Este documento describe cómo Microsoft aborda los desafíos de la informática educativa en la educación superior a través de su modelo de optimización de infraestructura (IO). El modelo IO propone una evolución desde procesos básicos y manuales hasta sistemas informáticos dinámicos automatizados en cinco áreas clave: administración de identidad y acceso, administración de escritorios y servidores, seguridad y red, protección de datos y procesos informáticos y de seguridad. El documento también describe algunas tecnologías
2. Profesorado Estudiantes Institución
Microsoft faculta a la gente para que
realice su potencial social y económico al
proporcionar acceso a experiencias
educativas de calidad para todos mediante
la tecnología.
5. Los retos de la informática de la
educación superior
•
–
–
–
•
–
–
–
6. El Modelo de optimización de
infraestructura (IO) de Microsoft
Básico Estandarizado Racionalizado Dinámico
“Apagamos “Estamos obteniendo “Facultamos la “Somos un activo
estratégico de la
incendios” el control” educación” educación”
Procesos manuales y Estándares y políticas Procesos y políticas Autoadministración,
localizados; mínimo para administración de optimizados; sistemas informáticas
control central; no hay escritorio y servidores;
administración de dinámicos; uso de
políticas para la uso del servicio Active
escritorios y modelos del sistema para
seguridad y prácticas Directory® para
servidores rentable automatizar las
informáticas administrar los
operaciones; integración
recursos, la seguridad y
y colaboración
el control del acceso
Administración de identidad y acceso | Administración de escritorios, servidores y dispositivos
Seguridad y sistema en red
Protección y recuperación de datos | Procesos de informática y seguridad
8. Adminsitración de identidad y acceso
Básico Estandarizado Racionalizado Dinámico
Aprovisionamien
Sin servicios de Servicios de Aplicación por to automático de
directorio directorio políticas cuentas
unificados
Directorios Configuraciones Soporta el
múltiples Servcio de Active estándar acceso externo
Directory® a la red
9. Administración de escritorios, dispositivos y
servidores
Básico Estandarizado Racionalizado Dinámico
Aplicación de Aplicación de Aplicación de revisiones
del servidor, imágenes
Modelado de la
revisiones ad hoc; revisiones en el capacidad de
en capas
varias escritorio; imágenes infraestructura
Un solo sistema
estándar del escritorio operativo con Administración de los
configuraciones Dos sistemas virtualización dispositivos móviles a
del escritorio operativos Administración de la par con los PCs
Gestión limitada de dispositivos móviles con
contratos de nivel de
Cambios dinámicos
Sin dispositivos dispositivos móviles de la carga de trabajo
servicio (SLAs)
móviles
10. Seguridad y sistema en red
Básico Estandarizado Racionalizado Dinámico
Firewall Mitigación de
Sin software Software anti-virus gestionado y amenazas a través
estándar; firewall firewalls basados del extremo cliente
antivirus centralizado y servidor
en el host
estándar. Operación en red
Acceso remoto e Supervisión a nivel
Sin firewall básica y supervisión de servicio
de los servidores inalámbrico
habilitada por
dedicado críticos altamente seguro modelos
Sin dispositivos Cierto soporte para Supervisión del Cuarentena
acceso inalámbrico servidor con SLAs; automática de PCs
móviles WAN administrada infectados
11. Protección y recuperación de datos
Básico Estandarizado Racionalizado Dinámico
Respaldos ad Respaldo y Respaldo y
hoc Respaldo y recuperación para recuperación para
recuperación todos los servidores todos los servidores
Infraestructura
con SLAs con SLAs
de red limitada
Limitado a los Respaldo de datos Respaldo de datos
Sin pruebas de servicios críticos gestionado gestionado
centralmente para centralmente para
recuperación sitios remotos sitios remotos
12. Procesos informáticos y de seguridad
Básico Estandarizado Racionalizado Dinámico
Responsabilidad Cumplimiento de
de seguridad Responsabilidad seguridad definido y
limitada herramientas de
por la seguridad Evaluación de
auditoría
Sin respuesta de los datos riesgo
automatizadas
formalizada a Estándares de automatizada
incidentes; control seguridad definidos
Evaluación de
limitado de acceso para adquisiciones
riesgo limitada de software
21. Recursos
• Microsoft en la educación : www.microsoft.com/latam/educacion
• Herramientas de evaluación
http://www.mslatam.com/latam/empresas/assessment/seleccione.aspx
• Productos y soluciones de Microsoft
– Windows Server® 2008: www.microsoft.com/windowsserver2008/en/us/default.aspx
– Windows ® HPC Server 2008 : www.microsoft.com/hpc
– Microsoft Desktop Optimization Pack para Software Assurance:
www.microsoft.com/windows/products/windowsvista/enterprise/features/tools.mspx
– El enfoque de Microsoft para la virtualización:
www.microsoft.com/virtualization/products.mspx
[Speaker’s Notes:]The Microsoft vision for education is in response to many of the challenges and goals that are common to universities and colleges around the world today. Like you, we want people to be empowered through quality educational experiences so they can go into the world and make a difference. We believe the most important use of information technology is to improve education. And, as such, we’re committed to working with colleges and universities as they build technology infrastructures and integrate technology into curricula to benefit students and faculty alike.
