Universities have more in common with modern cities than traditional places of learning. This mini city needs to empower its citizens to thrive and achieve their ambitions. Operationalising data is key to building critical services; from understanding complex IT estates for smarter decision-making to robust security and a more reliable, resilient student experience. Juan will share his experience in building data foundations for a resilient future whilst enabling digital transformation at Imperial College London.
Report
Share
Report
Share
1 of 15
More Related Content
Similar to Data foundations building success, at city scale – Imperial College London
Digital Transformation at the University of EdinburghMark Ritchie
This slide set provides an overview of the Digital Transformation portfolio of projects being led by Information Services at the University of Edinburgh. The slide set provides the current position on 30th April 2017. We'll update the slideset as work progresses.
Digital Transformation is about more than just technology. Our goal is to adopt new "digital first" ways of working which leverage technology, further our mission and provide a world class experience for our students and staff. Digital Transformation is a major, multi-year portfolio of programmes and projects. The current programmes are:
- Enterprise APIs - to develop a flexible and secure API framework to support development and deployment of user focused solutions more quickly and at lower cost
- Enterprise Data Warehouse - to provide a standards based, flexible and integrated platform for business intelligence and management information
- User Experience Services - to improve the digital experience by focusing on user-centred design through consistent standards, user experience services and training
- User Centred Portal and Notifications - to develop a new user-centred interface for the University Enterprise Portal (MyEd)
- Engagement - to drive engagement with Digital Transformation across the University and provide a governance framework for projects that are not part of other programmes
A further tranche of programmes and projects will come on stream later in 2017 with a the portfolio of work to be completed by Summer 2020.
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
Building the modern institution: how Jisc can support your cloud-based digita...Jisc
This document discusses how Jisc can support organizations in their cloud-based digital transformations. It emphasizes that digital transformation is primarily about leadership, culture, and goals rather than technology alone. An effective approach involves understanding an organization's culture, goals, applications, stakeholders, and compelling drivers of change. Jisc offers services to help clients assess their situation, strategize a cloud approach, implement solutions, and manage ongoing operations and security in public clouds like AWS and Azure. The goal is to help organizations improve outcomes like student experience, research efficiency, and cost savings through the flexible working and innovation that digital tools enable.
This document discusses security issues related to moving from single cloud to multi-cloud environments. It first provides background on the increased use of cloud computing and the privacy and security concerns organizations have in using single cloud providers. It then discusses the trend toward multi-cloud/inter-cloud environments to address issues like availability and potential insider threats. The document examines research on security issues in single and multi-cloud environments and outlines the objective to automatically block attackers and securely compute data across clouds.
Westminster education forum isc digital crowd sourcing developing digital oct...InspirEdu
This document discusses developing digital strategies in schools. It introduces Ian Phillips who chairs the Independent Schools Council (ISC) Digital Strategy Group. The document outlines challenges schools face in using EdTech to improve education and attract international students. It discusses developing "digital intelligence" and collaborations on data privacy, analytics, and developing a "Schools' Guide" to digital strategies. The guide aims to help schools inspire innovation, improve teacher workload, encourage collaboration, ensure infrastructure supports learning, and integrate safeguarding. It provides examples of gathering best practices from other schools to share.
This document summarizes Microsoft's investments and initiatives in Hong Kong over the past decade, including providing $9.5 million in cash and software to train 500,000 people through community learning centers. It discusses technology trends like mobile, social, big data and cloud computing that are creating opportunities. Microsoft's vision is outlined for these areas, focusing on enabling activities, natural interaction, social communication, and decision making. The future of Hong Kong is seen as continuously innovating using technology to create opportunities and progress.
Chris Day VP IT Transformation and Office of the CIO at AstraZenecaSteve Ashton
This document summarizes an event for IT executive leaders addressing digital challenges. The agenda introduces AstraZeneca and its focus on discovery, development and commercialization of medicines. It operates globally with $26.1B in annual sales. AstraZeneca IT aims to create a world-class environment through customer focus, operational excellence, technical leadership, simplification and collaboration. The digital transformation presents opportunities for IT leaders to strategically drive innovation and growth. New skills must be developed around data, technology, channels and digital capabilities. Barriers include strategy, skills and budgets. Recommendations include engaging on digital innovation and applying technology choices to business capabilities.
