Welcome!

Virtualization Authors: Elizabeth White, Carmen Gonzalez, Victoria Livschitz, Pat Romanski, Lori MacVittie

Blog Feed Post

The Collegiate Cloud: An Interview with Ferris State University’s Amy Buse

Ferris State University (FSU) is an accredited state university located in Big Rapids, Michigan, offering multiple computing degree plans within its Business/Technology Consortium. The college serves more than 14,000 on- and off-campus students in the region.

 

I had the opportunity to sit down with Ferris State Professor Amy Buse to learn more about how the school has provided its students with cutting-edge cloud computing technology across a number of applications to better prepare them for their careers after graduation.

Jason: How did you discover Skytap, since it is not commonly used in education?

Amy: I found out about Skytap at Interop a couple years ago. I heard a speaker from the company and knew “I gotta go talk to this guy.” We had researched a lot of other vendors but nobody else had the ability to allow our students install the operating system themselves on bare metal, and not build the cost of the operating system into the charge of each system. As an educational institution, we have flat fee access to unlimited licenses of Windows and other software packages, so we don’t need to have OS licensing fees rolled into each image.

I was teaching a Linux class off-campus, and we would need to remote desktop into the workstations and VMs back in the classroom of the main campus. It was a huge hassle if something happened to the computers back in the lab, or there was a connection problem. So I went to my administration and said if we are going to continue doing off-campus learning, we need a better way.

Jason: What programs are using Cloud labs?

Amy: We teach three programs off campus using Skytap:

  • CIS (computer information systems) students who grow up to be programmers and systems analysts on the software side.
  • CIT (computer information technology) students who grow up to be server and network administrators and; 
  • ISI (information security & intelligence) students who learn to harden servers, but they are more on the forensic side - proving what happened after a problem

In ISI they will set up a lab and have students with labs spin them up and try to attack each other. Our first question to Skytap as a vendor was “can we hurt you?” But some particular thing we did in our first semester caused Skytap to take a new look at one of their access policies!

There’s also an HVAC (Heating Ventilation Air Conditioning) off-campus program, and when they found out what we were doing with labs they let students connect their Skytap environment to simulate their interface with Johnson Controls equipment that operates heating and air conditioning systems on site.

Jason: Is usage of Skytap growing in the organization?

Amy: There’s certainly potential for more usage of Skytap in other labs, but we need to consider who funds our capacity – I only have funding secured for business technology programs, so I am not advertising it broadly to other departments. But we talk quite a lot about it among our faculty. The professors that use Skytap a lot are very, very happy with it.

Some people say “you could just set up your own VMs in a data center” but it is the user experience of Skytap on top of the hypervisor that makes it phenomenal. It is easy to take one lab machine, configure it the way we want it, with all the software on it, and then automatically stamp one out per student with a discrete URL. Before that, there was no way to do that.

We have to support ourselves – as technology faculty we are responsible for our systems. So we were maintaining our own lab machines at the main campus, and we had to tell students when and when not to remote in because of other student needs, so there were no conflicts.

Now our students don’t have to fit work time into the 5-7pm lab slot after the class. They don’t even worry about limited access to a remote desktop. They have availability to study or do their homework at any time.

Jason: What was the existing lab environment like?

Amy: On campus, we’d have some desktop computers in a lab running VMware, where students could create their virtual machines. In our off-campus class we have some Mac laptops, so teachers would start the class, students would get the shared laptops out of the closet and work on them, and then they’d need to put them right back in the closet at the end of the lesson. This meant students had no ability to actually use the tools and do hands-on homework.

A few students had their own laptops they could set up with the system, but then that would become a huge burden on faculty to support those configurations. The faculty could sometimes spend 10 weeks out of a 15-week semester before they were done troubleshooting the students’ systems.

We would rather have the training VMs available to run 24/7, so instead of remoting into computers on campus, the student could look at them any time and turn them on to do their homework.

So we were looking at the prospect of having to build our own remote training labs, with servers, VMs and software configurations updated and backed up. We’d be on our own in that process with little help from IT. The workload would have been unsupportable for our faculty, we’d all have to teach fewer classes to handle it. Plus procurement of everything could take a semester or more.

Jason: What would it take to do this yourself?

Amy: If we took the “build our own” route, we were estimating an additional equipment cost of at least $120,000 per year, just for the hardware. Add to that all the configuration and maintenance labor. We could communicate to the school that the conventional approach would still fall a great deal short of what we needed.

We are trying to put additional value numbers together, but there are approximately 550 business technology students per semester leveraging Skytap. The per-student cost of dev/test labs is sustainable at our current costs.

Jason: What are some of the use case scenarios?

Amy: Capture the Flag is an educational game we run, where each student has to create an entire infrastructure of VMs in Skytap, and use it to attack two other students’ labs.

In another IT management class, students had to learn how to build a system from the ground up, and then work with lab partner teams, where one would be in charge of configurations, and the lab partner would act as the sysadmin and make sure the work gets backed up. 

Jason: What were the administrative difficulties of getting this off the ground?

Amy: I initially brought the solution to FSU to address the limitations we were encountering in the technology labs, and made the business case for funding. 

Fortunately we had a VP of operations (Don Green, VP of Extended and International Operations) who wanted us to get into cloud services a few years ago, and wanted us to find a way to teach in the cloud. He has understood that we needed this approach and supported the funding of the project. We would have had a much more difficult time getting this new approach approved without a champion.

Because we were moving to cloud, we had a lot of questions about our students’ privacy. Just like the healthcare industry has HIPAA, we have FERPA (Federal Education Right to Privacy Act) that dictates how personal data about our students can be managed.  For instance, the data that a particular student takes a particular class, and their email address are protected by FERPA. 

So we are asked “What student data are you putting out there?” and we can honestly say “None.” The student never has a personal login, they are just getting to their virtual machines via a published URL. That made it easy to go forward.

Jason: Can students still cheat on their exams now?

Amy: Most students don’t have a login, they just use Skytap’s Published URL feature to get to their machines. In a couple of classes we did give students a login to the Skytap Cloud management dashboard, so they could build their configurations from the ground up. But we toggled the features in Skytap to keep it fair and prevent them from uploading or copying VMs and environments into their area.

Sometimes it’s hard for students to distinguish between latency in their network connection and the application itself. So inevitably you will hear some complaints about response times, but that is always a product of the quality of their network connection – if they’re using wifi in a crowded coffee shop rather than a solid connection.

Want to learn more about how Skytap helps eliminate classroom setup hassles with virtual training environments in the cloud? Click here! Or, start your own free trial, or request a custom demo for your unique use case today!

Read the original blog entry...

More Stories By Noel Wurst

I am the managing content editor at Skytap. Skytap provides SaaS-based dev/test environments to the enterprise. Our solution removes the inefficiencies and constraints that companies have within their software development lifecycle. As a result, our customers release better software faster. My aim is to publish engaging, thought provoking stories that revolve around agile enterprise applications and cloud-based development and testing.

@ThingsExpo Stories
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device experiences grounded in people's real needs and desires.
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps, abiding by privacy concerns and making the concept a reality. These challenges can't be addressed w...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving t...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect at Hookflash, will walk through the shifting landscape of traditional telephone and voice services ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
Bit6 today issued a challenge to the technology community implementing Web Real Time Communication (WebRTC). To leap beyond WebRTC’s significant limitations and fully leverage its underlying value to accelerate innovation, application developers need to consider the entire communications ecosystem.
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from hardware to software, or as we like to say, it’s an Internet of many different things. The difference ...
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.