Penn State/Napster 2.0 Trial Russell S. Vaught Associate Vice Provost Information Technology.

Slides:



Advertisements
Similar presentations
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Advertisements

MP3 Critics Web-Based Music Downloading Services CSCI 110 Dr. Bowring Matt Lyons Jarrett Bouchette Brittany Bridges.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Access Control Chapter 3 Part 3 Pages 209 to 227.
Using Kerberos the fundamentals. Computer/Network Security needs: Authentication Who is requesting access Authorization What user is allowed to do Auditing.
1 Penn State/Napster 2.0 Trial Russell S Vaught Associate Vice Provost, Information Technology Copyright Russell S. Vaught This work.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Password?. Project CLASP: Common Login and Access rights across Services Plan
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
By Frank Minichini IS 373 Kerberos. Introduction Kerberos is a network authentication protocol used to securely send and receive nodes in communication.
Agenda Survey service transition and retirement Examining your survey needs Evaluating application features Service providers.
UCLA’s Shibboleth Plan Shibboleth is an integral part of UCLA’s Enterprise Directory & Identity Management Infrastructure (EDIMI) Project Integrate with.
CNIL Report April 4 th, CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure.
Trend Micro Round Table May 19, Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.
CalShares Investigating Voluntary Collective Licensing for Music File-Sharing at UC Berkeley Matt Earp and Andrew McDiarmid May 15, 2008 Advised by Pamela.
Windows Server WHAT IS ACTIVE DIRECTORY? FUNDAMENTALS OF THE ACTIVE DIRECTORY – Benefits of Using the Active Directory in an Enterprise Environment.
Fermilab VPN Service What is a VPN ?.
LDAP Management at Stony Brook Making Active Directory and PeopleSoft Work Together SUNY Technology Conference Rochester, New York Monday June 12, 2006.
1 Enabling Secure Internet Access with ISA Server.
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
Effective Customer Service: Exploring the process from beginning to end.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
Microsoft Security Certifications Bob McCoy Technical Account Manager Premier Support Microsoft Corporation.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Napster Shibboleth Target PSU/Napster Technical Integration R. Ramos
CBT Implementation on the Berkeley Campus Jack McCredie Associate Vice Chancellor Information Systems and Technology University of California, Berkeley.
Cdigix & Clabs Overview Chuck Powell Director, Academic Media & Technology, ITS Yale University May 11, 2005.
Section 2 Software.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Nov 1, 2000Site report DESY1 DESY Site Report Wolfgang Friebel DESY Nov 1, 2000 HEPiX Fall
PASS Migration * PASS Migration Update Part IV * PASS Beta Test Launched – Review.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
CSG Org WorkshopSlide 1 98/9/17, pel If I Ran the Circus... Phil Long Yale University.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
Michael Zawacki Jason Cubberley James Scarola Lansing Cookson Brett West.
State of e-Authentication in Higher Education August 20, 2004.
Cdigix at Yale Chuck Powell Director, Academic Media & Technology, ITS Yale University September 15, 2004 Copyright Charles Powell.
Real Audio Real audio is a file format for sound and video files on the web. Real Audio files are files with either a.rm or.ram extention. Real Audio format.
Penn State Napster 2.0 Trial1 Penn State/Napster 2.0 Trial Russ Vaught.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
1 Lesson 6 Software and Hardware Interaction Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
PSU Napster Trial Russ Vaught. Background Copyright infringement has been on our radar screen for a number of years President Spanier has taken a national.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Getting Connected to NGS while on the Road…
Nassau Community College
See: under Projects and Planning
John O’Keefe Director of Academic Technology & Network Services
ComArtSci Technology Update
Network and the internet
Music Downloads By Garen Mirzoian.
Dartmouth College Status Report
Getting Connected to NGS while on the Road…
Chandler and Higher Education
Empowering Security Communities
Windows Networking ICCM 2004 Tim Young
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
WELCOME Start of Semester Meeting Fall 2019
Presentation transcript:

Penn State/Napster 2.0 Trial Russell S. Vaught Associate Vice Provost Information Technology

Penn State Napster 2.0 Trial2 Music Delivery Options Wide discussions with students at several levels Evaluated a number of services Desired Attributes based on student desires –Net Radio (more important than we thought!) –Streaming Audio –Tethered Downloads –Purchase and Burn Tracks Napster had all attributes

Penn State Napster 2.0 Trial3 Security Strong Policy on Computer and Network Security –Deals directly with Copyright Infringement –Now bans servers in Residence Halls Installing firewalls on 94 Residence Hall networks Practice –Have always suspended network access upon Infringement Notice or substantiated awareness

Penn State Napster 2.0 Trial4 Account Creation Essentially All Students have an Access Account –Based upon MIT’s Kerberos (K-5) –LDAP entry for eligibility Uses eduPerson 2.0 schema Provides –Authentication – You are who you say your are (K5) –Authorization – You can do what you want to do (LDAP) Tight link of PSU’s system to Napster’s –Uses Internet2’s Shibboleth technology

Penn State Napster 2.0 Trial5 Current Status Centrally funded –No direct cost to students except for purchased tracks Service made available to 16,500 Residence Hall students on January 11 –12,500 (75%) have computers qualified for Napster Service only for Windows 2000 and XP No earlier Windows, Mac or LINUX clients 10,228 (82%) of qualified students now signed up Over 100,000 tracks per day in first weeks –Around 80,000 tracks per day recently

Penn State Napster 2.0 Trial6 Future Plans All students eligible starting Fall Semester Faculty and Staff at a discounted rate Promote upgrade of Windows machines –Low cost to students –New students more likely to have XP Interest in technical alternatives for Mac and LINUX users Contract includes a study of our trial

Penn State Napster 2.0 Trial7 Observations Most students who have service value it –Considerable interest by student leaders at other institutions Complaint focus –Valued and new tracks not available –Not yet available for me –Macs not supported Piracy seems to have decreased –Infringement notices are down for residents –Most now dialup students!