Browse all the sessions Merit Member Conference has planned for you this year!
“1, 2, 3, GO – Rolling out Campuswide WiFi Upgrades at the University of Michigan”
ABSTRACT: Join us to learn how U-M was able to prepare for and get up and running on a three year campuswide WiFi upgrade project. Learn the power of students in making such an endeavor a priority, along with the roles IT and campus governance play in getting such a large scale project off the ground. Included in planning for the success of this project were collaboration efforts across units, building solid teams from cross-functional groups, and communicate, communicate, communicate. Everyone will find a take away from this presentation to help them get up and go on their own IT projects whether they work in a centralized or de-centralized IT environment.
Presented By:
Leslie WilliamsonSenior ITS Project Manager; Daniel EklundU-M Network Planning Manager
Leslie Williamson is a senior ITS Project Manager at the University of Michigan (U-M), Ann Arbor. She earned her Project Management Professional (PMP) certification in 2013. She currently co-manages the campuswide WiFi Upgrade Project to upgrade wireless in every building on U-M’s Ann Arbor campus over three years. Prior to working in U-M ITS, she was at Merit Network where she lead the efforts to expand the services portfolio by developing product lifecycles and roadmaps for existing and potential services. In each of these roles she has successfully managed extensive cross-functional teams across each organization and has engaged stakeholders throughout the campus and member organizations. Leslie has a Master’s Degree in Information Systems from Eastern Michigan University’s (EMU) College of Technology. She also received her Bachelors of Business Administration degree from EMU.
Thursday, May 12, 2016
12:15 p.m. – 1:00 p.m.
Presentation Category
Infrastructure
“4G LTE Broadband for the Last Mile: Spectrum Availability, Performance, Partnering vs.Building Your Own Network”
ABSTRACT: Many education institutions and non-profit groups are working to bridge the digital divide by getting affordable broadband to the communities around them where there is none. Wireless broadband is often the answer. The Federal Communications Commission is making more spectrum available and the cost of 4G LTE equipment is coming down. What emerging opportunities might exist for your institution? This session will cover spectrum that is becoming available and its usefulness. We’ll also cover what spectrum is sitting fallow in much of the rural communities (Educational Broadband Service EBS), efforts to make it available, and what you might do to get licenses. If you have spectrum, should you build your own or partner with a major wireless carrier or with a wireless internet service provider (WISP)? What about unlicensed spectrum and TV whitespace? What are the costs? What other factors should go into your decision?
Presented By:
Patrick GossmanDeputy CIO, Research and Community, Wayne State University
Patrick J. Gossman has worked in information technology for over 40 years. He served as the Interim Associate VP and CIO at Wayne State University in 2007 and currently serves as the Deputy CIO for Research. Dr. Gossman also serves as Executive Director of the Community Telecommunications Network, a position he has held since 1993. In that role he manages the Educational Broadband Service (EBS) licenses of WSU, Detroit Public Schools, Detroit Public Television and the intermediate school districts of Wayne, Oakland and Macomb counties. As chair of what is now the National EBS Association (NEBSA) from 1999 to 2007, he played a key leadership role in preserving EBS spectrum for educators and migrating its usage from instructional video to cellular wireless broadband services. That spectrum now supports high capacity 4G LTE networks today. He continues to serve on the NEBSA board as Secretary and on NEBSA's regulatory committee.
Wednesday, May 11, 2016
10:10 a.m. – 10:55 a.m.
Presentation Category
Infrastructure
“Accessing Control Panels & Electronic Locks” – Feature Presentation
ABSTRACT:  
Presented By:
Babak Javadi – President of the Open Organization Of Lockpickers
Babak is a noted member of the physical security community, well-recognized among both professional circles (due to the work The CORE Group) as well as in the hacker world (as the President of TOOOL, The Open Organisation Of Lockpickers.) His first foray into the world of physical security was in the third grade, where he was sent to detention for showing another student how to disassemble the doorknob on the classroom supply closet. Babak is an integral part of the numerous lockpicking workshops, training sessions, and games that are seen at annual events like DEFCON, ShmooCon, DeepSec, NotACon, QuahogCon, HOPE, and Maker Faires across the country.
“Achieving a Well-Managed and Centralized Desktop Computing Environment”
ABSTRACT: At Merit Member Conference 2012, DeskTech presented our strategy for centralizing desktop computing for ~2500 customers across 65 administrative departments at Wayne State University. Four years later, we’re approaching the end of the first full refresh cycle and are here to share our success story and the technologies we utilize to provide Wayne State University with a well-managed desktop computing environment. We’ll discuss how we achieve an accurate and reliable inventory, role-based access control, operating system deployment, application delivery and the home-grown tools that tie them all together. Furthermore, we’ll cover the methods we utilize to secure our environment and the efficiencies we gained in time, resources and money. Join us as we walk you through our well-managed and centralized desktop computing environment.
Presented By:
Curtis Kratt, Maikel Kachouh – Director, Desktop Support, Wayne State University; Joseph Vartanian – Lead Systems Software Engineer, Wayne State University; David Smith – Lead Systems Software Engineer, Wayne State University
Curtis Kratt, Director of Desktop Engineering with Computing & Information Technology at Wayne State University. I have 10+ years of experience in managing desktop environments and the infrastructure behind them. Together, we are Desktop Technology Services (DeskTech) a team formed to right the decentralization of desktop computing across the administrative units of Wayne State University. The DeskTech Engineers are the heart of the operation, a group of three individuals with a combined 50 years of experience in the field.
