Public Computing Roundtable December 1, 2004. Lab Management Tools Imaging Imaging Securing Securing License Compliance License Compliance Remote Management.

Slides:



Advertisements
Similar presentations
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Advertisements

Objectives Overview Define an operating system
Maintaining a Stable Windows Environment Mark Padgett & Bret Madsen.
Information and Technology Services Customer Services.
Imaging Software: Norton Ghost Presented by: Paul Tsan Carlos Vasquez Steven Sanchez.
Princeton PC Users Group Hard Drive Disaster! By Paul Kurivchack March 14, 2005.
Nick Brown Instructional Technology Computer Specialist Information Technology Assistance Center Kansas State University.
Faronic’s DeepFreeze. What is it? DeepFreeze is an application that “freezes” the hard drive of a system. Once a system is frozen, any change to data.
COMPUTER SYSTEM COMPONENTS ACTIVITY
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
I Information Systems Technology Ross Malaga 3 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 3-1 SOFTWARE.
Macintosh Configuration Management Will Jorgensen 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Windows Tutorial 9 Maintaining Hardware and Software
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Sr. Manager Global Business Solutions Carlos Capó Master Macs in Business Easily integrate Macs into a Microsoft Shop.
Operating System By :- Anupam Gupta. 5 types of Operating System 0 MACINTOSH 0 I O S 7 0 WINDOWS 0 LINUX 0 UNIX.
LabMan Conference: June 8 & 9, 2010 Lauren Nicholas, Moravian College
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
Client Management. Introduction In a typical organization there are a lot of client machines used for day to day operations Client management is a necessary.
FNAL Configuration Management Jack Schmidt Cyber Security Workshop May th 2006.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Symantec Ghost Effective Disk Cloning Software. What is Ghost? “Ghost is a software product from Symantec that can clone (copy) the entire contents of.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents  Section A: Operating System Basics.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
B.A. (Mahayana Studies) Introduction to Computer Science November March Software What is software? What are the main types of software?
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 DAY FOUR.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
LO2 Understand the key components used in networking
Deep Freeze 6.5 Overview. Introduction to Deep Freeze Sales Engineer Bob Carpenter.
File Recovery and Forensics
 2002 Prentice Hall Chapter 4 Software Basics: The Ghost in the Machine.
Software 1. Software is divided into parts System software Operating system Utility software Application software 2.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Explain the purpose of an operating system
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
Campus Computing Resources for Researchers Rutgers University Office of Information Technology Presented By:Joe Sanders University Director, OIT Rutgers.
Chapter 5: Defining the Role of the Operating System
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
1 The Five Parts of an Information System
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
Jonathan Loving Fermi Lab Computing Division
Computer Systems Mrs. Butera. Computer Systems Hardware Software.
Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution.
UNIX  Portable (common to many computer architectures), multitasking, multi-user operating system  Introduced by Bell labs in mid-1960’s  Thus, much.
Allexa Mitchels IBCC Sets of instructions which hardware follows in order to perform tasks. Software.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
OPERATING SYSTEMS. An operating system (OS) is an interface between hardware and user which is responsible for the management and coordination of activities.
Hands-On Virtual Computing
IT Support Packs. CUSTOMER SEGMENT IT Service Desk teams who provide internal and external support to traditional systems including desktops, laptops.
Introduction to the Mac Introduction to the Mac Using Apple’s OS X with Jim Mollé Learn iT! Computer Software Training.
James Cook University John O’Reilly.  IT Support Officer  Desktop Support  At the sharp end of the deployment My Role.
2: Operating Systems Networking for Home & Small Business.
LO2 Understand the key components used in networking.
Mac Fermilab Name: Ben Segbawu Fermi National Accelerator Laboratory Computer Services Specialist May
© 2010 VMware Inc. All rights reserved Why Virtualize? Beng-Hong Lim, VMware, Inc.
PC Manager Meeting May 25, Today Updates Next Meeting Security Meeting Maker Update This Month: What SMS Can Do For You – Cele Bruce.
Disk Imaging Who, What, When, Where, Why (and maybe How) February 9th, 2010 Manitoba UNIX Users Group Adam Thompson -
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Different Operating Systems
ITC 4 ESO 3rd TERM Operating Systems YEAR
Effective Disk Cloning Software
برامج النظام System Software
System And Application Software
Different Operating Systems
IT Management, Simplified
Division of Engineering Computing Services
Presentation transcript:

