CAH Technology Office Technology Office Technology Support Web, Programming and Communication Network and Security Support Research Provides hardware.

Slides:



Advertisements
Similar presentations
Prepared by the Virginia Department of Criminal Justice Services PTCC …the future of case management DCJS presents:
Advertisements

SCCC Technology & Information Systems. Technology Support Academic Academic –Campus Educational Technology Units (ETUs) –Teaching & Learning Centers –Distance.
S C S U Technology Update FY06. Technology for Teaching and Learning.
Technology Plan EDLD 5362 Casey Smith.
Information and Technology Services Customer Services.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Trend Micro Round Table May 19, Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.
ImageNow User’s Group October 22, User’s Group Goals  Communicate & Share Ideas with Others Discuss What Works / Best Practices Discuss Common.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
1 Module 2 Installing Windows NT. 2  Overview Preparing for Installation Installing Windows NT Performing a Server-based Installation Troubleshooting.
Using Technology in the Classroom
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Grants.gov – What to Expect Presented by the Office for Research Cindy Hope, Director Office for Sponsored Programs.
Learning with a Purpose: Learning Management Systems Patti Holub, Director District Initiatives and Special Projects Miguel Guhlin, Director Instructional.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
Time Matters ® A Practice Management, Client Relationship Management, and Document Management System Presented by Alana Seibert.
IT Priorities and Concerns Update December 19, 2006.
Technology Basics Fall Help Desk Method 1 Call the Help Desk at (718) When you call you will get the following menu: Help Desk Menu Touch.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
Cornell 18,000 students 2,000 faculty Twelve colleges on Ithaca campus Four are state colleges, eight are private (including grad school and school of.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Configuration Management T3 Webinar Feb 21, 2008 Chuck Larsen ITS Program Coordinator Oregon Department of Transportation.
Securing Microsoft® Exchange Server 2010
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Oracle Open World 2014 Integrating PeopleSoft for Seamless IT Service Delivery: Tips from UCF 1 Robert Yanckello, Chief Technology Officer University of.
Technology Support for Research Projects. CEHD IT Contacts Stewart Hutchins – HLKN IT Tony Reiter – Computer Support (non-HLKN) Ben Smith – Instructional.
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
SBSTECH SBSTech (SBS Technical Services)SBSTech (SBS Technical Services) provides innovative, reliable and accessible technology.
Michael Gelinas Fall 2014 Colorado Measures of Academic Success (CMAS) STC High School Administration Training.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
A secure internet site that allows posts access to their Legion and SAL membership.
Local Approval of Stand-Alone Credit Courses Training Session provided by the California Community Colleges Chancellor’s Office and System Advisory Committee.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
Information Technology Practical information for new faculty about information technology at Missouri S&T it.mst.edu Christopher Dew Director, IT Operations.
Computer Labs Orientation September 2003 Prepared by Computer Services.
IIPS Fall Conference Session III Network Administrators Network Management (:30)
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Deploying Software with Group Policy Chapter Twelve.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
A New Resource! Higher Education and Assistive Technology (HEAT)
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Staff Assessment Technology Services Department Palmyra Area School District.
Information Technology Support Services Focusing on our customers 1.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
◦ Services to Employees  Managed Desktop Computer  Phone, Network, Internet & Wireless Access  & Portal Services  Android and Apple Phone App.
Information Technology (IT) Department
TYPES OF SERVER. TYPES OF SERVER What is a server.
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Teaching Effectively-- snaptutorial.com
ABCD ICT Services and Projects a ABC
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
PLANNING A SECURE BASELINE INSTALLATION
Preparing for the Windows 8.1 MCSA
Presentation transcript:

CAH Technology Office Technology Office Technology Support Web, Programming and Communication Network and Security Support Research Provides hardware and software support and troubleshooting Provides loaner hardware Provides hardware setup and workstation file transfers Provides server maintenance and configuration Provides user accounts and share access levels Provides security implementation Provides Web site design and support Promotes news and events Designs databases Provides Web forms and Web application programming Provides consultation on research initiatives Provides customized software and configurations Supports the Special Projects Lab

CAH Technology Office Web, Programming & Communication o Matthew Dunn †, o Bryce Jackson †, o Lin Jackson, Network & Security, o John Turner †, Research, o Bryce Jackson †, o John Turner †, Technology Support 407 ‐ 823 ‐ 2719 o John Lazar †, Supervisor 407 ‐ 823 ‐ 0993 o Joseph LaLiberte † o Christian Hernandez o JT Razdai o Jacob Skinner o Kristen Hugo o Steven Thomas o Tulsi Parikh † Full-time

Policy Implementation Current progress report o Departments are partially on the domain o IT Liaisons and Content Managers are assigned o Procedures are being established Next steps o Setup meetings with departments to discuss scheduling and process o Work out isolated issues o Reexamine evolving policy Examples: Center for Distributed Learning, Regional Campuses, Reexamination Cycle

Policy Benefits Two-way centralized point of contact for staff/faculty and the Technology Office o IT Liaisons and Content Managers Quality assurance of hardware and software purchases Secure network file shares Protection of individual workstations Consistency of service, support and communication

Licensing All software that runs on university machines must have valid licenses Three types of licensing: o Purchased by Dean’s Office Maintained by CAH Technology Support Example: Symantec Anti-Virus o Purchased by Dean's Office in conjunction with the department Maintained by CAH Technology Support Example: Microsoft Office o Purchased and maintained by the department Examples: Adobe Photoshop, Adobe Acrobat. Adobe and other 3rd party licensed products must be purchased and records maintained by the department.

Licensing (cont.) Legacy Software If a computer is rebuilt, and there is no documented license associated with that computer or user, Technology Support will re-install that software on the rebuild if the following criteria are met: o Technology Support has determined that the software was previously installed on the computer o It serves a valid work-related purpose o We have access to the software and serial key to activate the software. Adobe and other 3rd party licensed products must be purchased and records maintained by the department o Technology Support will not upgrade any version of any program if we cannot verify a purchased license o More information on software licensing is available on page 11 of the Technology Policy

Purchasing All computer related hardware, which will be supported by Technology Support, must fall under one of the following scenarios: It is a supported device found on page 12 of the CAH Technology Policy It is a legacy device that has been supported by Technology Support prior to the enactment of the policy It is approved by the CAH Technology Office It doesn’t exceed the supported hardware limit per user o One desktop workstation and one laptop

Work Requests All work order requests must be initiated by: o Calling the Technology Support Help Desk at o to o Non-emergency work requests should be submitted by for documentation purposes Who can submit a work order to the Technology Support Help Desk? o Anyone... all faculty and staff that are full or part-time can make a request -- except for multi-user machines, work orders for multi-user machines must be submitted by the IT Liaison o All requests must come from a valid ucf.edu address

Work Requests (cont.) When not immediately available, technicians will schedule an appointment Issues may be redirected to the appropriate units Example: Office of Instructional Resources, Division of Computer Services and Telecommunications, Network and Security Support, or Web, Programming and Communication List of buildings, classrooms and labs supported by Technology Support is found on page 13 of the Technology Policy.

Network and Security Support What is Active Directory? o What does this mean for me? o Benefits/Limitations File Server o Improved access and security o Limitations Security o Anti-Virus o University security guidelines

Web Requests The CAH Web Policy is available online at technology.cah.ucf.edu Updates should be submitted via by department’s Content Manager All Web requests must be sent to Content must follow university brand standards o UCF Style Guide o UCF Graphic Standards o Associated Press Stylebook Help the Web, Programming and Communication group promote the college and its departments by submitting news and events to your Content Manager

Questions? – and Thanks!