The proposed system is to create an IT enabled learning environment with integrations in to the sales and marketing system for admissions and registration. In addition to that it could benefit from an alumni relation dataset for internships, placements and alumni assisted mentoring. A Financial system for managing the registrations and payments is also part of the company’s IT infrastructure. Loosely coupled virtual labs, video capture, tele-presence and remote video sharing systems are proposed. In essence we are designing an education management system. The system needs to integrate with functionality across multiple business functional areas. The system is visible outside the organization for some of its functionality when interacting with possible students and alumni. The rest of the time the system needs to remain focused on learning by providing a collaborative environment. An effective education management system will not only provide an integrated approach to the people registered for training but also help the institute mange relationship with the trainees before and after their direct association with the institute. This will not only provide a better experience for them but also help attract better candidates to the training center. An effective survey and polling mechanism as part of the offering will help with assessments and evaluations.
1. Topics most important for any company’s IT.
1.1 Policies and Governance
What policies and technologies do educational institutions need to have in place to protect both their infrastructure and users’ privacy in today’s open, collaborative learning environment?
1.2 Business Value of Emerging Technologies
Organizations need to be able to expand globally and literally overnight. The introduction of cloud computing, utility computing, virtualization or distributed computing, and Software as a Service now help to facilitate organizations’ ability to operate anywhere, anytime, and expand technology assets simply and easily.
1.3 Green Computing
Green computing is a phenomenon that needs to be part of every company’s strategy.
1.4 Mobile Communication
Mobile and Cloud computing considerations is going to affect all IT application infrastructures.
1.5 Characterizing Communication and Collaboration Systems
Collaboration and communication along with evaluation and assessment is the backbone any learning environment.
1.6 Immersive Conferencing and Virtual Workspace
Location is not a restriction for any type of interaction. Virtual environments are a necessity of the futuristic design.
Every device and every entity will need to interact with every other entity in the vicinity. For example every car does not have to know how many other cars on the road in a metro area but it need to negotiate with all the other cars in its vicinity.
2. Business Value of Emerging Technologies
2.1 Cloud Computing
2.1.1 Public cloud
Public cloud applications, storage, and other resources are made available to the general public by a service provider. These services are free or offered on a pay-per-use model. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered)
2.1.2 Community cloud
Community shared infrastructure between several organizations from a specific cloud community with common concerns including security, compliance and jurisdiction, etc.
2.1.3 Hybrid cloud
Any combination of private, community or public cloud those remain unique entities but are bound together, offering the benefits of multiple deployment models.
Companies and individuals are able to obtain degrees of fault tolerance combined with locally immediate usability without dependency on Internet connectivity by using both on-premises resources and server-based cloud infrastructure.
Hybrid clouds lack the flexibility, security and certainty of in-house applications. Hybrid cloud provides fault tolerance and scalability of cloud-based services.
2.1.4 Private cloud
Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally. Undertaking a private cloud project requires a significant level and degree of engagement to virtualize the business environment, and it will require the organization to reevaluate decisions about existing resources. When it is done right, it can have a positive impact on a business, but every one of the steps in the project raises security issues that must be addressed in order to avoid serious vulnerabilities.
Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components, applications and application infrastructure communicating with each other over a loose coupling mechanism such as a messaging queue. Elastic provision implies intelligence in the use of tight or loose coupling as applied to mechanisms such as notifications, messages, events, and data retrieval queries.
2.2.1 The Inter-cloud
Inte-cloud is a global “cloud of clouds” and an extension of the Internet “network of networks” on which it is based.
2.2.2 Cloud engineering
Cloud engineering is the application of engineering disciplines to cloud computing. It brings a systematic approach to the high-level concerns of commercialization, standardization, and governance in conceiving, developing, operating and maintaining cloud-computing systems. It is a multidisciplinary method encompassing contributions from diverse areas such as systems, software, web, performance, information, security, platform, risk, and quality engineering.
2.3 Enhancing flexibility and scalability
As-a-service model is available in many flavors.
2.4 World Wide Web
Internet is inherently built into many IT infrastructures. Most services are exposed and consumed through Internet. Any IT infrastructure with out the support of Internet is extremely limited.
3. Green Computing
An article published by New York Times for not being green rattles companies like Google. People are getting more concerned about doing business with green companies.