Wednesday, May 11, 2016
2:30 p.m. – 3:20 p.m.
Presentation Category
Infrastructure
“Achieving Sub-Millisecond Disk I/O Performance for VMs Without Breaking the Bank”
ABSTRACT: There are several approaches currently available to reduce disk I/O performance; however, many require significant hardware investment. WSU recently completed a Proof of Concept engagement using the PernixData software products which led to our acquisition of the products for our VMware environment. Use of this product has been a very cost-effective method for enhancing the performance of our Virtual hosting environment where we were able to achieve sub-millisecond performance. During this presentation, WSU will describe the objectives of the PoC, present the results, and compare the offering to the mainstream alternatives.
Presented By:
Bob HogleDirector, Enterprise Computing & Operations; Jeff PutnamLead Systems Software Engineer, Wayne State University
Bob has been directing the Enterprise Computing & Operations team at Wayne State for the past 4 years. He has over 30 years of IT management experience, primarily focused in infrastructure and operations, across Financial, Utility, Distribution, Higher Education, and Medical organizations. The past 19 years have been in Higher Ed.
Thursday, May 12, 2016
11:20 a.m. – 12:05 p.m.
Presentation Category
Infrastructure
“A Platform Approach to Cybersecurity”
ABSTRACT: The cybersecurity landscape has become cluttered with point solutions all providing separate functionality. The result is a daily barrage of logs and alerts that cannot be effectively investigated by most IT organizations. When it comes to a security incident, the ability to quickly identify and triage is paramount. In order to achieve this without creating a SOC and hiring dozens of Incident Response professionals to comb through logs, a platform approach is necessary. Today we will go over what a platform approach looks like that can address security at the edge, in the data center, on the endpoint, in the public cloud, and even in sanctioned SaaS applications. This approach will give context to security alerts and allows for proper correlation of data to help you prevent a lot of malicious traffic and quickly and efficiently respond to any incidents that arise.
Presented By:
Greg Kreiling & Ryan BarrettRegional Sales Managers, Palo Alto Networks
Greg Kreiling is a security professional with 6 years of cyber security experience helping organizations protect their networks. A University of Michigan graduate, Greg is always pursuing security best practices and solutions that follow a platform approach to scale properly and provide ease of use.
Wednesday, May 11, 2016
11:15 a.m. – 12:00 p.m.
Presentation Category
Sponsor
“Automation and Security”
ABSTRACT: Automation and orchestration are great tools for making networks more responsive to business needs.  But properly used, they can ensure better security and consistency.  Learn how using even simple tools like basic scripts and templates can help reduce errors in provisioning and configuration.
Presented By:
Shane Praay – Senior Systems Engineer, Juniper
Shane Praay, CISSP JNCIA-JUNOS, JNSS-S, JNSS-R Senior Systems Engineer Juniper Networks
Wednesday, May 11, 2016
2:30 p.m. – 3:20 p.m.
“Campus Telephone System Replacement Project – Lessons Learned and Some Surprising Cultural Outcomes”
ABSTRACT: When WSU embarked on its effort to replace its entire campus telephone system in 2014, we believed it would be a relatively simple task of just deploying new technology. On the surface, the concept is fairly basic: Convert the campus to IP Telephony and place a new phone on everyone’s desk. Sounds simple, right? What we discovered is that in addition to the technological hurdles, we needed to develop new methods, materials and approaches. In some instances we were faced with challenges and attitudes such as, “it will never work” or “you can’t do that!” In certain cases the cultural changes we experienced were some of the most significant and unexpected successes on our project. In this presentation, we’ll discuss how a large IT project can be a means to drive cultural and environmental changes within an organization while at the same time addressing fundamental technology requirements, all of which are needed for comprehensive success.
Presented By:
David Fleig – Project Manager, C&IT Infrastructure and Operations Group; Kathryn Guarano – Wayne State University
David Fleig is a Project Manager for the C&IT Infrastructure and Operations Group at Wayne State University. David is responsible for consultation, design, engineering and project management on many of the IT, multimedia, teaching, learning and research facilities at WSU. He has over 25+ years of IT engineering experience in television, communications and multimedia systems. Prior to his work at WSU, David helped start the Michigan Information Technology Network, Inc., a satellite-based statewide distance learning, communications and television network. He also worked for several years in Television Products Engineering at Tektronix, Inc. in Portland, Oregon. David has been a speaker at past Merit and Internet2 conferences as well as at various workshops and advisory groups. David holds Bachelor of Science in Electrical Engineering and Bachelor of Arts in Telecommunication degrees from Michigan State University.
Thursday, May 12, 2016
12:15 p.m. – 1:00 p.m.
Presentation Category
Infrastructure
“Cloud Access Security Solutions”
ABSTRACT: The Cloud needs a control point for the following reasons:
VISIBILITY: Uncover Shadow IT usage and understand content flowing into and out of the cloud
THREAT PROTECTION: Detect and prevent data exfiltration, insider threat, compromised accounts, and malware
COMPLIANCE: Achieve compliance with both internal policies and industry regulations
DATA SECURITY: Protect data from unauthorized access stemming from a security breach or inadvertent disclosure For these reasons Cloud Access Security Brokerage (CASB) services have emerged recently and can act as data brokers between the client and their shadow IT and sanctioned cloud services.

