier to monitor  Less interference issues  Less robust funding model required Comprehensive Specific Areas Coverage DecentralizedCentralized Control Regardless of the deployment strategy, comprehensive policies and enforcement directives will be needed to control the emerging wireless environment.

February, 2001UC Davis Wireless Evaluation Team6 Business Risk  High Level of expertise available to campus  Integration with other campus core systems  Standardized repair and maintenance  Regular refresh Cannot achieve  Depts. develop in-house expertise  Integration only with dept specific systems  Increased risk of obsolescence  Multiple vendors/systems cause higher cost of ownership for campus as a whole.  Fewer locations mean lower integration costs  Lower training and maintenance costs for equipment  Lower cost to exit into newer technologies Comprehensive Specific Areas Coverage DecentralizedCentralized Control Business risks affect every aspect of the final strategy. Of key importance to the institution is the ability to meet the increasing sophistication of our wireless constituents.

February, 2001UC Davis Wireless Evaluation Team7 Conformance To Standards  Economies of scale  Lower training and operational costs  Easiest to monitor for conformance Cannot achieve  Departments define and implement all access and use guidelines  Highest focus on unique needs  Must address frequency interference issues  Common standards maintained  Standard systems available on demand  Simplified technical and functional requirements Comprehensive Specific Areas Coverage DecentralizedCentralized Control The University has found it necessary to define a comprehensive set of technical and “acceptable use” policies governing existing core telecommunications services. Adding wireless services to the existing mix will require development and adherence to new standards.

February, 2001UC Davis Wireless Evaluation Team8 Security Coverage  Parallels existing core systems  Easiest to manage  Common policy enforcement  Minimizes service loss impact Cannot achieve  Security varies by department  Individual user irritation moving between areas  Support and compatibility issues  Common policy enforcement  Access across geographical boundaries Comprehensive Specific Areas DecentralizedCentralized ControlAccess to “the network”and access to “the database” are often conflicting scenarios. The goal is to deploy a system that protects both.

February, 2001UC Davis Wireless Evaluation Team9 Management Issues Centralization The ability of the campus to identify,track, and manage a single seamless wireless system is maximized Single accountability for design and deployment assures adherence to standards Total costs can be identified and managed in unison with other campus core telecommunications services Focus on broadest set of constituent needs may limit departmental depth of feature selection and use Decentralization Systems can be rapidly deployed based on departmental initiative Systems will reflect departmental functional requirements Deployed systems are likely, almost assured, to cause interference without a central design strategy Policies will need to be developed to mitigate inevitable issues of frequency interference Total cost of ownership will be invisible to senior campus management

February, 2001UC Davis Wireless Evaluation Team10 Funding Impacts Budgetary impact $10.5M (based on known $1.50/square foot from Cisco/Microsoft) Approximate client base capability 20,000 to 40,000 based on $250 - $500 per user macro cost from Ericsson and Alcatel Does not eliminate wired support Additional personnel for design and support Existing servers may need upgrades and/or significant configuration changes May impact existing campus technology funding models Will require new funding and billing models Changes in technology could obsolete the investment overnight

February, 2001UC Davis Wireless Evaluation Team11 Directions Comprehensive Specific Areas Coverage DecentralizedCentralized Control 2001/2002 Public Areas 2001/2002 Departmental & Instructional Areas Comprehensive Coverage concurrent 2002/2004

February, 2001UC Davis Wireless Evaluation Team12 Looking Forward What is driving wireless deployments today? What is the most cost effective deployment method for the campus as a whole? How does the campus take responsibility for the technical obsolescence issues? There are serious issues when comparing the technical characteristics of “shared” vs. “switched” data access. With the requirement that UC Davis students have a computer, we expect to see a dramatic increase in demand for wireless access that is not aligned with departmental requirements.