Hardware virtualization allows for organizations to maximize their resources using minimal sets of hardware and thus it is the key technology behind cloud computing.
Essentially, virtualization provides end-users with multiple computing platforms, abstracting out important considerations such as fault tolerance, load balancing, failover, backup and availability.
Virtualization and cloud computing allow organizations to focus resources on core competencies. Enhance core competencies by sharing resources and optimizing service delivery models to ensure their offerings align to rapidly evolving needs.
4. Mobile Communication
Mobile Communication is a phenomenon that is overtaking desktop computing in many respects. Apples iPad and Android based devices are great communication device in and outside the class. Microsoft’s surface is threatening to match the capabilities of other smart devices. It has a small developer base for mobile devices but a bigger developer base for enterprise developers. Presence in Enterprise market may be key to integrating these great new technologies with existing application infrastructure.
Smart devices can be only device that people need to carry to a classroom. It can also be only device needed outside the class for collaboration, assignments, assessments and evaluations.
5. Characterizing Communication and Collaboration Systems
Discrete media such as blogs vs. continuous media types, individual chat sessions vs. group participation, synchronous vs. asynchronous communication and focus on task are important considerations. Anything under this topic that keeps us focused on learning may be important. There is no measured ROI for any type communication and collaboration system.
5.1.1 User Communication Systems
Composition, format, physicality, sensory and cognitive capabilities have an impact on what is being communicated. A collection of files with related material, videos, PowerPoint presentation may be less effective then say a book written in iBook format where all of the content is presented in a flow with timeline widgets, questions to asses the understanding of the participants and in context presentation of material whether its in the form of movie, graphs or text.
5.1.2 Audio and Video Streaming
Any media in the form of Video capture, live streaming,
6. Immersive Conferencing and Virtual Workspace
Face to face interactions is an absolutely necessary service in a collaborative environment.
Mobile computing is a phenomenon that is overtaking desktop computing in many respects. Learning activity does not need to be tethered—to a device or a classroom. Virtualization and cloud computing enables anytime-anywhere-any-device learning.
Deploying mobile strategies to enable students to learn on the go and when they are able is becoming essential for modern learning environment. This type of dynamic learning environment requires robust support to allow students to be able to access learning apps and data from their mobile devices on-the-go.
8. Less important Topics.
8.1 Network Security
Important consideration from security perspective where the need is to secure the computing environment. The cloud might need to create cloud environment beyond a companies firewall.
8.1.2 Cryptographic Network Security Cryptographic Network Security
While confidentiality, integrity and authentication are important aspects of an information infrastructure authorization is the key for a focus group of people to engage in collaborative leaning experience. Public-private key exchange cryptography is here to stay as long as there is no one to challenge Fermat’s law and people can find big enough mutually exclusive prime numbers.
VPNS, wireless and its security are all important considerations but not the key ingredient for the proposed learning environment.
Connection technology used for near range device interactions. It is not an essential technology for the proposed system.
8.3 Wireless Security Issues
Wireless security still has a few hurdles to resolve but it is much improved from the days of WEP encryption. Wireless security needs to address the issue outside the trusted zones.
8.4 VoIP (Voice Over IP)
VOIP may have been the primary mode of voice and data communication if digital data communication was invented before analog communication used by the traditional telephones. Key technology to create audio and video streaming products and services used for various collaboration tools.
8.5 IM (Instant Messaging)
Instant Messaging (IM) provides synchronous user-user or group-based text communication over the Internet that is being overtaken by similar communication using the mobile devices. The experience of ease of use, instant notification and presence awareness is enhanced when mobile devices are in use. The key advantage of the mobile devices is location
8.6 Information Sharing Systems
No ROI studies conducted on information sharing systems such as Blogs, wikis, Knowledge management systems may be good vehicles for that.
8.7 Social Media Communication
Social media communication may be a phenomenon that will stay with us for a long time. Is it consistent with the idea of creating a focused leaning environment? YouTube today has videos with highly informative content and it has how-to videos on various highly complex topics. Instructional design of today would like to take you to these videos but not get distracted with additional links available as related videos.
Proposed system is a loose coupling of learning and collaborative functional systems that can easily integrate with emerging technologies and legacy system to leverage the existing infrastructure. It is designed to enhance the learning experience by engaging them as prospective candidates and retain their involvement even after they have finished their educational program.