This presentation will explain how CASBs work, the various service options, and a brief demo with an overview of the architecture and operational details.

Presented By:
Rebecca Harvey – Security Specialist, Data Strategy
Rebecca Harvey is an Information Security Specialist with Data Strategy and is committed to helping clients secure their environments whether on premise or in the cloud. She lives in Grand Rapids, Michigan with her husband and two sons.
Thursday, May 12, 2016
9:30 a.m. – 10:15 a.m.
Presentation Category
Sponsor
“Data Center Operations”
ABSTRACT: This presentation will increase understanding of direct and indirect oversight of a data center from a pragmatic viewpoint. It will include an overview of Uptime Institute Tier Ratings, the basic information needed for audit ready policies and an operations manual, plans for risk analysis, mitigation and disaster recovery, details of an acceptable use policy, a maintenance checklist, and a short overview of the main uses of a DCIM (Data Center Infrastructure Management) system.
Presented By:
Patrick Turner – Chief Information Officer, Schoolcraft College
Patrick Turner currently serves as the Chief Information Officer at Schoolcraft College in Livonia, Michigan; overseeing all areas of Information Technology, including the design and implementation of a tier 3+ data center, coupled with academic programs. Patrick holds a Master of Science degree in Mechanical Engineering from the Massachusetts Institute of Technology (MIT), where he attended as a GM Fellow, and a Bachelor of Science degree in Mechanical Engineering from Michigan Technological University (MTU). Patrick has extensive experience in IT, Software Development Process, Management, and Hosting.
Thursday, May 12, 2016
9:30 a.m. – 10:15 a.m.
Presentation Category
Policy & Management
“Developing a Team that Wants to Stay” – Feature Presentation
ABSTRACT: It is a story that repeats itself time after time, at all levels of all organizations: managers, supervisors, and hiring teams work hard to sort through applicants, spend hours in interviews, and then hire the best and brightest they can find. The new employee comes on board with all the skills and hopes they can muster, and just when they reach the point of excellence – that breakthrough to true effectiveness – they resign. They take with them their experience and all they learned, and leave behind a huge void that restarts the process once again. The cycle of hire, hope, disinterest, and loss repeats again and again.This presentation looks at employee retention, what it is, and what it is not. It considers the real costs of turnover, defines what employee engagement really means, and introduces a methodology for implementing an effective employee retention plan that is focused on engaged individuals, who feel valued and are inspired to stay with the team and the organization into the future.

Whether you are the team leader, the manager, or a team member, you have an important role to play in the retention plan for yourself and for the team members that support and collaborate with you.

Presented By:
Pamela Gabel – Executive Director, Shared Services Center, University of Michigan
Pam Gabel is currently the Executive Director of the Shared Services Center at the University of Michigan. She has over 16 years of experience in the shared services field, having held leadership roles in 5 centers, spanning diverse industries including publishing, financial services, construction, and manufacturing. Her current position is her first in higher education. She has been involved in all phases of shared services from design and implementation to continuous improvement and on-going management. Pam earned a B.S. in Psychology from Penn State University and a Master of Divinity from the Lutheran Theological Seminary in Philadelphia.
“Digitization in the Public Sector” – Feature Presentation
ABSTRACT: Digital disruption radically alters markets through the application of new digital technologies, and it challenges established business models. What’s more, the pace of digital disruption shows no signs of slowing as mobility, wearables, video, cloud, analytics, and other technologies continue to transform the ways we live, work, learn, and play. Smart organizations, old and new, are learning to innovate and compete at the blistering pace of the Internet’s next wave.There’s no doubt that the evolution of technology has drastically changed the way government organizations and learning institutions operate on a day-to-day basis. What used to be a time-consuming and difficult task is now possible in a fraction of the time with the right pieces of technology, and as a result employees have been able to work more efficiently and students are able to learn in new ways. Across the public sector, entities are recognizing the opportunities and investing in solutions that offer more than just technological benefits to complete everyday tasks.

With a focus on digitization, any organization can be on the forefront of utilizing advanced technologies, driving processes and enabling it to be a strategic organization that operates effectively.

While the Internet of Things (IoT) is connecting federal agencies and schools with new devices and systems that produce information, digitization is revolutionizing the way the public sector will operate in the near future. Digitization takes the output and information from a device and translates it into useful and tangible knowledge that can be used to drive innovation. It’s one thing to collect data but it’s another to translate that data into useful information that can enable better decisions.

Presented By:
Larry Payne – Senior Vice President, U.S. Public Sector Organization
Cisco
Larry Payne is the Senior Vice President for Cisco’s U.S. Public Sector Organization. He is responsible for leading an integrated sales teams of 2000+ individuals in development and deployment of technology solutions that enable the public sector in protecting the community, serving its citizens, educating our children and defending the nation. He is a technology expert in creating innovative solutions in areas including data centers, video, collaboration, cloud computing, cybersecurity, and secure mobility that enable customer outcomes. He was a principle architect in the development and evolution the U.S. Public Sector segment and was responsible for driving the sales strategy, solutions offers, marketing plans, and program management for the State and Local Governments and Education (SLED) sales entities.
