What you need to know.  Each TDI vessel is equipped with satellite communications that supplies a LOW BANDWIDTH internet connection. Even though the.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
Basic Troubleshooting Uh-oh … Something’s wrong with my computer.
Technology Gone Wrong. A little background… Your computer uses the operating system to “talk” to software applications. The operating system is the first.
Going Places Safely Essential Question:
Explain the social impacts of the use of IT.. Social Social networking has made the world Bigger and easier to communicate with others. It allows friends,
Using internet and cell phones safely
Acceptable Use By: Keith R. Watson CoC Information Security Manager.
E-Safety Support e-Safety Presentation D Flynn and L Findon.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Safety Rules in the Computer Lab.  Do not run inside the computer lab.
Google Account Basics: Getting Started with free Google applications.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
Awareness raising session for Parents and Carers.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Tang Hall Primary School E - Safety Support for parents.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Social impacts of the use of it By: Mohamed Abdalla.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
ELECTRONIC COMMUNICATIOMN. MEAANING OF TELECOMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information.
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
Do You Have a Web Site?. Everyone does, don’t they?
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences.
Visiting Angels Presenter: Social Angel Facebook.com/VisitingAngelsCorporate Social Care.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Shima Begum B44034 Task1 P6. Local community IT has an huge impact on local communities as they can keep in touch with friends, family, workers, employees.
. Here is me sending an with an attachment, you click onto the paper clip icon in order to send the attachment.
ACN Product Overview Broadband Australia Information correct as at October 1, 2015.
INTERNET SAFETY FOR KIDS
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
How to Create a Successful Internet Video Campaign.
Parenting 2.0 Raising Responsible Digital Citizens.
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
ACN Product Overview nbn™ Australia Information correct as at October 1, 2015.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Different computer networks. Star network The star network is local area network mostly used at home, school and offices. Star network has 5 or 6 workstations.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
ACN Product Overview Broadband Australia Information correct as at 17 February 2016.
E-Safety Parent Talk Helping to keep your children safe online.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
E-safety Parent Workshop Helping to keep your children safe online.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
For more information on Rouge, visit:
Network and hardware revision
How to stay safe using the internet & App’s
How to stay safe using the internet and app’s?
How To Fix Video Playback Errors Of HBO GO in Roku Streaming Media Player? For More Details Visit
Introduction to Networking
The Troubleshooting theory
Presentation transcript:

What you need to know

 Each TDI vessel is equipped with satellite communications that supplies a LOW BANDWIDTH internet connection. Even though the Vendors say it is “High Bandwidth”, the rules have changed with technology. Not a Typical Home Network

 Marine Bandwidth is much faster than it has ever been. Giving speeds of up to 2 to 4 MBits/second.  However, land based access has outpaced its growth, with speeds of 50 to 200 Mbits/second. Not a Typical Home Network

 Access speeds to and from the internet on the vessel is 50 to 200 times slower than your usual land based connection.  You must adjust your expectations accordingly. Not a Typical Home Network

 Access speeds to and from the internet on the vessel is 50 to 200 times slower than your usual land based connection.  You must adjust your expectations accordingly, and your devices accordingly. Not a Typical Home Network

 Internet service is primarily provided for business use.  Daily reports  Vessel / Office communications  Supplies requests  Communications with Port Engineer  For the Client to communicate with home office regarding a project Primarily for Business Needs

 However, we understand how isolated life at sea, can be.  Limited Personal use is allowed, as long as:  It doesn’t interfere with the business needs.  It doesn’t violate our service agreements with our vendors. Primarily for Business Needs

 Acceptable personal use would be  Online banking  Paying bills  Checking/ sending personal  Checking Facebook messages, personal , or otherwise communicating with friends and family, and reading news feeds. Limited Personal Use

 Downloading or streaming data from YouTube, Pandora, Facetime, Skype, voice chats with video, online gaming, Netflix or any similar source will  slow response times to a crawl and  potentially trigger a vendor’s automatic “throttle” switch for all internet access, making it too slow to be useful. Absolutely NOT allowed

 Since bandwidth is limited, it must be constantly monitored and adjusted to maximize efficiency and ensure systems are working properly.  We also monitor to determine that these rules are complied with. Usage Is Monitored

 Secure sites such as your banking sites are still secure.  We can’t see your information.  We simply count bytes used, by which machines, and number of sites visited. Usage Is Monitored

 From this we can determine what type of internet activity is occurring for a given machine.  For example: Virus infected computers may try to access up to 10,000 sites in an hour. Usually using up considerable bandwidth.  This can slow response times for everyone to a crawl. Usage Is Monitored

 We may not be able to know why large amounts of bandwidth are consumed.  However, devices that are detected streaming data or “hogging the bandwidth” may be blocked or throttled at any time. Usage Is Monitored

 The ship’s network is not like a “Home” network. It is a complex configuration of multiple devices constantly working together.  Thus far, 95% of our internet failures have been due to someone trying to “fix” something on their own. DO NOT Modify the Network

 A change as simple cleaning up wires (I.e. rewiring), adding or moving a device from one location to another can easily cause system failures.  If you have a need for a change in the network, contact the IT department. That’s why we are here. We can help you accomplish your goals without breaking the system. DO NOT Modify the Network

 We want you to use the internet. We just don’t want you to knowingly or unknowingly prevent everyone from using the internet.  If you are having trouble accessing the internet, downloading or sending project documents, contact the IT department to get them resolved. If You Need Help

 Keep your devices clean of viruses frequently with an up to date anti-virus program.  Disable automatic usage (updates and backups – they use LOTS of data without your knowledge). You can restart these when you get back to shore. So, Some Simple Rules

 Don’t visit websites with High Bandwidth Content (videos on the side bar, video ads, etc.)  For news go to low bandwidth sites like. Mobile.reuters.com.  Turn your devices off or disconnect when you are not using them. Don’t know how? Call us and we can help. So, Some Simple Rules

TDI-Brooks IT Department Phone: (main office # and ask for IT) Thanks!