Technology spending survey 2007: institutions are putting their money where their network is.
While students may have a near cyborg relation with technology, and faculty and staff might just want it to make their lives easier, it falls to the IT department to make it all happen. In an effort to understand what is happening in higher ed technology, University Business recently conducted its second annual survey of chief information officers and IT directors from colleges and universities nationwide.
At first glance, perhaps the most startling trend the survey uncovered was that not much has changed since last year, despite recent advancements in consumer products. But Nicole Engelbert, senior analyst with Datamonitor, an online data and analytic service, says this is a good thing. "In the past [the IT budget] was considered an easy place to cut new spending," she points out.
Tim Farnham, chief information officer at Berry College (Ga.), says his recent budget increase was to make up for previous years of underfunding and increased maintenance needs. He is in the process of replacing the campus's entire wireless network. By changing to a Hewlett Packard system with Thin Client, campus access points will triple, making all academic buildings, the student union, and the library 100 percent wireless. Farnham says it was relatively inexpensive to do the project at this time, and he thinks he has about two years before Voice over Internet Protocol (VoIP) cell phones arrive and make it necessary.
Farnham keeps an eye on trends by attending conferences and reading plenty of magazines and books. He expressed concern that at "traditional classroom schools" there is a discrepancy between student expectations and what the administration thinks is important.
Carol Kondrach, associate vice president for information technologies at Rider University (N.J.), stays informed by talking to students and other young people about technology, and to other people in higher ed. "Keen observation is the most important thing." She is rolling out her campus's wireless based on user demand. Her current project is unifying the communications infrastructure (e-mail and voice mail) to "enable users to spend less time on it and more time on other things that matter to them," she says. She's keeping an eye on VoIP cell phones by watching developments at neighboring Montclair State University, which is using cell phones to communicate with and educate students in a number of ways.
Out in Indiana, Manchester College's Information Technology Services Director Michael Case has similar concerns. He wants to upgrade the 16-year-old phone system to VoIP, which means upgrading the entire network at the same time, so he might as well roll wireless into the plan. They considered pulling phone service from the dorms because of the "incredibly low usage rate," but an unofficial survey showed students feel it's a free service they are entitled to and they don't want it removed.
Datamonitor's Engelbert says the effectiveness of wireless depends on how innovative the IT department is and how student-centric the institution is. The group in the middle still isn't sure the investment is worthwhile, as they have visions of students surfing the web, rather than paying attention to lectures.
Although the largest part of his budget was software licensing, Farnham has also spent a lot of money on security and redundancy so the network will function 24/7. He has put in place Virtual Machine Software (VMware) to distribute the server load, so if one crashes the others will take up the slack until repairs can be made. He is waiting for approval of a new "mobile computing devices" policy he wrote, which makes the individual user responsible for the security of the unit in their possession.
Kondrach says security is also very high on her priority list. "One breach and your institution's reputation changes." Of course, the difficulty is in finding the balance between security and access. She says one benefit from all the recent breaches is that end users know security is an issue, which is making them more supportive of her efforts. Although security is on her mind, she isn't pushing to have all hours, all function redundancy like Farnham is. Rather, she is going for enterprise critical applications. Looking to the example of Hurricane Katrina, she is working to keep the school's "business" running, such as course information so students can continue studying in the event of an emergency.
"Technology is very fragile," Kondrach cautions. She keeps a functioning fax machine available and still maintains pay phones on campus as protection against emergencies that might take out VoIP or cell phone access.
For network security, Case has Cisco Clean Access in place, to ensure that equipment connected to the network has met certain requirements so threats are as minimal as possible. He also uses Cisco ASA devices for intrusion prevention and a MARS device to track activity.
On security, Engelbert says that although the IT department is often acutely aware of the danger and knows that it is easier to put protections in place than to clean up after a breach, it is often hard to get decision-makers to understand, unless they've lived through it. "It's almost in the same bucket as disaster recovery or business continuity--until your back is up against the wall," she notes.
Another hurdle for institutions of higher education is equipment replacement cycles, Engelbert says. Many don't adhere to the 18 months suggested by the industry, but she is seeing more willingness to consider hosted solutions, which are more cost effective for small- and medium-sized schools.