“Diversity Efforts and the WINS Project”
ABSTRACT: The IT field faces a diversity problem including building its next generation of leaders and workforce. Through the NSF-funded Women in IT Networking at SC (WINS) program, five scholarship recipients participated in the ground-up construction of SCinet at last fall’s SC15. The WINS program and SCinet offered these candidates technical and professional opportunities for training, and networking. This presentation will share the motivations for creating the WINS program and what it hopes to achieve, then present one of the five scholarship recipients’ experience, goals and duties while participating in the SCinet project at SC15.
Presented By:
Mary Hester & Debbie Fligor – Energy Sciences Network (Esnet)/Lawrence Berkely National Laboratory; Amy Liebowitz – University of Michigan
Mary Hester is a Science Engagement Coordinator at ESnet. She works on active outreach to science collaborations around the world to help them better use network infrastructures or data transfer tools. Before receiving her bachelor’s degree in physics from the University of California Davis in September 2011, she spent her first two years of college studying english and art at the University of Washington, Seattle. She lives in Fremont, CA and hikes around the Bay Area in her spare time. Amy Liebowitz is a Sr Network Planning Analyst at the University of Michigan. She has been installing, configuring, and managing networks since 2005 when she got her first undergraduate internship replacing token ring networks for Union Pacific Railroad. After graduating with a Computer Engineering degree from the University of Michigan in 2006, she spent five years on the network team at Borders Books. After Borders she spent one year installing network equipment for the University of Michigan Medical Center, then finally landed at her present position in U of M's campus IT group. She lives in Ann Arbor with her partner, two kids, four cats, and one dog.
Wednesday, May 11, 2016
2:30 p.m. – 3:20 p.m.
Presentation Category
Policy & Management
“e911 Considerations for Michigan Businesses”
ABSTRACT: A high-level overview of e911 MLTS legislation that takes effect December 31, 2016, impacting many Michigan businesses.
Presented By:
Al Banach – TelNet Worldwide; Jim Moran – Merit Network
Al Banach of TelNet Worldwide, Jim Moran of Merit Network
Thursday, May 12, 2016
11:20 a.m. – 12:05 p.m.
Presentation Category
Policy & Management
“From Faculty to Students, IT Leaders turn to VDI for a Competitive Advantage”
ABSTRACT: In our ever changing local educational landscape, schools continue to compete for students. Technology services that offer students access to learning from any device, any where, and at any time are becoming integral to organizational success. VDI is an example of an avenue to accomplish this objective. Learn more about the types of Virtual Desktops, the ways that VDI can mean different things to different people, and how to harness the power for a competitive advantage.
Presented By:
Daniel Heidt – Solutions Architect, Access Interactive
With over 15 years of experience in Technology, Daniel has designed countless successful solutions. Some of the common projects include Storage, Networking, Wireless, Server / Desktop / Network Virtualization, Data Center design, and overseeing Custom Software Application Development.
Thursday, May 12, 2016
11:20 a.m. – 12:05 p.m.
Presentation Category
Sponsor
“Gaming in the Library”
ABSTRACT: Join us for a discussion of running wildly successful video gaming programs for your library. Three video game extraordinaires will discuss what video games they’ve used in programs, which gaming platforms they use and why, what patrons attend these programs (and not just kids?!?!). How much does this cost? How long is a given game title relevant for? Which games worked best? and why? What kind of attendance? Do the “gamers” come back for more Library events? Does playing video games help make tweens and teens into life long library patrons? You’ve got questions, we’ve got answers… and Video Games!
Presented By:
Michael McEvoy – Northville District Library; Kricket Hoekstra – Rochester Hills Public Library; Kathleen Kozlowski – Orion Township Public Library; Michael Shereda – Farmington Community Library
Michael McEvoy is the Technology Coordinator for the Northville District Library. In that role, he is responsible for all electronic and technology systems in the building-whether they have wires or not. He has worked with public libraries since 1988, moving from Shelving Page to Technology Coordinator through multiple locations, providing experienced and knowledgeable technology support and service at all levels. He has been as an active participant and leader in the TLN Technology Committee for over 15 years, including 7 years as the chair. Michael has a BA in video communications from Madonna University. He’s also known to play a video game or two. Kricket Hoekstra received her MSI from the University of Michigan in 2008 and has been happily working with the teens of the Rochester Hills Public Library ever since. She just finished a stint as chair of the TLN Teen Services Committee. She enjoys comics, Pokemon, and cheese. Kathleen Kozlowski graduated from Oakland University with her Bachelor's Degree in Management and Minor in Marketing. She got her Master's Degree from Wayne State University with a concentration on teen services. Kathleen enjoys reading teen fiction and manga and playing video games, obvi. Favorite games include TF2, Uncharted, Assassin’s Creed, Final Fantasy, Left for Dead and many more! Other than gaming in her free time she likes running, cycling and hanging out with friends and family. Overall Kathleen is probably the coolest person you will ever meet! She works at the Orion Township Public Library. Michael Shereda is the Technology Specialist at the Farmington Community Library. He has a Bachelor’s Degree in Computer Science from the Univeristy Of Michigan – Dearborn and has 10 years of experience working with technology in a library setting. You may recognize him from his presentation on Minecraft In The Library, for the TLN Technology Committee.
Thursday, May 12, 2016
10:15 – 11 a.m.
