Innovation and “pushing the envelope” is in my work DNA. So when there’s a chance to go speak to a group of innovators, you can count me in. I was thrilled to attend the Mobility and the Modern Web Conference at UCLA. I met people from more than 50 campuses across the country who talked about the latest and greatest in the mobile space. I gave a keynote about how the role of IT and makeup of our teams are changing and how we must evolve in order to have strategic value to the institutions. If we stand still, we become a utility! I usually can create some “shock value” with groups, but not with this crew . . . These were the “edge collaborators.” I learned from them, and most importantly, they came up and challenged me. I love that! They spoke of the challenges of being an innovator within the UC system today and how many barriers they experience in bringing their innovations into operation. This got me thinking (again) – how do we unleash the power and energy of 7000 IT professionals within the UC? Where’s the tipping point? Do you know?
Mobility and Modern Web

UC IT NewsDecember 8, 2014All ArticlesAccessibility, MMWCon, Tom Andriola, UC CIO, UC Los Angeles, UCLA
- EVENT: UC Davis AI Speaker Series: Introducing “Rocky” and “Aggie AI” – Monday, March 31
- NEWS: Spotlight on UC Security Leaders – Excerpt From the 2024 Cyber Risk Program Annual Report
- NEWS: UCI Health CTO Jim Davis on the Successful Cloud Migration of Patient Call Centers
- EVENT: AI & Third-Party Risk: Best Practices for Evaluating and Procuring AI Solutions – March 26 – REGISTER NOW
- ANNOUNCEMENT: Womxn in Tech (WIT) Women Rock IT Nominations Now Open
- NEWS: Driving Innovation: Cybersecurity Enhancements Across UC
- EVENT: UC AI Essentials Webinar Series – Innovation and Best Practices in AI – March 26-May 29 – REGISTER NOW
- NEWS: UC Womxn In Tech Fall Fireside Chat with Rachael Nava – Recap
- EVENT: Responsible Tech – Earth Hour Celebration & Discussion – March 20, 2025
- NEWS: 2024 Cyber Risk Program Annual Report: Showcasing the Innovators, Tools, and Strategies Securing UC