Case addresses the problem--and a reduced budget--by looking into leasing equipment this year for payment next year. "We're in a constant struggle to provide funds for purchases," he explains. By leasing, the line item is moved from a capital to an operating expense. "We still have some seven-year-old computers on campus," Case says, "I hope to commit the college to a more prudent obsolescence scheme." His PC inventory doubled in five years, so he is looking for ways to reduce it. Software licenses are another closely watched line item, as purchasing and maintaining them make up 45 percent of his budget.
Berry College is currently on a five-year replacement cycle for both administrative and academic computing, and Farnham is working to reduce it to four years, as well as ensuring that all servers on campus are always under warranty.
Insufficient staff was a common woe. Farnham uses students to take up the slack. They get training and he gets good workers. Case also uses students when funding isn't available for additional staff. But sometimes funding isn't enough; Kondrach has the budget but is having difficulty filling jobs.
As technology advances, along with student expectations, demands on the IT department will only continue to grow. Good planning should keep IHEs from falling behind.
As Kondrach says, the bottom line is the IT department has to deliver results like any other business unit. "What's important to higher ed? Learning, collaboration, and nurturing students to be successful. Everything we do focuses on these concepts. It's not just about the technology anymore."
The complete 2007 IT Spending Survey results are available online at www.universitybusiness.com.
HAVE YOUR TOTAL IT DOLLARS INCREASED OR DECREASED IN THE PAST YEAR? INCREASED 52% DECREASED 19% STAYED THE SAME 30% Note: Table made from bar graph. HAS YOUR INSTITUTION STANDARDIZED ITS TECHNOLOGY PURCHASES? YES 93% NO 7% OF THOSE INSTITUTIONS THAT HAVE STANDARDIZED TECHNOLOGY PURCHASES, WHICH VENDORS ARE WORKED WITH MOST? APPLE 24% DELL 35% GATEWAY 6% HP 15% IBM 12% OTHERS * 8% * Respondents defined "other" as: Sun, builds own, Generic, White Box, Local Vendor-DCS, Equus, Oracle, Microsoft Note: Table made from bar graph. DO YOU OUTSOURCE ANY IT FUNCTIONS? YES 44% NO 56% OF THE INSTITUTIONS THAT OUTSOURCE IT, WHICH ASPECTS OF IT ARE OUTSOURCED? OTHER * 39% IT SUPPORT 20% TRAINING 18% HELP DESK 15% SECURITY 8% * Respondents defined "other" as: cable installation, cable tv, credit card processing, cabling, AV support and installation, human resources, various details, ERP Support, Banner administration system, database, network maintenance and monitoring, printer support, dial-up access, e-mail, firewall, telephone, ERP hosting services Note: Table made from bar graph. WHAT AREA OF IT SPENDING MADE UP YOUR LARGEST BUDGET EXPENDITURE THIS YEAR? Administrative Computing 31% Academic Computing 15% Networking 18% Outside Services * 2% Servers/Storage 5% Software Licensing 3% Technology Support & Maintenance 11% Wireless 2% Other ** 4% * Outside Services: (hardware, installations, warranties, service contracts, etc. ** Respondents defined "other" as: staffing, salaries, all of the above Note: Table note from pie graph. COMPARED WITH LAST YEAR, HAVE DO YOU ANTICIPATE SPENDING YOU SPENT MORE, LESS OR THE SAME DIFFERENTLY ON THESE AMOUNT OF MONEY THIS YEAR ON: AREAS NEXT YEAR? ADMINISTRATIVE COMPUTING MORE 55% MORE 45% SAME 36% SAME 41% LESS 8% LESS 13% ACADEMIC COMPUTING MORE 51% MORE 51% SAME 40% SAME 44% LESS 9% LESS 5% CLASSROOM TECHNOLOGY MORE 50% MORE 65% SAME 36% SAME 30% LESS 14% LESS 5% NOTE: TABLE MADE FROM BAR GRAPH. IS YOUR INSTITUTION MORE LIKELY TO BUY THE LATEST TECHNOLOGY IMMEDIATELY, OR WAIT UNTIL THE PRICE POINT ON THAT PRODUCT GOES DOWN? BUY NOW 12% WAIT 88%
|Printer friendly Cite/link Email Feedback|
|Date:||Dec 1, 2006|
|Previous Article:||Educause 2006 highlights: this year's conference focused on the theme "spurring innovation and marshalling resources.".|
|Next Article:||101 smart revenue generators (and money-saving ideas).|