Hints and Tips for New Systems Administrators or What to panic about…… Catherine Jones Systems Librarian.

Slides:



Advertisements
Similar presentations
Managing a Successful Upgrade Jonathan Field. Or The Ten Upgrade Commandments.
Advertisements

Disaster Recovery The People Dimension. Today’s Agenda Why bother with any Disaster Recovery/Business Continuity Planning? Importance of the People Factor.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Computer Basics Hit List of Items to Talk About ● What and when to use left, right, middle, double and triple click? What and when to use left, right,
 Familiarize yourself with the Internet  Utilize site/content blocking software and/or parental controls  Randomly check your child’s and Internet.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
An Introduction to System Administration Chapter 1.
Operating System Customization
MS Planner. Inside Cover Fill it out completely Return MS Planners to owner Return MS Planners to SWAT teacher Return MS Planners to MS Office.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
A Guide to Unicorn Upgrades Jonathan Field EUUG – Amsterdam 2nd September 2004.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Using the Reports module A beginner’s guide Catherine Jones Library Systems Development Manager CCLRC.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Week:#14 Windows Recovery
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Chapter 1 Introduction to Databases
Disaster DATA Recovery & Your System Personal Computer Catherine Agnew CEDu Oconomowoc.
Network security policy: best practices
System Implementation
IT CAREERS Prepared by: Careene McCallum-Rodney. Computer Technician  Computer technicians:  install,  repair,  maintain,  and analyze many different.
November 2009 Network Disaster Recovery October 2014.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
What can a good teacher do with a computer? (or 2 or 3)
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Abstraction IS 101Y/CMSC 101 Computational Thinking and Design Tuesday, September 17, 2013 Carolyn Seaman University of Maryland, Baltimore County.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
TECHNICAL WRITING October 31 st, With a partner Write simple “step-by-step” instructions for sending a Kakao Talk message with a phone.
Disaster DATA Recovery & Your System School/Network Computers Catherine Agnew CEDu Oconomowoc.
A SIR web based leave/absence management system. By Dave Doulton University of Southampton.
End HomeWelcome! The Software Development Process.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Installing SIGNZ on a stand- alone machine. These slides will guide you through the installation of the SIGNZ ‘server’ and ‘client’ components on one machine.
LORETTA DUNCAN-BRANTLEY Associate Communications Manager Microsoft Corporation Discovering Your Path Through the Maze of Life.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Information Systems Security Operational Control for Information Security.
IT Technical Support 1. Introduction Technical support personnel offer support for individual and organizations in a variety of ways. This module focuses.
Welcome! First, we need to Perform an Audio Check: 1. Raise your hand to speak 2. Press Talk or Hold CTRL 3. Check Options > Filters > click Audio Gain.
DIY Site Review + Summer Cleaning Keeping Your System Running Smoothly Rachel & Kevin.
Win202 Database Administration. Introduction Welcome to OpenEdge. Type 2 Storage Areas. One of the big selling points for the OpenEdge platform and Win202.
 To help you understand and describe a range of methods for installing a new computer-based system; › Parallel › Phased › Direct › Pilot  Also, to help.
Unit 2 (task 28) In this PowerPoint I will tell you about 7 important IT job roles and if a candidate might want one what he would have to do to get one.
C&I 488: Libraries & Technology Summer, 2009 Library Automation Project: COMPanion’s Alexandria by Leslie McPherson Lanaie Morgan Kyle Parker.
What is a port The Ports Collection is essentially a set of Makefiles, patches, and description files placed in /usr/ports. The port includes instructions.
P3 - prepare a computer for installation/upgrade By Ridjauhn Ryan.
IT SERVICE MANAGEMENT (ITSM). ITIL\ITSM OVERVIEW  ITIL Framework.
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Thepul Ginige Lecture-7 Implementation of Information System Thepul Ginige.
Introduction to Computer Networks Introduction to Computer Networks.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
Risk and Precautions needed when installing hardware - P2
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Upgrading to Windows 10 Mike Farquhar January 2016 Thornbury U3A Computer Club.
The Troubleshooting Process. Hardware Maintenance Make sure that the hardware is operating properly.  Check the condition of parts.  Repair or replace.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
ADMINISTRATIVE STRUCTURE OF A COMPUTER CENTRE. The administrative structure is being organized in such a way that a skilled professional personnel is.
Hosting an online meeting
Configuration Management and Prince2
SharePoint Site Admin Training
Completing the tasks for A452 with….
Lecture-5 Implementation of Information System Part - I Thepul Ginige
The Troubleshooting theory
The Survival Plan.
This is a template for a presentation that you can use to introduce your team to Harvest. You can customize the content of the slides. You’ll want to pay.
Presentation transcript:

