Download presentation
Presentation is loading. Please wait.
Published byShanon Kennedy Modified over 9 years ago
1
its.unc.edu Mobility and Personal Computing Michael Barker, Ph.D. Assistant Vice Chancellor and Chief Technology Officer University of North Carolina at Chapel Hill
2
its.unc.edu 2 Mixture of communities Residential students Off-campus students Privileged access workers, onsite and remote Non-privileged access workers, onsite and remote Guests Mixture of contexts “Academic Use” – e.g., classrooms, laboratories “Administrative Use” – e.g., registration, payroll, fee payment “Guest Use” – e.g., parents, donors, vendors Mixture of “businesses” The Environment
3
its.unc.edu 3 Key trends, undergraduates 84% of undergraduates own a laptop; only 46% own desktops Average 21.2 hours per week on internet Handhelds 63% own an internet capable handheld (51% in 2009) 67% of those use it to access the internet at least once a week (29% in 2009, 43% in 2010) 77% who own an internet capable handheld, use it to access social networking sites Cloud 36% have used web-based productivity application 33% use wikis SOURCE: ECAR Study of Undergraduate Students and Information Technology 2010 (October 2010)
4
its.unc.edu 4 Student usage trends Daily use of text messaging Increasing 53% (2008); 66% (2009); 73% (2010) Daily use of instant messaging (e.g., Jabber, AOL, Yahoo, MSN) Decreasing 48% (2007); 33% (2008); 28% (2009); 24% (2010) Daily use of social networking sites Increasing 49% (2007); 57% (2008); 61% (2009); 59% (2010) SOURCE: ECAR Study of Undergraduate Students and Information Technology 2010 (October 2010)
5
its.unc.edu 5 Some wireless numbers Wireless Access Points Approx 2000 at present approx 5000 needed for pervasive coverage (excluding residence halls) Devices: 50000 distinct devices Concurrency Peak last academic year: 10,021 distinct users Peak so far this academic year: 13,409 distinct users Bandwidth Peak aggregate outgoing so far: 129 Mbps Peak aggregate incoming so far: 536 Mbps
6
its.unc.edu 6 Challenges Security E.g., laptop with ~16,000 viral signatures Leakage of sensitive data Policy protections / guidance Exposing same services in various delivery modalities Directory search Add/drop Course management system Etc… E.g., one person with 4 mobile devices (or 5) Pervasive cellular versus pervasive wireless, versus both Next generation voice services
7
its.unc.edu 7 Strategies Distributed Antennae System (and “Neutral Hosting”) “personal” wireless will continue to grow in cellular networks “business / academic / administrative” wireless will continue to grow in 802.11 networks Bring (some of) your tools: faculty / staff cell phone stipend… Design/architect for remote users Remote capability for privileged access users the greatest challenge Exposing services across network borders, to multiple platforms next greatest challenge No other choice but to support standards and protocols, not specific devices nor specific mobile operating sys
8
its.unc.edu 8 Cell phone stipend Forcing conceptual review/analysis On-call Mobile worker Remote wipe/erase Modem cards Tablets, netbooks, etc. Porting numbers Personal Business Erosion of traditional landlines, or not…
9
its.unc.edu 9 Things to consider What is king? Contents? Applications? Media? Public Privacy Is there a mobile watercooler? Of special concern for public entities Public records, and “fixing” to a “medium” Context commingling Location no longer determines context Does content drive context? Does source / target drive context?
10
its.unc.edu 10 And more things to consider Communications across modalities email SMS text Browser Thick-client, mobile-style… Technology-transformation and social-movement email: 40 years (1970s) SMS: 15-20 years (1990s) http: 15-20 years (1990s)
11
its.unc.edu 11 To infinity and beyond Mobile-2-mobile Pacemaker data Medical alerts Where is your car? Data/persona portability DRM for business-owned content
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.