5 Ways to Create a 'Post-PC Environment'

Education technology is moving toward a “post-PC environment,” where software will be online, students will access everything they need from one cheap device and BYOD will stand for “bring your own data,” according to Duane Schau, director of client services at Indiana University

In “The Evolving Post-PC Endpoint Model at Indiana University,” a session at the Citrix Synergy conference in Orlando, FL, Schau discussed five steps that IU is taking or plans to take that will move it beyond the traditional personal computer.

1) Use desktop virtualization to transform computer labs.

According to Schau, “You don’t need to have a fixed asset anymore.” Instead of rooms filled with rows of desktop computers, Schau said, “We want our labs to be highly collaborative … more like a coffee shop.” One of the advantages of downsizing hardware holdings, he said, is that the university saves “hundreds of thousands of dollars that weren’t spent on life cycle.”

2) Negotiate software licenses for student use.

IU, with its 120,000 students and 61,200 active users, can definitely benefit from economies of scale. Schau said that he is a strong position to negotiate licensing fees because, when students use specific software to do their schoolwork, they are “likely to leave the university and request that software in the business that they’re going to.”

3) Move software and storage online.

Every student at IU has a Box account, Schau said, but “we had to invent some applications” for storage orchestration.

4) Head for a one-device model.

While today’s students still come to class with multiple devices, Schau envisioned a single-device future in which all students have “access to all of IU’s computing power through inexpensive devices” such as smartphones.

5) Look into connecting to Internet2 or Net+.

Finally, Schau suggested that educational institutions should explore the idea of building consortia to share the speedy Internet that next-generation connectivity can provide.

About the Author

Christopher Piehler is the former editor-in-chief of THE Journal.

Featured

  • pattern featuring interconnected lines, nodes, lock icons, and cogwheels

    Red Hat Enterprise Linux 9.5 Expands Automation, Security

    Open source solution provider Red Hat has introduced Red Hat Enterprise Linux (RHEL) 9.5, the latest version of its flagship Linux platform.

  • glowing lines connecting colorful nodes on a deep blue and black gradient background

    Juniper Launches AI-Native Networking and Security Management Platform

    Juniper Networks has introduced a new solution that integrates security and networking management under a unified cloud and artificial intelligence engine.

  • a digital lock symbol is cracked and breaking apart into dollar signs

    Ransomware Costs Schools Nearly $550,000 per Day of Downtime

    New data from cybersecurity research firm Comparitech quantifies the damage caused by ransomware attacks on educational institutions.

  • landscape photo with an AI rubber stamp on top

    California AI Watermarking Bill Garners OpenAI Support

    ChatGPT creator OpenAI is backing a California bill that would require tech companies to label AI-generated content in the form of a digital "watermark." The proposed legislation, known as the "California Digital Content Provenance Standards" (AB 3211), aims to ensure transparency in digital media by identifying content created through artificial intelligence. This requirement would apply to a broad range of AI-generated material, from harmless memes to deepfakes that could be used to spread misinformation about political candidates.