[Speaker’s Notes:]As somebody embedded in the academic world, you recognize the challenges that higher education is facing today:Increasingly, universities and colleges are being called upon, and in some cases held accountable for, aligning their goals with community and national employability and economic development goals.--Societies are demanding greater accessibility and affordability when it comes to higher education, so that more students have the opportunity to advance their education and become productive members of their communities. --And business communities are demanding talent that are skilled in the use of 21st century technology.Many students who now use technology at home expect it to be a fundamental part of the education experience. And those who don’t have access to technology need it to be part of their education experience in order to gain 21st century skills. Additionally, with expanding curricula in today’s higher education, faculty members have less time and need technology to help them reduce workloads, increase their collaboration capabilities, and be more efficient in delivering on core teaching, research, and publishing responsibilities.
As the cost of acquiring technology falls, the demands on IT are rising. Today, faculty, staff, and students frequently work remotely. Mobile connectivity is commonplace, as people check e-mail messages and attachments from just about anywhere. What’s more, as researchers and academic leaders seek to collaborate with each other, they want systems that make it easier for them to interact and share ideas.In addition, as you know, IT departments at universities and other institutions must deal with acceleration of technology-driven research. Providing for high-performance computing—and the infrastructures to support it—also creates strains on IT resources.Satisfying these demands have led to other challenges…
All of the new demands that you and your IT departments have had to address in recent years have added to an already-complex infrastructure.At most universities and institutions of higher learning, the IT infrastructure has evolved over several years, and as a result, HE institutions have a mix of hardware, operating systems, and applications supplied by multiple vendors. Because of this mix, these infrastructures often lack centralized management and automated processes.Within these increasingly complex environments, IT staff have been pressed to integrate diverse systems and provide interoperability among them. What’s more, you must also deal with pressures to become more “green“—to reduce your carbon footprint and energy use.Of course, these challenges are not so different from those faced by large enterprises. But higher education must work with more limitations on budgets and resources. You and your colleagueswho bear responsibilities for IT simply cannot afford to replace your infrastructures overnight.
Microsoft offers its infrastructure optimization—or IO—model as a way for you to upgrade your infrastructure in stages.With this approach, you can work with Microsoft and your Microsoft partner to create a plan for upgrading. The plan will take your budget into account and help you integrate new technologies with your existing infrastructure. You can begin working toward an automated, dynamic infrastructure in steps.The IO model describes four types of infrastructure—from Basic to Standardized to Rationalized and Dynamic.The Infrastructure Optimization Mode, or framework, helps higher education IT realize dramatic cost savings by moving from an unmanaged environment towards a dynamic environment. The model identifies multiple characteristics at each level—which we’ll cover in the next slide. First, however, let’s summarize what happens as institutions move from one level to another:Security improves as you move from a highly vulnerable state in a Basic infrastructure to a proactive, automated state in a more advanced infrastructure. Management changes from a highly manual, reactive approach to centralized , automated management functions. In addition, processes that are fragmented or nonexistent at the Basic level become optimized and repeatable.You’ll note, for example, that at the Basic level, you are mostly “fighting fires,” while at the Standardized level, you begin to gain control. At a Rationalized level, you start providing the efficiencies that make IT a strong enabler of academic and research goals. Finally, at the Dynamic level, the IT infrastructure is a strategic educational asset—one where you help your faculty, students, staff, and researchers achieve even more, while you lower the complexity and costs of your infrastructure—including energy and management costs.Microsoft and partners provide the technologies, processes, and procedures to support your infrastructure optimization journey. The value of the IO model is that it is much more than a theoretical concept. You can take advantage of Microsoft tools associated with the IO model–which are available at no cost—to assess where your infrastructure is now and discover how to move forward.Before we discuss the key areas of focus that the IO model uses to determine the level of an IT infrastructure…
