Office of Learning and Information Technology

UWS CIO Council Meeting

September 14, 2004

Green Lake, WI

Attendance
BadgerNet Procurement
Telecom Issues
Passwords and Security

Attendance

CIOs and their Representatives Guests

Mark Anderson
Joe Brown
Dick Cleek
Nancy Crabb
David Dumke
Jack Duwe
Ron Kraemer
John Krogman
Jim Lowe
Bruce Maas
Kathy Pletcher
John McCarragher
Ed Meachen
John Nierengarten
Elena Pokot
Ken Splittgerber
David Stack
John Tillman

Perry Brunelli
Dana Bunner
Judy Caruso
David Crass
Lorie Docken
David Hart
David Lois
Brian Remer
Bill Scheuerell
Michael Schlicht
Felix Unaeze

BadgerNet Procurement

The mechanisms for working with the successful vendor chosen for the new BadgerNet network need to be established. These will depend largely upon the network's governance structure. The signs are that the Technology Leadership Council model will be used, rather than the WCNI representative model. Until the decision is final, the UWS will promote using the WCNI model.

Bill Scheuerell of UW-Madison used to have regular meetings with DOA regarding vendor issues associated with the Centrex contract. Doing this again with the new BadgerNet network would require dedicating an individual to the effort. The existing BadgerNet contracts will need to be extended in February 2005, which allows for the beginning of an engagement.

Ron Kraemer proposes that an SLA or other document be drafted with DOA to establish baseline expectations and commitments of what the network will do for the UWS. The five points previously suggested by Ron Kraemer could form the basis, along with a commitment to let the UWS engineers monitor the performance of the network.

In addition to the dark fiber circuits, there are perhaps a half a dozen circuits that are outside the purview of this procurement.

Telecom Issues

DOA has indicated that the UWS has never "come to the table" to discuss its concerns with Centrex. For now, the UWS is not pushing Centrex issues.

Cingular has a Blackberry contract with attractive pricing and economical connectivity that prolongs the battery life. The vendor representative is David Garcia who works out of Milwaukee. Email can either be routed through a server operated by the manufacturer Research in Motion (RIM), or through a server at a campus. The latter option allows for more control and calendar integration. DOA is not interested in running a Blackberry server for the UWS. Blackberrys tend to default to POP and extra effort is needed to make them work with encrypted, IMAP service. In essence, when configuring the device you need to put in the wrong password the first time to force the device into the advanced setup mode.

UW-Stevens Point is contracting for state, regional and national cellular plans that it will offer to students, faculty and staff at a 20% discount from ALLTel. Students will be billed back at a rate of about $28 for a 300 minute regional plan or $36 for a 700 minute regional plan, including free calling between students. Revenue to the campus will likely be $100/phone/year. A cell tower will be installed on campus. UW-Superior is also talking to Cellular One about remarketing cellular services to students. No Centrex lines will be dropped at either institution as a result of these contracts because neither are on Centrex.

SBC is contacting chancellors about putting up wireless access points on campuses and sharing in the chargeback revenue, similar to shopping malls and stadiums.

Passwords and Security

Lorie Docken will ask Paul Rediske to share a copy of the APBS auditors' report before the next CIO Council meeting. Bill Scheuerell suggested that Paul enlist the CIOs in helping to explain the issues to the CBOs. There are many sets of best practices surrounding password issues and there are other ways of doing the same things. Negative impacts on teaching as a result of unattended consequences of technical decisions need to be avoided. Each CIO should develop their own set of best practices in concert with their CBO. The CIO Council would prefer to focus on restrictions targeted at the superusers who have access to changing data at other campuses, even if it is just ordering those individuals to change their passwords on a frequent basis. If they are trusted with superuser access, they should be trusted to change their passwords as instructed.