Presentation Category
Software/Applications
“Gigabit Apps: Faster, Smarter Apps for How we Work, Live, Learn, and Play”
ABSTRACT: Ultra-fast bandwidth opens a new door for creative, interactive software applications. Apps require careful planning to account for conditions and constraints such as speed, latency, caching, compression, and more. But what if these challenges could be minimized or even eliminated, and what impact would this have on new possibilities for apps to solve real-world problems? What’s being done and what’s being planned? In this interactive workshop, we first provide a brief overview of the US Ignite non-profit led mission for next-generation Internet technologies and how NextEnergy is helping. We then engage the audience to help drive the discussion on motivations, successes and hurdles in the ultra-fast bandwidth app space. Finally, we conclude with a summary of findings and feedback for next steps in gigabit app opportunities.
Presented By:
William Wallace – US Ignite Jean Redfield – NextEnergy; Wayne Snyder – NextEnergy
Wednesday, May 11, 2016
10:10-10:55 a.m.
Presentation Category
Software/Applications
“High Fidelity Collaboration and Digital Identity”
ABSTRACT: From the beginning, digital collaboration has been limited by the medium used to facilitate it. Join us for a talk about how forming stronger and more nuanced digital identities can lead to much deeper and more meaningful interactions when participating digitally. This semi-technical talk covers a wide range of subjects including the dichotomies of privacy vs. anonymity, centralization vs. decentralization, and facilitators vs. walled gardens. We’ll also talk about spam, abuse, big data, the meaning of “I Agree”, and the role we can all play in making our digital selves and places more like our real selves and places, and in turn make High Fidelity Digital Collaboration a reality.
Presented By:
Michael Gregorowicz – Systems Architect Advisor, Wayne State University
Systems Architect at Wayne State University with a focus on digital identity, social networking, and messaging. Over 20 years experience building digital communities around novel concepts. Creator of Academica ESP, the mg2 organization, praux.com, and other software systems that facilitate digital community building.
Thursday, May 12, 2016
12:15 p.m. – 1:00 p.m.
Presentation Category
Policy & Management
“How to Begin Your Journey Toward PCI Compliance”
ABSTRACT: The road toward compliance can be long, sometimes frightening and without the right tools, you may never find your way. Come learn how to begin your journey toward PCI compliance. This session will review PCI SAQ’s, the 6 control objectives, gathering evidence and properly defining scope. Preparing yourself with the proper tools beforehand, can make the journey manageable and less stressful.
Presented By:
Jason Brown – CISO, Merit Network
Jason Brown’s passion is security and education. For the past eight years, he has been working his way up in the industry, starting as a network technician at Ferris State University, one of Merit’s governing members, to recently being named as one of only two enterprise security architects for the State of Michigan. Jason earned his bachelor’s degree in information technology from Central Michigan University in 2007, and his master’s in management information systems from Ferris State University in 2009. His dedication to continuing education has earned him several certifications, including CCNA and CISSO. Jason has always aimed to become a leader in information security, and says he is thrilled to be in the role of Merit Network’s 1st Chief Information Security Officer.
Wednesday, May 11, 2016
11:15 a.m. – 12:00 p.m.
Presentation Category
Policy & Management
“Is your cert any good? A deep dive into site security elements.”
ABSTRACT: Pen testing for web apps is more art than science, but there are some tools that deliver on both fronts. Calomel.org provides a robust set of ‘how to’ information for IT and security researchers. They offer a powerful tool for security validation of digital certificates, in the form of a Firefox plug-in. This tool shows the status (by version and score) of an array of elements making up the security profile of a site. We’ll take a look at some typical results – good and bad – and dive into the meaning of each feature, and discuss how to address some of the weaknesses it uncovers.
Presented By:
Paul Groll – Enterprise Information and Security Architect, State of Michigan
Paul Groll is a dislodged UP'er and a re-engineered coral reef ecologist. At some point when he wasn't looking, he got roped into an assortment of computer-centric research projects at both the University of Hawaii and Michigan State University. SCUBA tanks are heavy, so he eventually switched fields and moved into computer science (hey, floppy disks). He worked for many years at MSU, focusing on scientific and engineering computing, and also built up a software and network consulting firm. Since joining the State in the 90s, Mr. Groll has worked in every corner of IT: running a data center, firewalls, software design and development, secure medical data messaging, Enterprise Information Management, and more recently, Big Data. His passion remains Cybersecurity, in which he holds a number of professional certifications. He continues to consult, travel, and lecture on a range of technical and scientific topics, reads extensively about cybercrime and Number Theory, and spoils his dog Kai.
Wednesday, May 11, 2016
11:15 a.m. – 12:00 p.m.
Presentation Category
Security
“Leveraging SDN, NFV, and DevOps for Next-gen Datacenter Design”
ABSTRACT: Network architecture is evolving as trends like software-defined networking (SDN), network function virtualization (NFV), and DevOps take root. Planning for the inevitable evolution of the network requires consideration of the underlying architectures that support these technologies, but also for the tools, processes, and people that underpin the whole of IT. This session will introduce the major trends driving the networking industry forward, highlighting key areas for attention and investment.