How DeepSphere.AI Transformed Fresh Graduates Into Data Scientists At Databri...HemaMaliniP5
DeepSphere.AI transformed students who could now become Data Scientists (At Databricks).
Click here ➡️ https://lnkd.in/gzfwdMev For extensive details about this benchmark study.
LET'S START WITH A PROVEN AND VERIFIABLE ACCOMPLISHMENT:
BACKGROUND:
To date, we have not seen a benchmark study on the effectiveness of a data science program.
In this article, we provide enough details based on our teaching and some of the large-scale data science industry projects we are working on with Google and the AWS team. Many data science programs are offered in the market, from big brand names to small educational institutions. Still, we are unsure which one to enroll in and which may be the best choice to achieve my goals and objectives.
WHAT DO WE SEE IN THE MARKET:
We have several conceptual data science programs taught by academically well-qualified professionals without industry implementation exposure. We may also see another extreme, a data science program filled with python programs and taught by technical experts.
We need a balanced curriculum where the learner can learn both concepts and technology, which should be guided by someone who has successfully implemented one or two data science projects for real industry clients at a production scale. The modern data science curriculum should teach beyond use case development and Python syntax.
A BENCHMARK STUDY FOR HIGHLY PRODUCTIVE DATA SCIENCE LEARNING:
We conducted this benchmark study with 500+ students studying data science in the bachelor's program and 243+ teachers teaching data science.
500+ DATA SCIENTISTS: Our six semesters bachelor's in data science program is offered at SRM university. The study focused on transforming students into employable data scientists with industry skills. Around 500+ students are studying across all campuses and semesters.
243+ DATA SCIENCE TEACHERS: HODs, professors, assistant professors, research scholars, and management staff from 110 universities and colleges provided feedback both in quantitative and qualitative formats. Approximately 243 teachers participated in this benchmark and shared their views on our data science program advancement. Here is the participant's profile.
PhDs: 63
Professors: 09
Assistant Professors: 55
Associate Professors: 34
Research Scholars: 11
WHAT DO YOU NEED TO LOOK FOR IN AN EFFECTIVE AND PRODUCTIVE DATA SCIENCE LEARNING PROGRAM:
An effective data science program should balance some or all of the following, an Interdisciplinary learning approach, industrial curriculum, data science advancement, and enabling technologies such as Databricks, Google Cloud, AWS, SAP (Business Process), and other relevant technologies.
I am sharing our benchmarked and proven interdisciplinary data science curriculum, which is currently taught to 500+ data scientists and transforms learners into employable resources at the end.
This document discusses the transformation of IT at the American Cancer Society led by Chief Information Officer Jay Ferro. It provides background on Ferro and the Society. It then describes the state of IT in 2011, including outdated and siloed applications, databases, and infrastructure. Ferro implemented seven signature strategies to guide the transformation, including consolidating data centers, implementing new processes, and deploying mobile and analytics capabilities. The transformation has included culture change, quick win projects, improved communication and partnerships to better support the Society's mission.
LHST works with organizations to improve performance through leveraging digital technologies, networks, processes, and people. The document discusses using digital tools to enhance individual and corporate performance. It also mentions LHST's work with major technology companies in Europe, including case studies and conferences. The rest of the document provides details on LHST's consulting services and perspectives on digital transformation.
The document discusses information systems and digital transformation. It covers topics like structured vs unstructured data, how businesses can leverage data and technology, and challenges around measuring success and the impact of digital initiatives. Examples are provided of how technology is changing work and forcing businesses to adapt. The document also outlines potential deliverables for a course, including a curation page, case study, and video presentation.
Enhancing productivity: ICT that supports digital proficiency in the communit...Connecting Up
This document discusses increasing digital proficiency in not-for-profit organizations. It provides a framework to assess an organization's current digital proficiency across governance, technology use, staff skills, and risk management. Moving from basic to transformational proficiency brings benefits like more efficient client services and outcomes. The document also offers 10 easy steps leaders can take to embrace technology, such as establishing an ICT committee, understanding real technology costs, and recognizing that technology problems are often organizational issues. The overall message is that technology is a strategic asset that can improve productivity when aligned with organizational strategy.