The Microsoft IO model built on previous work done by independent industry analysts to identify what areas are most important in achieving an optimal infrastructure, where IT actually becomes a strategic asset. Those areas include:Identity and access management—How institutions manage access to their servers, applications, and services and provision and de-provision users.Desktop, server, and device management—How IT departments manage their hardware and software, including mobile devices.Security and networking—What IT departments have in place to help protect their networks and users from potential threats.Data protection and recovery—What higher-education IT uses to help ensure that data is protected and can be easily recovered in the event of a disaster or hardware failure.IT and security processes—What processes are in place for managing IT as a whole, as well as what processes are used to provide a highly secure IT environment.Let’s take a quick look at how these areas are addressed at the various IO levels…
In the critical area of Identity and Access Management, the Microsoft IO model identifies the various levels as shown:At the Basic level, higher education IT infrastructures lack directory services or have multiple directories that are not in sync. Account provisioning is done by manual processes.At the Standardized level, that changes. Directory services are unified, and they are synchronized through Active Directory.At the Rationalized level, access to various applications and services is handled with policy-based management, and configurations are standardized.Finally, Dynamic IT infrastructures offer automated account provisioning with policies in place to simplify external network access and maintain synchronization of identities across a wide range of directories and applications, while maintaining the highest levels of security.
Some of the characteristics of the various levels of infrastructure optimization for desktop, server, and device management include:Ad hoc patching and multiple desktop configurations at the Basic level—with no mobile device management, while at the Standardized level, there is desktop patching and standard desktop images. Higher education IT infrastructures at this level typically have standardized on two client operating systems and offer some mobile device management, but it’s limited.At the Rationalized level, server patching and layered images are characteristics, and typically there is one standard operating system with virtualization used to support older applications that run on other OS’s. Finally, at the Dynamic level, you will find infrastructure capacity modeling, mobile device management that is equivalent to the management of the institution’s PCs, and dynamic workload shifting is possible.
In the areas of security and networking, you will also see an evolution as higher education infrastructures are optimized:At the Basic level, IT environments lack standard anti-virus software, and they have no dedicated firewalls. They also have no mobile devices or have no means of managing mobile connectivity.However, at the Standardized level, IT departments have standardized on anti-virus software, they have centralized firewalls, and they manage basic networking and monitoring of critical servers, including limited management for mobile devices.When IT infrastructures reach the Rationalized level, they have managed firewalls that are host-based and provide highly secure remote and wireless access, perform server monitoring with service-level agreements, and offer management of their wide-area networks.Finally, at the Dynamic level, they have mitigated security threats across the client and server edge with model-enabled service-level monitoring, and automated quarantined of infected PCs, to achieve the highest level of security.
Similarly, data protection and recovery becomes increasingly sophisticated, even as IT infrastructures become less complicated, when moving from level to level.At the Basic Level, backups are done on an ad hoc basis, and the network infrastructure is limited. Typically, there is no recovery testing at this level.At the Standardized level, back up and recovery is limited to critical services, while at the Rationalized and Dynamic levels, there are backup and recovery mechanisms for all servers with SLAs, and data back up for remote sites is centrally managed—again, simplifying the infrastructure while offering better safeguards in case of system failure or disasters.
Processes for IT and security are also identified for each of the IO model levels. HE institutions at the Basic level, for example, have limited security accountability and no formalized procedures for incident responses. They also have limited control over user access to their institution’s networks and applications.At the Standardized level, there is accountability for data security, limited risk assessment, and some tools to automate compliance policies.HE institutions that reach the Rationalized level have defined security compliance procedures and automated audit tools. They also have defined security standards for software acquisition. Finally, at the Dynamic level, HE institutions have everything that those at the Rationalized level have, plus automated risk assessment.