Presented By:
Michael Bushong – VP of Product Management & Software Networking, Brocade
Michael Bushong is Brocade¹s Vice President of Product Management for Brocade¹s Software Networking business. In this role, he has responsibility for defining strategy and product direction for Brocade¹s software networking portfolio, covering Brocade¹s major virtual networking functions as well as its OpenDaylight-based controller. Michael joins Brocade having most recently served as head of marketing at datacenter switch startup Plexxi. Prior to Plexxi, Michael spent 12 years at Juniper Networks, most recently running product strategy, management, and marketing for Juniper¹s flagship operating system Junos. Notably, Michael spent several years leading Juniper¹s SDN and NFV efforts across both service provider and enterprise markets, placing him among the vendor firsts to aggressively pursue the technology. Additionally, Michael has been recognized for his blogging and social media contributions in the SDN space, having been listed as one of the industry¹s top bloggers and Twitter handles to follow.
Thursday, May 12, 2016
12:15 p.m. – 1:00 p.m.
Presentation Category
Sponsor
“Leveraging the Open Source Community Model for Building Shared Solutions within Higher Ed”
ABSTRACT: Today, many solutions are being developed within the open source community that can reduce the dependency of commercial products. Is this model viable for Higher Ed? If so, what would the open source solution building process look like and where do you start? What are some of the key tools and key enabling solutions needed for Higher Ed to enable a social and crowd sourcing model. In this session we will review how one project leveraged several open source solutions and stumbled upon the need for an open source data integration engine. We will also explore how today’s open source community uses Github and package managers to build shared solutions. We will also demo a data integration engine and review some of its core components and how it could be leverage to support various open source solutions.
Presented By:
Randall Melton – CTO, Lake Michigan College
Randall is responsible for managing and delivering Information Technology Services for Lake Michigan College and has been on loan to the MCCA as their CTO. He led the development efforts for Michigan Colleges Online and the upcoming digital guided pathway IPAS solution. He co-led the Michigan Community College’s association P-20 taskforce that supported Michigan’s P20 initiative and led the development of an open sourced data transformation solution based on PESC for supporting Michigan’s longitudinal data system. Randall has over three decades of work experience in Information Technology that include healthcare, financial wellness and Higher Ed. Randall earned a master’s of business administration from Rollins College, a bachelor’s of Science degree in computer science from the University of Southern Mississippi and a two year degree from a community college. He is an advocate for open source solutions in Higher Ed and is currently working on three projects
Thursday, May 12, 2016
11:20 a.m. – 12:05 p.m.
Presentation Category
Software/Applications
“Merit Regional Cybersecurity Training”
ABSTRACT: Merit is the lead agency in a public-private partnership with the Macomb-St. Claire Workforce Board and the Workforce Intelligence Network in a project to create a Regional Cyber Training Center (RCTC.) The RCTC will deliver core cyber security curriculum through a distance learning model in conjunction with participating organizations throughout the state.

Dr. Adams will describe the concepts and curriculum that are being developed for the RCTC, the timeline for implementation, and the progress made thus far.

During the session Cisco will showcase the user experience of the video technologies proposed for the Tier 1 (primary presenter) and Tier 2 (remote participant) locations. This is designed to be an interactive session in which Q&A is encouraged.

Presented By:
Dr. William J. (Joe) Adams – VP of Research & Cyber Security, Merit Network; Dave Kroger – Collaboration Specialist, Cisco Systems; Sean Spires – Video Specialist, Cisco Systems
Dave Kroger is a Collaboration specialist for Cisco Systems who has worked with higher education and K-12 customers in Michigan, Ohio, Illinois and Indiana for Cisco for 8 years. He earned his MBA in Information Systems from Indiana University and his BA in Psychology from Hanover College.
Wednesday, May 11, 2016
2:30 p.m. – 3:20 p.m.
Presentation Category
Software/Applications
“Merit Cyber Security Defense Services: A Community Approach “
ABSTRACT: Security. It is a top-of-mind topic, and the ‘Fog of More’ is a difficult obstacle to step through. Merit Members are asking questions such as: “Where do I begin?” and “Do I start with penetration testing or patching my systems?” Come see how Merit’s Cyber Security Portfolio can help to answer these, and many other cyber security-related questions. With Merit’s proactive, active and reactive approach to related topics, Merit is uniquely situated in providing cyber security services to its Members. After a brief overview, we will open the session up for service suggestions and ideas from the Members in attendance. A great way to get involved in the future direction of Merit security services!
Presented By:
Jason Brown – CISO, Merit Network; David Dennis – Executive Director of Product Management, Merit Network
Jason Brown’s passion is security and education. For the past eight years, he has been working his way up in the industry, starting as a network technician at Ferris State University, one of Merit’s governing members, to recently being named as one of only two enterprise security architects for the State of Michigan. Jason earned his bachelor’s degree in information technology from Central Michigan University in 2007, and his master’s in management information systems from Ferris State University in 2009. His dedication to continuing education has earned him several certifications, including CCNA and CISSO. Jason has always aimed to become a leader in information security, and says he is thrilled to be in the role of Merit Network’s 1st Chief Information Security Officer.
Thursday, May 12, 2016
11:20 a.m. – 12:05 p.m.
Presentation Category
Security
“Polymorphic attacks on data-in-motion require a new security approach from both the service provider and end user.”