This document provides an overview of a company's core values and culture. It outlines seven core values: customer focus, speed, humility, passion, integrity, employee satisfaction, and discipline. It also provides information on the company's history, scale as a global technology services provider, and services overview. The services aim to help customers transform their data center and digital workplace, invest smartly, and drive innovation through reducing complexity and achieving transparency. The document discusses how the company guides customers on their journey from idea to managed solution.
Markus Stückler (Hewlett Packard Enterprise)Praxistage
The document discusses the challenges of digital transformation. It outlines how IT must become value creators and bridge traditional and new systems. This requires transforming to a hybrid infrastructure, enabling workplace productivity, protecting the digital enterprise, and empowering the data-driven organization. It emphasizes that the digital workplace is now everywhere and users expect personal, contextual, and secure experiences anywhere, anytime, and on any device.
Big Data, Analytics and the Future of LearningKim Flintoff
As training, education, teaching and learning are constantly adapting to new technological developments it is not surprising that in the dawning age of data these areas are finding new ways to engage learners, provide teachers and learners with new insights about learning, and to find new ways to recognise and acknowledge learning. In an time when we might be considered as “always-on” and generating data in unprecedented volumes we are possibly more able to engage in more organic learning activities that do not require high-stakes testing regimes for us to evidence our learning. This session will consider the more recent developments in data-informed learning and teaching, learning analytics; and new forms of credentials as they influence our experience of learning across a range of contexts.
Presented at Forward Government Learning Forum 2016 (Canberra for the ARK Group)
and at Digicon 2016 for DLTV (Swinburne, Melbourne).
Similar to Data foundations building success, at city scale – Imperial College London (20)
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
This document discusses standardizing security operations procedures (SOPs) to increase efficiency and automation. It recommends storing SOPs in a code repository for versioning and referencing them in workbooks which are lists of standard tasks to follow for investigations. The goal is to have investigation playbooks in the security orchestration, automation and response (SOAR) tool perform the predefined investigation steps from the workbooks to automate incident response. This helps analysts automate faster without wasting time by having standard, vendor-agnostic procedures.
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
.conf Go 2023 presentation:
"Das passende Rezept für die digitale (Security) Revolution zur Telematik Infrastruktur 2.0 im Gesundheitswesen?"
Speaker: Stefan Stein -
Teamleiter CERT | gematik GmbH M.Eng. IT-Sicherheit & Forensik,
doctorate student at TH Brandenburg & Universität Dresden
El documento describe la transición de Cellnex de un Centro de Operaciones de Seguridad (SOC) a un Equipo de Respuesta a Incidentes de Seguridad (CSIRT). La transición se debió al crecimiento de Cellnex y la necesidad de automatizar procesos y tareas para mejorar la eficiencia. Cellnex implementó Splunk SIEM y SOAR para automatizar la creación, remediación y cierre de incidentes. Esto permitió al personal concentrarse en tareas estratégicas y mejorar KPIs como tiempos de resolución y correos electrónicos anal
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
Este documento resume el recorrido de ABANCA en su camino hacia la ciberseguridad con Splunk, desde la incorporación de perfiles dedicados en 2016 hasta convertirse en un centro de monitorización y respuesta con más de 1TB de ingesta diaria y 350 casos de uso alineados con MITRE ATT&CK. También describe errores cometidos y soluciones implementadas, como la normalización de fuentes y formación de operadores, y los pilares actuales como la automatización, visibilidad y alineación con MITRE ATT&CK. Por último, señala retos
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
BMW is defining the next level of mobility - digital interactions and technology are the backbone to continued success with its customers. Discover how an IT team is tackling the journey of business transformation at scale whilst maintaining (and showing the importance of) business and IT service availability. Learn how BMW introduced frameworks to connect business and IT, using real-time data to mitigate customer impact, as Michael and Mark share their experience in building operations for a resilient future.