Everyone who is responsible for IT in higher education wants to make his or her infrastructure more efficient, more secure, and more manageable. But how do you do that?The first step is determining where your IT infrastructure fits today, and where you want it to be. The tools associated with the Microsoft Infrastructure Optimization Model can help you do just that.Two tools are available, and you can use one or both. The first is a self-assessment tool that you can do online. It takes only a little time to complete the questions the tool asks of you.The second tool is one that you can download to automatically search your networks and identify exactly what you have in your infrastructure.These tools are easy-to-use and deliver detailed reports…
Most institutions find the detailed reports generated from the tools to be extremely helpful. They are equivalent to the highly costly reports that leading industry consultants charge, yet you can get this information at no charge.Then, you can take those reports and work with your Microsoft partner or Microsoft Services to put a plan in place. The plan will consideryour budget and your resources—to help you move closer to an IT environment that simplifies management, reduces costs, and that can ultimately become a strategic asset.
Several technologies that can help you as you move forward in optimizing your infrastructure. One of the most important is virtualization.Microsoft takes an integrated approach to virtualization that helps you respond faster to user needs, deliver more reliable service, and free critical resources for other tasks.For example, with virtualization, you can run multiple operating systems on one server computer at the same time. That means you can upgrade your hardware but still run applications created for operating systems other than Windows®, so you can smoothly migrate to a more efficient environment. In addition, you can run 64-bit and 32-bit workloads in the same environment.You can also easily create a virtual development environment. Your developers can perform tests in an environment that accurately replicates the operation of physical servers and clients, without exposing your production environment to potential risks.What’s more, virtualization gives you the ability to consolidate server hardware, reducing your infrastructure costs, as well as cutting your carbon emissions and energy costs.You can also recover from disasters or hardware failures much faster when you set up virtual machines for backup and recovery.But perhaps what is even more important is that through Microsoft virtualization technologies like those in Windows Server® 2008 and tools in Microsoft System Center products, you can achieve a more automated, self-managing systems.Finally, with the Microsoft Desktop Optimization Pack for Software Assurance—which I’ll cover in more detail later—you can also achieve application virtualization with the Windows Vista ® operating system on your PCs.
Now, let’s take a look at some of the Microsoft products that can help you achieve a more efficient infrastructure. If your institution does a lot of scientific or engineering research, take a look at Windows® HPC Server 2008.Windows HPC Server 2008 ranks among the most efficient operating systems in the Top500 benchmark to achieve 68.5 teraflops and 77.7 percent efficiency on 9,472 cores, making it one of the most powerful supercomputing systems in the world and the fastest Windows cluster to date.It efficiently scales to thousands of processing cores.It includeshighly efficient and scalable cluster management tools, as well, along with a service-oriented architecture (SOA) job scheduler, enhanced provisioning, and a new management interface.It also supports fast deployment with features like the Server Core installation, which minimizes server overhead, and the WindowsPowerShellcommand-line shell and scripting language, and Windows Deployment Services for remote installations.
Among the Microsoft products that can help HE institutions achieve a more efficient infrastructure is Windows Server® 2008 Enterprise. Not only does it offer advanced security features such as built-in anti-virus tools and firewalls, automated monitoring, and alerts. Windows Server 2008 Enterprise helps you maintain a highly secure IT environment, even as it provides more access to data and applications.It also makes it easy to manage your server infrastructure from one location, and offers failover clustering support, along with simplified deployment. Finally, it offers the virtualization features that I mentioned earlier to help with server consolidation and lower hardware, management, and energy costs.
Microsoft SQL Server® 2008 data management softwarealso offers features that help you streamline your infrastructure and simplify management.For example, you can manage and store data from structured and unstructured files—such as audio files—directly within the database.SQL Server 2008 provides a rich set of integrated services so users can easily query, search, synchronize, report on, and analyze data. With high security, reliability, and scalability, it also helps protect valuable information, supports fast data recovery, and offers the simplified policy-based management of Microsoft server software.
Before we close, I wanted to leave you with some links to resources on microsoft.com, where you can find more information about the topics that I’ve discussed today.You can review the Microsoft site for higher education, learn more about infrastructure optimization with Microsoft, explore the self-assessment tools, and find out all about the Microsoft products that we covered.Also, if you want to learn more about Microsoft’s approach to virtualization, you can check out that site as well.
I thank you so much for having me here today, and now I’d like to open the floor to any questions.