|  Q&A
  Tune in, turn on  Greg Jackson, vice president 
              and chief information officer, oversees the University’s information-technology 
              resources—computer hardware and software, e-mail, networks, 
              and phones. He came to Chicago from MIT in 1996 as associate provost 
              for information technology; before MIT he taught at Stanford and 
              spent 11 years at Harvard, teaching and as a technology consultant. 
               
                |  Illustration by Allan Burch |  Chicago’s Networking Services and Information 
              Technologies, which Jackson runs, has a $70 million annual budget 
              and a 300-person staff. Between managing daily crises—viruses, 
              worms, and system-clogging movie downloads—Jackson focuses 
              on a larger goal: advancing academic life through technology. What are the financial 
              priorities for the University’s electronic resources?The boring—but important—priorities involve infrastructure: 
              making sure the network runs efficiently, modernizing administrative 
              systems, getting good deals from vendors. Most of our resources 
              go there, our goal being to make sure tomorrow is pretty much like 
              today.
 The interesting priorities more directly involve 
              the University’s core missions: teaching students and advancing 
              knowledge. Although most research technology is managed at the departmental 
              or lab level, instruction is a central priority: we invest in systems 
              to help faculty organize and deliver teaching materials over the 
              network and to increase the use of multimedia. We also create learning 
              spaces such as media classrooms and student computing clusters. What are some of the academic 
              tasks students can now do online?These days students do most of their academic-administrative tasks 
              online: finding classes, registering, getting materials, adds and 
              drops, looking at grades, getting transcripts. They’ve been 
              doing that for about four years now, although the systems keep getting 
              better.
 Recently we’ve seen more use of multimedia—both 
              through Chalk, where faculty make class materials and discussion 
              groups available to students, and in students’ own work, which 
              increasingly includes movies, live links, and other things my college 
              papers never had. We have high demand for multimedia equipment and 
              help. The Library also has expanded its electronic 
              resources dramatically—online journals, an online catalog 
              with live links, scanned images of rare materials, you name it. 
             What kinds of tasks can 
              students look forward to doing online in the future?We’ll see lots more instant messaging, and not only to coordinate 
              meetings at Jimmy’s. We’ll see more dissertations that 
              contain films, animations, simulations, even 3-D projections, and 
              I imagine some of them won’t contain text. The key thing will 
              be to maintain our core learning focus; online discussions and arguments 
              are a wonderful supplement for classroom experience, but rarely 
              are they a full replacement.
 How much activity does 
              the system see?The main Web server averages about half a million hits a day. The 
              central mail servers—mail addressed to uchicago.edu— 
              receive half a million messages a day. There are about 20,000 devices—computers, 
              printers, routers, Web cameras—connected to the network, and 
              about 20,000 phones, for about 13,000 or 14,000 people at the University.
 How does Chicago keep up 
              with increasing demand?We keep adding to our network capacity, and that’s partly 
              electronic and it’s partly physically putting stuff in the 
              ground. When the quads were dug up this summer, for example, conduits 
              were put in that we don’t need now, but eventually we’ll 
              run fiber through them.
 The real issue concerns increased off-campus 
              traffic, for which we have to buy expensive capacity. In the past 
              several years we’ve more than quadrupled the capacity of the 
              commodity Internet connections, meaning everything but research 
              connections. Those connections cost us about $400,000 a year, and 
              we keep needing more. Although some commodity traffic benefits the 
              University directly, a lot is people moving movies around, sharing 
              music, or gabbing with friends. It’s harder to argue that 
              we should be spending money for that, but there’s no easy 
              way to separate entertainment from work.  How many hacker attacks 
              does the network receive? How do you combat them?It depends what you mean by hacker attack—certainly a couple 
              of hundred a week. Many are essentially automated. There will be 
              news of a weakness in an operating system, so someone will write 
              a program that finds a computer with the weakness and automatically 
              looks for other computers with that same weakness. It installs itself 
              on those computers and repeats the process. By the fifth infection 
              it’s all automatic. So the volume of attacks is largely because 
              there are all these vulnerable computers out there.
 Major new attacks, on the other hand, come at 
              a rate of about two a month. There were six or seven over the summer, 
              for example. Blaster is one, Nachi is another, the I Love You virus 
              was further back. Nachi and Blaster cost us about $400,000, mostly 
              in paying staff to scratch and restore computers.  To combat attacks we first try to educate people 
              to keep up antivirus software, to not run unnecessary services, 
              to not let their kids install games they’ve never heard of. 
              Those things can open up vulnerabilities. We also do an enormous amount of intrusion detection. 
              We have listening posts scattered over the network, watching for 
              abnormal activity. They’ll zero in on where such activity 
              is coming from, and we’ll take a close look at the offending 
              machine from the network. If the activity matches a known pattern 
              of compromise we’ll pull the machine off the network. We pull 
              about 100 machines off the network every week this way. If it’s 
              a really dangerous vulnerability we’ll pull machines off the 
              network before they get infected.  If someone’s machine is compromised again 
              and again, he or she will be called in for a conversation with a 
              dean or a boss.  Have people ever tried 
              to break into the system to, say, change a grade?Very few. We see more concerted attacks on any system that’s 
              running certain kinds of databases, and there people are clearly 
              trying to steal identities. To combat such attacks, a new set of 
              rules will go into effect in January for machines with sensitive 
              data.
 Where on campus is there 
              wireless access?Most public places have wireless access—all the Library public 
              spaces, Bartlett, Ida Noyes. The plan is to have all major public 
              spaces done by next year and then gradually do all the academic 
              buildings internally. Otherwise people will run their own devices, 
              and if they don’t set them up carefully anyone can use our 
              network.
 What is the University’s 
              policy for downloading music and movies?Whether one likes the law or not, it’s illegal even to possess 
              an unlicensed copy of a copyrighted work. Most students who download 
              a piece of music rarely get found. It’s when people make their 
              collections available to others—as peer-to-peer services do—that 
              we have a problem because if they’re distributed over our 
              network, then under the law we’re liable, unless we instantly 
              make it stop whenever we get a complaint. So when we get a DMCA 
              complaint—Digital Millennium Copyright Act—we act on 
              it immediately, removing the offending computer from the network 
              and initiating disciplinary proceedings or guiding repairs as appropriate.
 
 |