The document is a presentation on cyber security trends and Splunk security products from Matthias Maier, Product Marketing Director for Security at Splunk. The presentation covers trends in security operations like the evolution of SOCs, new security roles, and data-centric security approaches. It also provides updates on Splunk's security portfolio including recognition as a leader in SIEM by Gartner and growth in the SIEM market. Maier highlights some breakout sessions from the conference on topics like asset defense, machine learning, and building detections.
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
Learn how Vodafone has provided end-to-end visibility across services by building an Operational Analytics Platform. In this session, you will hear how Stefan and his team manage legacy, on premise, hybrid and public cloud services, and how they are providing a platform for complex triage and debugging to tackle use cases across Vodafone’s extensive ecosystem.
.italo operates an Essential Service by connecting more than 100 million people annually across Italy with its super fast and secure railway. And CISO Enrico Maresca has been on a whirlwind journey of his own.
Formerly a Cyber Security Engineer, Enrico started at .italo as an IT Security Manager. One year later, he was promoted to CISO and tasked with building out – and significantly increasing the maturity level – of the SOC. The result was a huge step forward for .italo.
So how did he successfully achieve this ambitious ask? Join Enrico as he reveals the key insights and lessons learned in his SOC journey, including:
Top challenges faced in improving security posture
Key KPIs implemented in order to measure success
Strategies and approaches applied in the SOC
How MITRE ATT&CK and Splunk Enterprise Security were utilised
Next steps in their maturity journey ahead
This document summarizes a presentation about observability using Splunk. It includes an agenda introducing observability and why Splunk for observability. It discusses the need for modernization initiatives in companies and the thousands of changes required. It presents that Splunk provides end-to-end visibility across metrics, traces and logs to detect, troubleshoot and optimize systems. It shares a customer case study of Accenture using Splunk observability in their hybrid cloud environment. Finally, it concludes that observability with Splunk can drive results like reduced downtime and faster innovation.
This document contains slides from a Splunk presentation covering the following topics:
- Updated Splunk logo and information about meetings in Zurich and sales engineering leads
- Ideas for confused or concerned human figures in design concepts
- Three buckets of challenges around websites slowing, apps being down, and supply chain issues
- Accelerating mean time to detect, identify, respond and resolve through cyber resilience with Splunk
- Unifying security, IT and DevOps teams
- Splunk's technology vision focusing on customer experience, hybrid/edge, unleashing data lakes, and ubiquitous machine learning
- Gaining operational resilience through correlating infrastructure, security, application and user data with business outcomes
This document summarizes a presentation about Splunk's platform. It discusses Splunk's mission of helping customers create value faster with insights from their data. It provides statistics on Splunk's daily ingest and users. It highlights examples of how Splunk has helped customers in areas like internet messaging and convergent services. It also discusses upcoming challenges and new capabilities in Splunk like federated search, flexible indexing, ingest actions, improved data onboarding and management, and increased platform resilience and security.
The document appears to be a presentation from Splunk on security topics. It includes sections on cyber security resilience, the data-centric modern SOC, application monitoring at scale, threat modeling, security monitoring journeys, self-service Splunk infrastructure, the top 3 CISO priorities of risk based alerting, use case development, a security content repository, security PVP (posture, vision, and planning) and maturity assessment, and concludes with an overview of how Splunk can provide end-to-end visibility across an organization.
John Eccleshare, Head of Compliance and Information Security at bet365, discusses bet365's migration of their Splunk deployment to Splunk Cloud. Some key points:
- bet365 processed 3 TB of data per day in their on-prem Splunk deployment but scaling it for new use cases was challenging.
- Migrating to Splunk Cloud improved performance, enhanced security capabilities, and freed up 4 FTEs by reducing maintenance and upgrade work.
- Lessons learned included needing more business input on requirements and migrating sooner for increased agility. Recommendations included running parallel deployments during migration and using professional services.
