Title: Not Our Problem But Ours to Solve
1Not Our ProblemBut Ours to Solve
- Sally Jackson
- Chief Information Officer
2Who Owns a Problem?
- The person whose job description contains the
problem. - The person who caused it.
- The person who most wants it solved.
- The person who has means for solving it.
3Unclaimed Problem 1
4Haves and Have Nots
5Haves and Have Nots
- Haves
- Equipment on regular refresh cycle
- Fully staffed IT support
- Abundant bandwidth
- Flexible resources for experimentation
- Have Nots
- Aging equipment, not up to date
- Overtaxed IT support
- Substandard network
- All resources locked in to current use
6Haves and Have Nots
- We cant afford any true Have Nots
- Security compromises
- Obstacles to campus-level change
- Cost displacement
- Degradation of overall IT environment
7Haves and Have Nots
- Solution components
- ICTs seen not as personal amenities but as
platform for an expected level of performance - Entitlements defined to meet that level
8Unclaimed Problem 2
9Duplication, not Abundance
10Duplication, not Abundance
- Despite constrained resources, we duplicate
- System administration
- Email services
- Course management systems
- Collaboration tools
- Business application development
11Duplication, not Abundance
- Why we duplicate
- Difference between what something costs the
campus and what it costs the doer - Significant costs concealed by longstanding
financial practices
12Duplication, not Abundance
- Solution components
- Hidden costs exposed through decentralization
- Activity Based Costing
- Transparently priced Shared Services
13Unclaimed Problem 3
14High Risk Handling of Data
15High Risk Handling of Data
- Breached systems are not the problem!
- In 2007, 22 of security incidents were due to
system penetration (source ESI) - Loss, theft, and unauthorized release are far
more common
16High Risk Handling of Data
- Solution components
- Equip departments adequately
- Focus on people and behavior
- Make data safer for ordinary use
17Unclaimed Problem 4
18Fragmented Cyberinfrastructure
- CI Elements
- Computing
- Data, tools, visualization
- Virtual organizations
- Workforce
19Fragmented Cyberinfrastructure
- Highlights
- High performance computinglatest Blue Waters
- Advanced network
- Superb programs
- Deficiencies
- No entitlement HPC
- Virtual organizations not well supported
- Balkanized collaboration environments
- CI not integrated with campus plan
20Fragmented Cyberinfrastructure
- Solution components
- Review campus CI against national vision
statements - Align research proposals with plan for filling
known gaps - Build CI Impact Analysis into proposal process
21Unclaimed Problem 5
22Conservatism
23Conservatism
- Conservative in the oddest places
- Collaboration technologies
- Virtualization
- Business informatics of all kinds
- Open Source/Community Source
24Conservatism
- Why isnt Illinois first and best?
- Tolerance for have nots reduces ambition
- Duplication uses up fungible resources
- Heterogeneity makes change unpredictable
- Fragmentation makes change ponderous
25Lets claim these problems
26Ours to Deliver
- Ambition
- Abundance
- Self-assurance
- Edginess