ABSTRACT: Data exists in two states: data-at-rest and data-in-motion. Encryption is the science of protecting information in these two states. The challenge for the criminal is to gain access to the keys that unlock the encryption. With the explosion of cloud data and application based connectivity keys are more exposed as data in motion now offers more accessible means for sophisticated attacks. Attacks are polymorphic in nature overwhelming yesterday’s technologies such as firewalls. One of the largest service providers in the world claim that the firewall has become police tape around a crime scene. Another major service provider states that the average time from a breach to the discovery is 288 days. Today both the service provider and the customer must work together to provide a layered encryption strategy to protect data when it is most vulnerable. New technologies such as NFV can make cost effective solutions possible.
Presented By:
William Balmer – Manager Global Business Development Ethernet and NFV Markets, ADVA Optical Networking
William Balmer has more than 30 years in the Telecommunication Industry with extensive experience in Ethernet, Security, IP, wireless, VOIP, Optical, Packet Networks, and Performance Management Systems. His background has included positions Switch Design Engineer at Hitachi Telecommunications, Product Management in Optical Transport at Nortel, and Global Business Development at Accedian Networks. Across his carrier the underlying need for protecting data in motion has been at the forefront of design initiatives. At ADVA Optical Networking Bill is part of a security team that develops encryption products for the marketplace. ADVA Optical Networking has over 200 Encrypted Networks deployed using their ConnectGuard™ platform.
Wednesday, May 11, 2016
10:10 a.m. – 10:55 a.m.
Presentation Category
Sponsor
“Project Management for Non-Project Managers”
ABSTRACT: Does the thought of starting and managing a new IT project send chills down your spine? Is Microsoft Project perceived as a necessary evil or something to be avoided altogether? The boss wants me to manage the next campus-wide IT project – Now what? Project management is an art and science in and of itself. Formal project management can be daunting, especially if the project is highly complex. Training and certification in project management can be time-consuming and expensive. It is possible to adapt the materials and methods utilized in formal project management to many of the projects we face on a regular basis. During this session, we’ll highlight some of our recent projects, discuss the tools we developed and will share our experiences. We’ll cover many of the useful materials and methods available for effective project management, whereas we’ll also identify and discuss those that can often be avoided. In many cases, it is possible to simply the project management process without compromising success or inviting failure.
Presented By:
David Fleig – Project Manager, C&IT Infrastructure and Operations Group, Laura Hendrick – Sr. Director, Infrastructure and Operations, Wayne State University
David Fleig is a Project Manager for the C&IT Infrastructure and Operations Group at Wayne State University. David is responsible for consultation, design, engineering and project management on many of the IT, multimedia, teaching, learning and research facilities at WSU. He has over 25+ years of project management, production and engineering experience in IT, television, communications and multimedia systems. Prior to his work at WSU, David helped start the Michigan Information Technology Network, Inc., a satellite-based statewide distance learning, communications and television network. He also worked for several years in Television Products Engineering at Tektronix, Inc. in Portland, Oregon. David has been a speaker at past Merit and Internet2 conferences as well as at various workshops and advisory groups. David holds Bachelor of Science in Electrical Engineering and Bachelor of Arts in Telecommunication degrees from Michigan State University.
Wednesday, May 11, 2016
10:10 a.m. – 10:55 a.m.
Presentation Category
Policy & Management
“Risk Analytics: A Pro-Active Approach to Cybersecurity”
ABSTRACT: Overview of the philosophy and research behind QuadMetrics approach, followed by a review of the experience from two Merit Members who are using the service.
Presented By:
Wes Huffstudder & Manish Karir – Quadmetrics; Greg Lozeau – Western Michigan University; Mike Lowry – University of Michigan
Wesley Huffstutter has over 15 years of startup experience as an operator, mentor, consultant and board member. Before joining QuadMetrics, he spent nearly a decade helping the University of Michigan start companies based on research. During his tenure, U-M launched over 100 companies and the startups raised over $1B in equity financing. Wes began his career as a software developer, for a machine vision and artificial intelligence company, later leading the company's marketing before the company sold to a public company in 2001. Wes has a BA Computer Science DePauw University and MEM (Engineering) and MBA (Business) from Washington University in St. Louis.
Thursday, May 12, 2016
9:30 a.m. – 10:15 a.m.
Presentation Category
Security
“Smart Universities: Will they lead or follow the evolution of Smart Cities?”
ABSTRACT: Cities are getting smart. As the Smart City movement continues to develop, an important question emerges: can universities be smart too, and to what extent can they play a pivotal role in Smart City progress? We investigate the answer beginning with an overview of Smart Cities with examples of key concepts, technologies and services. We then identify the striking similarities between cities and universities, correlating what we know about Smart Cities to build out the case for conceptualizing a Smart University. Finally, we review Smart City leadership opportunities uniquely suited to a university environment. We wrap up with a review of NextEnergy’s Smart City initiatives underway in collaboration with government, industry, and academia.
Presented By:
Wayne Snyder – IT Program Manager, NextEnergy Center
As IT Program Manager, Snyder oversees NextEnergy's computing resources, processes, and technology while supporting technical management and execution of various energy and connected technologies demonstration projects. His overarching responsibilities in both Information Technology and Programs include planning, budgeting, designing, executing, evaluating, and improving delivery of technical services and support. Snyder joined NextEnergy in 2007, bringing more than seven years’ experience in information technology that included information systems management, embedded systems software development, web design, and network administration. His prior experience at NextEnergy as Facility Manager included oversight of building and grounds maintenance, space management, lighting, utilities, safety, security, and HVAC systems.