Data Protection in a Connected World: Sovereignty and Cyber Securityanupriti
Delve into the critical intersection of data sovereignty and cyber security in this presentation. Explore unconventional cyber threat vectors and strategies to safeguard data integrity and sovereignty in an increasingly interconnected world. Gain insights into emerging threats and proactive defense measures essential for modern digital ecosystems.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Video traffic on the Internet is constantly growing; networked multimedia applications consume a predominant share of the available Internet bandwidth. A major technical breakthrough and enabler in multimedia systems research and of industrial networked multimedia services certainly was the HTTP Adaptive Streaming (HAS) technique. This resulted in the standardization of MPEG Dynamic Adaptive Streaming over HTTP (MPEG-DASH) which, together with HTTP Live Streaming (HLS), is widely used for multimedia delivery in today’s networks. Existing challenges in multimedia systems research deal with the trade-off between (i) the ever-increasing content complexity, (ii) various requirements with respect to time (most importantly, latency), and (iii) quality of experience (QoE). Optimizing towards one aspect usually negatively impacts at least one of the other two aspects if not both. This situation sets the stage for our research work in the ATHENA Christian Doppler (CD) Laboratory (Adaptive Streaming over HTTP and Emerging Networked Multimedia Services; https://athena.itec.aau.at/), jointly funded by public sources and industry. In this talk, we will present selected novel approaches and research results of the first year of the ATHENA CD Lab’s operation. We will highlight HAS-related research on (i) multimedia content provisioning (machine learning for video encoding); (ii) multimedia content delivery (support of edge processing and virtualized network functions for video networking); (iii) multimedia content consumption and end-to-end aspects (player-triggered segment retransmissions to improve video playout quality); and (iv) novel QoE investigations (adaptive point cloud streaming). We will also put the work into the context of international multimedia systems research.
MYIR Product Brochure - A Global Provider of Embedded SOMs & SolutionsLinda Zhang
This brochure gives introduction of MYIR Electronics company and MYIR's products and services.
MYIR Electronics Limited (MYIR for short), established in 2011, is a global provider of embedded System-On-Modules (SOMs) and
comprehensive solutions based on various architectures such as ARM, FPGA, RISC-V, and AI. We cater to customers' needs for large-scale production, offering customized design, industry-specific application solutions, and one-stop OEM services.
MYIR, recognized as a national high-tech enterprise, is also listed among the "Specialized
and Special new" Enterprises in Shenzhen, China. Our core belief is that "Our success stems from our customers' success" and embraces the philosophy
of "Make Your Idea Real, then My Idea Realizing!"
Performance Budgets for the Real World by Tammy EvertsScyllaDB
Performance budgets have been around for more than ten years. Over those years, we’ve learned a lot about what works, what doesn’t, and what we need to improve. In this session, Tammy revisits old assumptions about performance budgets and offers some new best practices. Topics include:
• Understanding performance budgets vs. performance goals
• Aligning budgets with user experience
• Pros and cons of Core Web Vitals
• How to stay on top of your budgets to fight regressions
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
What's Next Web Development Trends to Watch.pdfSeasiaInfotech2
Explore the latest advancements and upcoming innovations in web development with our guide to the trends shaping the future of digital experiences. Read our article today for more information.
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threatsanupriti
In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.
This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries.
Key topics covered include:
An overview of quantum computing and its implications for blockchain security.
Current cryptographic standards and their vulnerabilities in the face of quantum threats.
Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems.
Case studies and real-world implications of quantum-resistant blockchain implementations.
Strategies for integrating post-quantum cryptography into existing blockchain frameworks.
Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.
AC Atlassian Coimbatore Session Slides( 22/06/2024)apoorva2579
This is the combined Sessions of ACE Atlassian Coimbatore event happened on 22nd June 2024
The session order is as follows:
1.AI and future of help desk by Rajesh Shanmugam
2. Harnessing the power of GenAI for your business by Siddharth
3. Fallacies of GenAI by Raju Kandaswamy
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/07/intels-approach-to-operationalizing-ai-in-the-manufacturing-sector-a-presentation-from-intel/
Tara Thimmanaik, AI Systems and Solutions Architect at Intel, presents the “Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” tutorial at the May 2024 Embedded Vision Summit.
AI at the edge is powering a revolution in industrial IoT, from real-time processing and analytics that drive greater efficiency and learning to predictive maintenance. Intel is focused on developing tools and assets to help domain experts operationalize AI-based solutions in their fields of expertise.
