Wireless networking has become the primary method for connecting to networks whether it be at home, work, or the coffe shop down the street. But how do you know if you can trust the network you are connecting to? Come hear about different methods of how wireless networks are protected, different attack methods, and ways to help better protect yourself.
Kathryn Matuch, Associate Vice President at Drexel University, will lead a discussion about reframing IT's relationship with the University to that of a Strategic Partner. Too often technology is relegated to the status of a utility - though 'keeping the lights on' is a very big part of what we do, to stay relevant and more importantly to grow and innovate, IT has to actively engage throughout the University to demonstrate that the skills and perspectives we have will improve business processes and strategies. We will discuss how this cultural shift is progressing at Drexel and what challenges and opportunities it introduces.
Understanding your network or service is essential to provide a solid user experience. Having the tools to prove your story or case through a variety of techniques can help with resources and planning. In this session, we will be identifying techniques to order and organize raw data into useful information. We will discuss measurements, determining key performance indicators, organization, and segregation of data as well as best practices with data analysis.
In the technology industry, we are regularly faced with understanding complex systems -- which can only be understood holistically, and not as the sum of their parts -- with the limited capacity of our human brains. Moreover, our complex systems are developed and operated by people, which makes our overall sociotechnical systems complex adaptive systems with emergent behavior that wasn't contemplated when the system was first designed.
In this talk, we'll describe the nature of this problem and cover coping strategies drawn from control theory and other non-software contexts. We'll use this point of view to describe why Agile software development, DevOps, and microservices are business imperatives for avoiding falling over the "Edge of Chaos".
Between 2013 and 2015, the University of Pennsylvania implemented a significant update to the architecture of it's DNS service suite, built out a new DNS firewall service offering, and completed a major migration of campus clients. This discussion will cover significant technical accomplishements, including the deployment of anycast routing at the resolver tier, and reflections on the challenges and opportunities of operating DNS at institutional scale.
Penn's DNS infrastructure is absed on the BIND server, and is authoritative for about 1.1M resource records. The flagship zone, upenn.edu, has been DNSSEC signed since 2009. Query loads for the authoritative and recursive services peak at approximately 1.3kq/s and 6.9kq/s respectively.
Why does it seem that good design principles often fall by the wayside? How do we identify and enact short-term solutions that help avoid long-term difficulties? Is this even possible? Have we done it before?
For many years Identity Management has been at the fore of Higher Education issues. What's been happening? Where's it all going? And why do we care? Background, provocative thoughts, and discussion. Bring your own thoughts and voice.