Public Computing Roundtable December 1, 2004

Lab Management Tools Imaging Imaging Securing Securing License Compliance License Compliance Remote Management Remote Management Laptops? Laptops? Other? Other?

Windows Systems – CIT Labs Imaging Imaging Ghost 8 console - Symantec Ghost 8 console - Symantec ~$3.20 per system ~$3.20 per system Deploy to new / recover dead machines Deploy to new / recover dead machines Send software to systems with AI Packages Send software to systems with AI Packages CD-R, DVD-R, USB Drives, Network CD-R, DVD-R, USB Drives, Network System specific customizations possible System specific customizations possible

Windows Systems – CIT Labs Securing Securing DeepFreeze Enterprise – Faronics DeepFreeze Enterprise – Faronics ~$6.00 / System (Cornell volume) ~$6.00 / System (Cornell volume) All changes un-done by reboot All changes un-done by reboot PC-Rdist – PC-Rdist – Now Free, No longer in development Now Free, No longer in development Promises to be open source Promises to be open source Manages unfrozen partition Manages unfrozen partition

Windows Systems – CIT Labs License Compliance License Compliance KeyServer K2 – Sassafras KeyServer K2 – Sassafras Manages Keyed or Unkeyed applications Manages Keyed or Unkeyed applications

Windows Systems – CIT Labs Remote Management Remote Management Remote Desktop Connection Remote Desktop Connection DeepFreeze Console DeepFreeze Console Ghost 8 Console Ghost 8 Console

Windows Systems – CIT Labs Other topics / Questions? Other topics / Questions?

Macintosh Systems – CIT Labs Imaging Imaging Carbon Copy Cloner ( Carbon Copy Cloner ( Freeware Freeware Maintains Unix permissions and ownerships Maintains Unix permissions and ownerships Operates via Local connections only (will not go over a network) Operates via Local connections only (will not go over a network) **“CCC will not backup directly to CDs or DVD-R discs, though you can backup to an appropriately sized disk image, then burn the image to disc with toast or disk copy.”

Macintosh Systems – CIT Labs Securing Securing DriveShield – Centurion Technologies Inc. DriveShield – Centurion Technologies Inc. ~$18.94 / System ~$18.94 / System All changes un-done by reboot All changes un-done by reboot DeepFreeze for Mac OS X DeepFreeze for Mac OS X ~11.50 or less /system (Cornell Volume?) ~11.50 or less /system (Cornell Volume?)

Macintosh Systems – CIT Labs License Compliance License Compliance KeyServer K2 – Sassafras KeyServer K2 – Sassafras Manages Keyed or Unkeyed applications Manages Keyed or Unkeyed applications

Macintosh Systems – CIT Labs Remote Management Remote Management Apple Remote Desktop 2 - Currently Testing Apple Remote Desktop 2 - Currently Testing Creates/Installs and Distributes system software Creates/Installs and Distributes system software Offers real-time help to users Offers real-time help to users Generates Software and Hardware Reports on the fly. Generates Software and Hardware Reports on the fly.

Macintosh Systems – CIT Labs Other topics / Questions? Other topics / Questions?

Unix/Linux Systems Imaging Imaging Securing Securing License Compliance License Compliance Remote Management Remote Management Other topics / Questions? Other topics / Questions?

Other Topics Lab Management Cornell: Lab Management Cornell: June 21, 22, 2005 June 21, 22, 2005 Web Site: Web Site: $170 Registration Fee $170 Registration Fee $58/night residence hall room rate $58/night residence hall room rate Subscribe to for announcements and information Subscribe to for announcements and information