In this talk, Thimmanaik explains how Intel’s software platforms simplify labor-intensive data upload, labeling, training, model optimization and retraining tasks. She shows how domain experts can quickly build vision models for a wide range of processes—detecting defective parts on a production line, reducing downtime on the factory floor, automating inventory management and other digitization and automation projects. And she introduces Intel-provided edge computing assets that empower faster localized insights and decisions, improving labor productivity through easy-to-use AI tools that democratize AI.
How to Avoid Learning the Linux-Kernel Memory ModelScyllaDB
The Linux-kernel memory model (LKMM) is a powerful tool for developing highly concurrent Linux-kernel code, but it also has a steep learning curve. Wouldn't it be great to get most of LKMM's benefits without the learning curve?
This talk will describe how to do exactly that by using the standard Linux-kernel APIs (locking, reference counting, RCU) along with a simple rules of thumb, thus gaining most of LKMM's power with less learning. And the full LKMM is always there when you need it!
What Not to Document and Why_ (North Bay Python 2024)Margaret Fero
We’re hopefully all on board with writing documentation for our projects. However, especially with the rise of supply-chain attacks, there are some aspects of our projects that we really shouldn’t document, and should instead remediate as vulnerabilities. If we do document these aspects of a project, it may help someone compromise the project itself or our users. In this talk, you will learn why some aspects of documentation may help attackers more than users, how to recognize those aspects in your own projects, and what to do when you encounter such an issue.
These are slides as presented at North Bay Python 2024, with one minor modification to add the URL of a tweet screenshotted in the presentation.
What Not to Document and Why_ (North Bay Python 2024)
Data foundations building success, at city scale – Imperial College London
1. Gartner Symposium
7 November 2022
Building for a resilient future whilst enabling digital
transformation
Data foundations building
success, at city scale
Juan Villamil, CIO, Imperial College London
2. • A community of problem-solvers dedicated
to finding innovative solutions to the world's
biggest challenges
• A world top ten university with an
international reputation for excellence in
teaching and research
• A multidisciplinary space for education,
research, translation and commercialisation,
harnessing science and innovation
Mission Statement: to achieve
enduring excellence in research and
education in science, engineering,
medicine and business for the
benefit of society.
3. 17,000 students
& 8,000 staff
9 campuses
• accommodation
• offices
• facilities
• connectivity
• and so much more
Education
Research Innovation
Flexible ICT needed to support cutting edge
problem solvers, constantly changing and evolving
4. Our vision for a world class ICT function is to
provide enhanced and consistent experience that
supports the College’s digital goals:
• Interactive teaching techniques
• Cutting-edge online and digital technology
• Research to embrace the possibilities of data
5. These ambitions lean on us as ICT enablers
to provide:
• a seamless, digital student journey
• the best tools and systems
• robust and reliable technology & infrastructure
• delighted customers
• confidence in cyber security
• the best technology talent
6. Transformation journey
Current State
Preparation for digital journey:
creating a shared understanding
of requirements, priorities &
dependencies of stakeholders.
Interim State
Transition & tech debt focus:
preparing the infrastructure to
enable the ‘new world’; updating
and modernising the estate.
Target State
Transformation:
focus is on the future of
transforming the student and
staff experience to realise the
College’s ambitions.
• maintain competitiveness
• minimise & mitigate technology risks
• maximise cost effectiveness
• improve agility and pace of delivery cycles
9. started small…
utilising whilst
building on
security
expertise
& tools
kept asking…
“what more can
we do with our
data to add
more value,
stretch
capabilities”
enabled growth:
moved to
flexible model
whilst
leveraging extra
potential in the
cloud
2020 2022
Growing to address challenges
11. Improved security - Imperial gained visibility into hundreds of services, shortened response
times to security incidents and supported data-based decision-making
Data is easily accessible to teams across the organization,
from developers and product managers to the CIO and CTO.
Informed decision making - real-time data allows us to
quickly remedy any incidents and share insights across the
organization for smarter decision-making, uncompromised
security and a more reliable, resilient student experience.
