LPISD Technology Update 2011. Technology Work Orders When should you submit a Technology Work Order? Moving technology equipment Issues with the LPISD.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Basics Creating an account What do you need An name for yourself. An address looks like this:
FLCC Instructional Computing Student Orientation Rick Evans, Director, Institutional Computing Services Kay Carlisi, Coordinator, Academic Computing Services.
LISD. Workorder System Web Based Enables reporting to track trends Can be seen by all LISD tech personnel Knowledge base available Two way.
Orgainizing Your Digital Documents. What is a File Structure Organizing your files Server space .
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Using SD K12 SharePoint®.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
New Hire Technology Orientation. Introductions DeAnne Hainlen- Coordinator for Instructional Technology Cindy Tucker- BES, EMES, EES, GFES, LPES, PES,
Network Login Username Login not case sensitive, but password is Password changes Keeps history of last 3 passwords Must be alpha-numeric & or use upper/lowercase.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Johnson Logistics Solutions Office of Systems and Information Technology.
Perimeter Church Perimeter Network Introduction 2005.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Computer Skills By Ian Cole Lecturer in C&IT (Communications and Information Technology) University of York Department of Health Sciences Presentation.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Back Up and Recovery Sue Kayton February 2013.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Using Technology in the Classroom
Online Job Applications. Course Outline Review resources & information needed to complete an online application Practice filling out a job application.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
NEW TEACHER ORIENTATION Productivity with GISD Technology Resources Instructional Technology.
Protecting ICT Systems
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Networking Overview Your OUNet ID ("4 plus 4") OUNet Password Changing Your OUNet Password Your Official OU Forwarding Your Mail Getting Help Overview.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
The SAU Website Workshop. Using the site Website Management The Campus Directory Form Manager Other available resources.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
+ Navigating Campus Technology Presented by Stephanie Jasmin.
Welcome New Teachers Presenters: Mark Dunk Michelle Leggett Debbie Sitler Tangila Webb.
Staying Safe Online Keep your Information Secure.
Welcome to La Porte ISD New Teacher Technology Academy.
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
NMU Voic Welcome to. This presentation will walk you through the setup and use of the NMU Voic system. Follow the step by step instructions.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
A secure internet site that allows posts access to their Legion and SAL membership.
Introduction to eChalk For Students. What is eChalk? eChalk’s unique online learning environment provides your school with its own electronic “town square”
WA SECURES Training Spring Welcome As a volunteer of the Department of Health Emergency Operations Center or RSS Task Force you must be prepared.
Protecting Students on the School Computer Network Enfield High School.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
INTERNET SAFETY FOR KIDS
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
New Teacher Orientation Denville School District Technology Department August 14, 2013.
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
SCC Student Technology Access Student Login Guide Log on a SCC College Computer Press Ctrl-Alt-Delete keys on the keyboard to access network login Enter.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Digital Skills Award Day 1 – Introduction to your Programme of Learning.
MSB Network Orientation. Basics Welcome from the MSB Tech Center Tech Center Staff – 13 Permanent – 30+ Students Serve MSB Only – 3200 Users.
Windows Vista Configuration MCTS : Productivity Applications.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Third Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Office 365 Help Desk Troubleshooting Guide
New Employee IT Orientation
Jim Barton Librarian Glenside Public Library District
Back Up and Recovery Sue Kayton October 2015.
Keep It Safe! Secure Your Secrets
Epic Introduction Basics
Who We Are Pitt Information Technology provides resources at the University for students, faculty, and staff Technology Support Computer Accounts .
Presentation transcript:

LPISD Technology Update 2011

Technology Work Orders When should you submit a Technology Work Order? Moving technology equipment Issues with the LPISD technology system Requests for training

Technology Work Orders District Technology System – LPISD computer systems and networks or any configuration of hardware and software. This includes but is not limited to: Telephones, cell phones, voic facilities accounts Fax machines Servers Computer hardware and peripherals Software Digitized information (stored text, data files, , images, audio files) Internally accessed databases or tools Externally accessed databases New technologies as they become available

Network Drives H: Drive Individual Quota Staff = 1G Students = 100MBs Y: Drive Campus Shared L: Drive District Shared Drive quotas will be increased.

Laptops for Professionals

LPISD Web Site Public site

LPISD Web Site lphome.lpisd.orglphome.lpisd.org Staff intranet site

Storage DELETED folder 7 days SENT folder 90 days INBOX will age also.

Storage Online Archive: Auto Archive – older than 6 months Accessible through Web Mail Disaster recovery – housed locally

Archiving All mail is automatically archived in the Barracuda system. To retrieve in district only Archivingwww.lpisd.org Use district login Searches: Basic and Advanced

New password criteria. Accounts that share the district password: Eduphoria eSchool Web Mail archives Work Order system Tips for creating a strong password

Passwords provide the first line of defense against unauthorized access to your computer. Tips for creating a strong password The stronger your password, the more protected your computer will be from hackers and malicious software.

A strong password: Is at least eight characters long. Does not contain your user name, real name, or company name. Does not contain a complete word. Is significantly different from previous passwords. What makes a password strong (or weak)?

What makes a password strong (or weak)? Uppercase lettersA, B, C Lowercase lettersa, b, c Numbers0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols found on the keyboard (all keyboard characters not defined as letters or numerals) ` ~ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ',. ? / Contains at least 8 characters. Unique. Contains 3 of the following 4 categories:

What makes a password strong (or weak)? Hello2U! H3ll02U! MisterMagoo M1st3rm^g00

Create an acronym from an easy-to-remember piece of information. My son's birthday is 12 December, 2004 Msbi12/Dec,4 Substitute numbers, symbols, and misspellings for letters or words. My son's birthday is 12 December, 2004 i$un'sBrthd8iz12124 Relate your password to a favorite hobby or sport. I love to play badminton Remember your strong password:

While it is not recommended, if you feel you must write down your password in order to remember it, make sure you don't label it as your password, and keep it in a safe place.

Classroom Management Tools: Roster Manager

Classroom Management Tools: Vision Individual and Group views of student computers Remote Control of student computers Remote Control of application accessibility Remote Control of Internet site accessibility Remote communication with students Share student work with group

Classroom Management Tools: Vision

Eduphoria & AUG Update profile in Eduphoria Portfolio Workshops & Online Courses AUG Student Assessment Data PDAS

LPISD Instructional Technology Department SchoolCenter

LPISD Instructional Technology Department Have a Great Year!