NRO Computing Group Report 2014 Shigeru Takahashi (NRO)

Slides:



Advertisements
Similar presentations
automated single login access to Novell storage resources
Advertisements

Students can gain access to and use programs offered on the computers in the Instructional Support labs via an online network.
Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Module 5: Configuring Access for Remote Clients and Networks.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Novell from Home Net Storage. Novell access via NetStorage 1-Web Interface Connect to your shared drive through your web browser Windows, Mac or Linux.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
HiberSnail Portable home directory with environment retrieval.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Computer, Internet, Web, and Basics C HAPTER 1.
JOIN A COMMUNITY OF 80,000 E-COMMERCE SITES WORLDWIDE.
Proxy servers By Akshit, Jay and Bhum Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
1 Computer Security: Protect your PC and Protect Yourself.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
A crash course in njit’s Afs
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
CERN’s Computer Security Challenge
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
CPTE 212 “Lab” Configuration 1/13/2015 John Beckett.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
St. Agnes School Technology for Teachers Acceptable Protocol.
Mail Attender for Exchange Technical Overview Presentation Introduction Sherpa Software Group Narrated by Thomas Hand Approximate Time 15 minutes.
Pronto4! User Training Web Version (July 2011) Prepared by: Data Centre Department Polytechnic of Namibia.
Vocabulary Software Terms Computer Science – Spring /20/2015Terms from
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Includes the following resources: Windows Azure 3 small compute instances 3GB of storage 250,000 storage transactions SQL Azure Two 1GB Web Edition.
VERY IMPORTANT NOT TO LOSE YOUR IMPORTANT DATA Backing Up Your iPad.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
Network Administration Internship By: Isaac Johnson II.
Memory & Storage Architecture Seoul National University PuTTY Usage Hyeon-gyu School of Computer Science and Engineering.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Technology Update TSAG Meeting 6/10/04. Old Voic System New Voic System installed on May 17 Remaining Issues:  Migrating calling trees  Some.
Introduction TO Network Administration
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Personal Security for Advanced Users Group 18 Andrew Trusty, Gaurav Mullick.
Panasonic UC Pro - UC Pro Web Service Basic setup -
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
COMM 3050 – Online Project Update. Project Roles  Organizer Responsible for creating Zoom account technical aspects and posting recorded meeting to S:
Fix "berkelium.dll is missing" error Now you can use DLL Suite to download berkelium.dll for free. For the detailed steps, please see How to download game.
CWA 3105 Presents At&t Connect for Windows pc This will be a quick set up guide for our new virtual meeting program We are the ELITE to have this trial.
Bitdefender Antivirus Support Australia
Find a Driver For HP 7150 Series Printer in Windows 7, 8 and XP.
Getting Connected to NGS while on the Road…
Physics Network Integration
Dynamic Domain Name System
Getting Started with Application Software
Computer, Internet, Web, and Basics
Using SSL – Secure Socket Layer
Printer Admin Print Job Manager
How to Set up Remote Access to Personal U: drive
Transferring Pictures – Part 2
Getting Connected to NGS while on the Road…
UCAS Reports 2007 From school and home.
Web Servers (IIS and Apache)
Go to the page Set here the address for receiving the s sent to the mailing lists to which you are subscribing.
Division of Engineering Computing Services
Chloe Riley | Research Commons Librarian |

Presentation transcript:

NRO Computing Group Report 2014 Shigeru Takahashi (NRO)

Member of NRO Computing Group S. Takahashi [Manager] Research Expert (duty 100 %) K. Miyazawa Senior Engineer J. Maekawa Research Expert (NRO:80% ALMA:20%) M. Oya Research Expert (100%) Y. Tatamitani Research Expert (100%) ( S. Takano ), ( T. Oshima ), (K. Kinugasa), (K. Matsui), (H. Nishitani), (E. Hatakeyama) July 23, NROUM2014

2013 Computer Replacement Drastic changes in the computer system – Mail address: nro.nao.ac.jp -> nao.ac.jp – Closing mailing-lists, etc… – Open use observations Computer accounts Observations Reduction Connection your PC 3 July 23, 2014 NROUM2014

Computer Accounts Your account will be sent after your proposal is accepted. You can’t specify project names. – Don’t make a proposal directory of your preference. Expire date – Jun. 30 ( ~ 1 month after the end of the season) 4 July 23, 2014 NROUM2014

Observations Obstable software – VPN connection from outside the NAOJ subnet. – Linux, Mac, Windows Observations and data – Linux system – Data download system (Web or scripts) Remote observation system – from MTK (Please use this system !) – from your Lab. (Test Phase) 5 July 23, 2014 NROUM2014

Reduction Temporal server (vc06x1) – Your processed data and pictures may be removed after 90 days. – Only original data are preserved. – Please save your data before you leave NRO Your PC Open-use of Data Analysis System (NAOJ) 6 July 23, 2014 NROUM2014

7 July 23, 2014 NROUM2014 Connection your PC Connect to 93 subnet (Yellow-Green cable) Open Web browser and register your PC You must install Anti-Virus software in your PC. Malware – 6 alerts (2013 Jul. – 2014 Jul.) – The 4 alerts were on Sat. and Sun. Much ado about HSC in Jan.-Feb. 2014

Summary Don’t make or rename project directories ! Save your data in your disk before you leave NRO. Please use MTK remote observation system. Please install an anti-virus software Data storage cost is huge. 8 July 23, 2014 NROUM2014