Document 17564885

advertisement
Enterprise Systems Committee (ESC)
December 16, 2002
Present: Bill Post, Arno Rethans, Len Fisk, Wendi Beane, Bob Hannigan, Jeff Wright, Don
Graham, Brooke Banks, Kim Williams
1. Portal Project Update
The portal is up and running at an acceptable speed from various campus locations. The
speed when using off-campus modems is slow. The upgrade that will be installed mid-year
should help increase modem speed. The Beyond 2000 committee made the decision to have
a minimum number of icons initially available on the WebCT portal shell for each course.
The decision was based on the feeling that faculty would not want icons to automatically
appear that are not in use by a majority of faculty. The B2000 committee will be having
more discussion on these types of issues in coming months.
2. TII Project Update
The trenches are being dug and the project is moving along, however, we continue to slip
behind schedule.
3. Microsoft License Negotiations Update
The basic Microsoft agreement with the CSU is up 12/31/02. Any new contract will cover
faculty, staff, and student labs. The previous contract included students, but it was reported
that only a small fraction of students actually purchased software under the contract. It is
likely student licenses will be dropped to keep the systemwide license within allocated
dollars. A separate arrangement will be made to provide students with low-cost versions of
MS products.
4. CSU Student Technology Fee Update
A comparison of IT fees at non-CSU universities was distributed to members. In fall 1998
and winter 1999, more than 3,000 students from all of the CSU campuses were surveyed.
Fully 91% of those students indicated they would be willing to pay a technology fee if they
were provided a package of information technology services and support. In spite of these
findings, there are still only two CSU campuses today that have student technology fees. A
technology subcommittee of the CSU campuses will be forming guidelines to present to the
Chancellor’s Office in support of a student technology fee.
5. Wireless
An example of a wireless policy and a “Wireless Discussion Points” document were
distributed to members. Staff has researched various wireless policies in order to write one
for this campus. A lot of planning is required when implementing a wireless policy. Four
main points for discussion were: network reliability, security, suitability, and
responsibilities.
A policy would need to include what we would do in the case of interference. One example
from another campus established wireless priorities in this order: Public access points,
instruction, administration, research, and personal. (Committee requested further
clarification on “public access points.”) The airwaves, the radio frequency on campus, is
university property. Therefore, the policy must address users that are causing interference.
For security purposes, a VPN (virtual private network) solution will be used to ensure that
the traffic is encrypted. VPN client software will be downloaded to a user’s machine prior to
the user accessing the wireless network. Policy would need to address visitors to the campus.
A visitor not in the Wildcat LDAP directory would need to be provided "visitor" access.
Suitability addresses the fact that wireless networks are not a substitute for wired network
connections.
Because wireless on campus is an enterprise resource, it needs to be well managed.
Responsibilities to be clarified in the policy might include: Information Resources must
approve all installations on campus, only hardware and software approved by Information
Resources can be used for wireless access, and department heads responsible for wireless
access points within campus buildings used by their department must register any
deployment of wireless access points with Information Resources.
We will need to develop a wireless policy next semester that could be approved by the ESC
and Beyond 2000. The CIO would then forward the policy to the provost for Cabinet
approval.
6. Identity Management
There is a new systemwide initiative on identity management under way. Identity
management has to do with determining who is accessing networked computer systems, and
defining what they are allowed to access based on their role. We currently use several
different systems that require several different sign-ons to access information. The CSU, at
the system level, will be looking for pilot campuses to implement this initiative. Chico and
four or five other campuses are at the forefront with this issue. Our director of Computing
Services will be invited to talk about our current state of identity management at a meeting
this spring.
7. Voice over IP (VoIP)
Voice over IP is the process of running voice (telephone) over our data network. The major
difference is that there will be only one infrastructure. In January, CSU, Northridge will be
the first campus with a beginning Voice over IP system. Our campus currently contracts
with PacBell for their Centrex services. We don’t have a PBX phone switch system on
campus. We may be a perfect case to go to Voice over IP once the TII project is built. Now,
it looks like it may be viable for Chico to swap out its current phone system in about two
years. We would need to put in a higher powered switch. Many questions still must be
answered.
7. Adjournment
All other discussions were deferred to a future meeting.
2
Download