NZ school ditches Microsoft and goes totally open source
- 25 January, 2010 06:03
At Linux.conf.au 2010 in Wellington, deputy principal Mark Osborne and staff from Open Systems Specialists demonstrate Albany Senior High School's firewall system, using pupil Shane to represent a packet.
A New Zealand high school running entirely on open source software has slashed its server requirements by a factor of almost 50, despite a government deal mandating the use of Microsoft software in all schools.
Albany Senior High School in the northern suburbs of Auckland has been running an entirely open source infrastructure since it opened in 2009. The 230-pupil school was set up to follow open learning principles, offering large "learning commons" areas where multiple classes interact rather than conventional classrooms and setting aside one day each week for pupils to work on self-driven research projects.
Albany SHS' unorthodox approach is also reflected in its IT infrastructure. Deputy principal Mark Osborne was determined to use open source software throughout the school, even though planning for that process began less than two months before the school opened.
Ditching Microsoft is highly unusual within the NZ education sector, as a long-standing contract with the national government means the software giant is paid for technology for the school even though none has been used. Microsoft's dominance also means that most planning documents for education presume an Microsoft infrastructure.
"The education space is Microsoft-focused and heavily subsidised by government," said Patrick Brennan, lead engineer from Open Systems Specialists, which led the IT project at the school, during a presentation at Linux.conf.au in Wellington. "Every reference plan is based on Microsoft technology."
The tight time frame -- two weeks for evaluation, one week for design and two weeks for implementation -- didn't create too much disruption, Brennan said. "Although everything wasn't as polished as it could have been, when the school opened all of the core functionality was there. And it's been running for a year with no significant intervention. It hasn't really been touched in any fundamental way since then."
The implementation uses Ubuntu on the desktop and Mandriva for four key servers (one firewall, one storage and two KVM hypervisors). Mandriva was selected because of the ease of using Mandriva Directory Server to manage the school's LDAP directory, but Brennan said either desktop or server OS could easily be replaced.
The network is not restricted solely to Linux desktops. "We wanted students to be able to bring devices in, whatever they were, and connect them to the network and expect them to work and use it as a learning tool," Brennan said. Hardware ranging from PSPs to Macs has been connected, with a "hostile network" approach used to ensure security. NFSv4 is used to connect users into the system, allowing them to remotely mount into their home directory on the server via Kerberos.
Applications used within the school include OpenOffice, Google Docs, Moodle for managing education content, and Mahara for student portfolios. The Koha software used by the school library was also customised to integrate more closely with the LDAP security system and to allow book recommendations. While Koha was paid to make those changes, the resulting code will be freely available to all New Zealand schools -- an approach Brennan contrasted with Windows software, where modifications are typically charged separately for each school.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.
2013 Global Information Security Survey: Initial findings
The results of PwC’s annual Global Information Security Survey indicate that companies are confident in their efforts to secure systems, information, and privacy. Strategies and personnel are in place, they say, and processes and technology are humming along. The number of incidents reported seems manageable. Read more.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.