Hints and Tips for New Systems Administrators or What to panic about…… Catherine Jones Systems Librarian

Catherine Jones Library & Information Service Contents Introduction My approach to Systems Admin Back-ups Hardware problems Software problems Upgrades Users Conclusions

Catherine Jones Library & Information Service Introduction CCLRC: scientific research establishment on three sites (Cheshire, Hampshire & Oxfordshire) Unicorn users since 1995 Two Libraries (physically & in Unicorn) I have a Computing background & have worked in the CCLRC Library since 1994

Catherine Jones Library & Information Service My approach to systems admin Know your system and why people use it the way they do Document everything: –Original set-up –Changes to policies –What reports run when and what they do –How you’ve set-up wizards –When you contact Sirsi – what about & what the result was

Catherine Jones Library & Information Service Holding codes

Catherine Jones Library & Information Service Complicated reports

Catherine Jones Library & Information Service Wizards

Catherine Jones Library & Information Service Report schedules

Catherine Jones Library & Information Service My approach to systems admin Ensure everyone knows who is authorised to instruct you to make policy changes Have a clear Change Control process –Written request for change –Check for ramifications –Make the change –Document the change Use the Help facility (only techies do this!)

Catherine Jones Library & Information Service My approach to support Endeavour to build & maintain a good relationship with everyone who supports you; especially the Sirsi helpdesk The more friendly & professional you are the more likely they are to go the extra mile

Catherine Jones Library & Information Service Back-ups Should be the biggest part of System Librarian’s nightmares! Ensure that you back-up with appropriate frequency for your site (at least once a week) Ensure that the back-ups work Consider trying to restore from back-up They are so important when things go wrong.

Catherine Jones Library & Information Service Hardware problems Ensure you use the Unicorn tools to monitor space – things stop working if disks are full Keep on top of how old your equipment is and plan for replacements

Catherine Jones Library & Information Service Software problems Always attempt to duplicate problems you are about to report to Sirsi Always find out about the data being used Always keep a record of what you reported & what the result was Remember it may be the user rather than Unicorn

Catherine Jones Library & Information Service Example from my log-book

Catherine Jones Library & Information Service Upgrades Upgrades: one of the scariest times in my working life…….. Be prepared: read release notes, lists & manage user expectations Always back-up before & after upgrades on media that isn’t going to be reused in the normal back-up sequence If you have complicated policies run a listpol before you start Ensure rigorous testing before letting people continue with normal work

Catherine Jones Library & Information Service Upgrades – user expectations

Catherine Jones Library & Information Service Upgrades – plan upgrade

Catherine Jones Library & Information Service Upgrades – check for problems

Catherine Jones Library & Information Service Users – Library staff & real users Train your users to STOP and TELL YOU when there is something strange going on. Train them not to delete scheduled reports Be aware that they won’t read the documentation you write!

Catherine Jones Library & Information Service Conclusions The best Systems Librarians are paranoid about everything - particularly disasters! Upgrades fix old problems and create new ones Ensure that your knowledge is somewhere where other people can get to it Have your own back-up person Be very nice to your support team – you never know when you might need them………