Business impact
“Using Splunk
Synthetics we simulate
users accessing over
150 services,
data from these
2 million checks a month
alert us to availability
and performance issues"
12. mini-city
Education
Research Innovation
• Data as a foundation for
the ‘mini-city’
• Delivering our strategy
through technology that
enables expert citizens
• Supporting wide-spread
growth focused on
impact & business value
Engagement growth & business value
13. • Increase risk-based reporting
• Expand use for financial planning
• Add Dev Ops pipeline support
• Enabling further engagement with the business
• Offering this operational analytics services to
research groups and broader departments
The future landscape
14. Thank you
If you’d like to know more or just have a chat please
come and visit us at the Splunk Booth: 511
15. Information Communication Technologies (ICT)
Imperial College London
Level 4 Sherfield Building
South Kensington Campus
London, SW7 2AZ
www.imperial.ac.uk/ict
@TheServiceDesk
Data foundations building success, at city scale
Gartner Symposium – 7 November 2022
Juan Villamil, CIO Mark Woods, Chief Technical Advisor
Splunk
EMEA
www.splunk.com
Editor's Notes
Universities have more in common with modern cities than traditional places of learning. This mini city needs to empower its citizens to thrive and achieve their ambitions.
Operationalising data is key to building critical services; from understanding complex IT estates for smarter decision-making to robust security and a more reliable, resilient student experience.
Global Uni - We are amongst the top ranked universities with an international community, attracting undergraduates from around 132 countries.
University of the year – The Times 2022 and The Guardian 2023
Our sprawling campus consists of accommodations, a sports centre libraries, a conference centre, research facilities and eating establishments — not to mention lecture halls and classrooms.
So with all the people, campuses, infrastructure, and innovation – how do we in the IT team enable and empower our citizens to achieve their ambitions and ensure a safe, resilient student experience?
New White City Campus - A new co-located collaborative environment for research, education, and entrepreneurship focused on artificial intelligence, data science and digital technologies
The College has amazing ambitions, with many of Imperial’s strategies extensively referring to digital goals.
As well as delivering activities and initiatives that enable College to achieve its strategic goals - we constantly monitor and maintain the complex network of systems and services that keep it up and running.
Maintain competitiveness through embedding cutting-edge, emerging technology for great customer-experience, whilst generating new revenue opportunities
Minimise & mitigate Imperial Colleges’ technology risks and operational challenges through modernisation
Maximise cost effectiveness and reduce cost sprawl and total cost of ownership for solutions across Imperial College
Improve agility and pace of delivery cycles of ICT products and services
The ability to organise
As the mini city grows and develops – silos emerge, and it is hard to keep accurate, secure and unified data. So we are building a Unified Data Platform for the Business to manage their data.
We are using Splunk to manage services around; monitoring, security, usability via user analytics,
Looking to create the unified data platform. Core services and build.
Point 3 – EXAMPLE - the Dark Web issue where accounts were found on dark web and we used live data to identify accounts very swiftly.
Growing our capabilities - Splunk has grown from a very small security install of one licence, to compute model (400GB daily) in the Cloud in 2 years, because we recognise that we can achieve more with monitoring and other analytics services.
Grow capabilities to address them
Started small, utlizing what we already had in security – kept asking "what more can we do" - moving to a flexible model leveraging things we can do extra in the cloud
Dashboards supporting migrations - showing which services run on Windows 2012 or have databases on a Windows 2012 SQL Instance, support products owners so they know which services need migrating and potentially how much work is involved.
Digital accessibility support using Google Lighthouse to test our web pages, the Digital Accessibility scores are analysed and presented in Splunk for the Digital Accessibility Office to identify pages where we may fail our regulatory responsibilities.
Insights and usage tracking - During COVID we used the data to support the College through usage data from our students across the globe – even as far as Mongolia! Tracking usage of our remote access services to support managing capacity
Risks - Splunk and ES support the security team and their work to discovery and analysis security risks. Service Risk View - bringing together different security aspects to give us a risk score for each of the services we run, this can then be used by Product Owners to prioritise work
University teams are now able to quickly remedy any incidents and share insights across the organization for smarter decision-making, uncompromised security and a more reliable, resilient student experience.
Bring back to mini city – top level and what the strategy talk about data as a foundation / data as a city people, process and technology
Engagement for growth but always on business value which leads to future landscaping