Thursday, May 12, 2016
9:30 a.m. – 10:15 a.m.
Presentation Category
Infrastructure
“Start Secure. Stay Secure. “
ABSTRACT: With recent data security exposures making headlines, many companies look to implement best practices to protect their own assets and their customers’ data. The Center for Internet Security (CIS) harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The industry-recognized and consensus-based CIS resources are endorsed by leading IT security vendors and governing bodies, and used by both private and public organizations worldwide. CIS offers both free and membership-based resources, including the CIS Critical Security Controls, Security Benchmarks, and the Multi State-Information Sharing & Analysis Center. Come learn how CIS can help you start secure and stay secure.
Presented By:
Laurie Hester – Center for Internet Security
Laurie Hester is a Program Executive for Business Development at The Center for Internet Security (CIS). She has been with CIS for 6 years. Laurie’s primary focus is communicating the value and benefits of the CIS Services specifically the Security Benchmarks Membership to both public and private organizations worldwide. Her team enrolls organizations who want to leverage the consensus based CIS Benchmarks and automation resources for compliance and system hardening.
Thursday, May 12, 2016
12:15 p.m. – 1:00 p.m.
Presentation Category
Security
“The Enterprise Security Portfolio – from Virus Protection and Firewalls to Data Loss Prevention and Advanced Persistent Threats – A Technological Survey”
ABSTRACT: We all can certainly agree that the security landscape for the enterprise is becoming increasingly complex and is changing at a dramatic pace. Matters become even more so when adding the ubiquitous topics of virtualization and SDN (Software Defined Networking). This presentation seeks to offer a high-level customer perspective overview of the security tool landscape with an eye toward the virtualized environment. The idea is not to go in-depth into any one topic but to discuss how the pieces fit together and the risk versus reward proposition. The list of security layers to be discussed starts with antivirus, firewall with VLAN network segmentation, SSL (Secure Socket Layer) certs for encrypted communication, identity services and port level security, and continues with the more recent technologies of IPS (Intrusion Protection Systems), automated penetration and vulnerability analysis, DLP (Data Loss Prevention), zero day threat mitigation, Next Generation Firewalls for APT (Advanced Persistent Threat) protections. The full security portfolio rounds out with IPAM (IP Administration and Management), Secure DNS, password policies, multifactor authentication, password lockers, social engineering training, and development of an Enterprise Security Policy, including response management and escalation. Finally, the impact that virtualization, micro-segmentation, software defined networking, and monitoring has on your network security strategy.
Presented By:
Patrick Turner – Chief Information Officer, Schoolcraft College
Patrick Turner currently serves as the Chief Information Officer at Schoolcraft College in Livonia, Michigan; overseeing all areas of Information Technology, including the design and implementation of a tier 3+ data center, coupled with academic programs. Patrick holds a Master of Science degree in Mechanical Engineering from the Massachusetts Institute of Technology (MIT), where he attended as a GM Fellow, and a Bachelor of Science degree in Mechanical Engineering from Michigan Technological University (MTU). Patrick has extensive experience in IT, Software Development Process, Management, and Hosting.
Wednesday, May 11, 2016
10:10 a.m. – 10:55 a.m.
Presentation Category
Security
“The OSiRIS Project: Distributed Ceph and Software Defined Networking for Multi-Institutional Research”
ABSTRACT: We report on the recently funded OSiRIS project (NSF Award #1541335, UM, IU, MSU and WSU) which is targeting the creation of a distributed Ceph storage infrastructure coupled together with software-defined networking to provide high-performance access for well-connected locations on any participating campus. Our goal is to provide a single scalable, distributed storage infrastructure that allows researchers at each campus to read, write, manage and share data directly from their own computing locations. The NSF CC*DNI DIBBs program is seeking solutions to the challenges of multi-institutional collaborations involving large amounts of data and we are exploring the creative use of Ceph and networking to address those challenges. The project started in September of 2015 and intends to have its first distributed Ceph implementation operational by end of March, 2016 and its first science-users by summer 2016. This presentation will provide an overview of the project, its status, challenges and goals.
Presented By:
Ben Meekhof – OSiRIS Project Engineer, UM ARC-TS
Shawn McKee (Ph.D., UM 1991) is a high-energy astrophysicist at the University of Michigan. During the early 1990's he led the central tracker simulation group as an SSC Fellow on the GEM experiment. Since the demise of the SSC, he has been active in a wide range of physics collaborations: particle astrophysics (HEAT, ACCESS), neutrino physics (COSMOS), high-energy physics(ATLAS) and observational cosmology (SNAP). He has been central to advancing computing technology to address the simulation and data analysis requirements of each experiment. His recent research has focused on the integration and orchestration of computing, storage and networking to meet the needs of data-intensive, distributed science domains like ATLAS.
Wednesday, May 11, 2016
11:15 a.m. – 12:00 p.m.
Presentation Category
Infrastructure
“Update on Michigan’s Statewide Educational Network”
ABSTRACT:

Presented By:
Dave Childs – Genesee ISD; Matt McMahon – GIRESD; Bob Stovall – Merit; Chuck Madden and Dan Allen – Lapeer ISD

Wednesday, May 11, 2016
11:15 a.m. – 12:00 p.m.
Presentation Category
Infrastructure