Www.help.eln.uu.se www.uu.se  För anställda – Insidan  Genvägar  Forskningsdokumentation (LabNotes)

Slides:



Advertisements
Similar presentations
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Advertisements

Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Configuring Windows to run Dr.Web scanner remotely.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 7 HARDENING SERVERS.
CSCD 303 Essential Computer Security Fall 2010 Lecture 4 - Desktop Security Reading:
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Introduction to windows operating system i
Avoid DCOM and Tunnel Across Firewalls and Networks Presenters: Kevin Rutherford, Senior Applications Engineer Colin Winchester, VP Operations  OPC DA.
OPC DA Tunnelling Presenters: Colin Winchester, VP Operations Win Worrall, Application Engineer  OPC DA Tunnelling  PC to PC without DCOM  Encryption.
Process Analysis & Automation Our research delivers the highest quality process analytical technology and lab automation solutions ISO 9001 : 2000 certified.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Rob Hwacinski Sr. Program Manager Lead Microsoft Corporation WEM206 Ashwin Kulkarni Sr. Product Manager Microsoft Corporation.
Direcção - Geral do Desenvolvimento RegionalWorking Group Meeting in Brussels Maria Eduarda Lopes, /23 PORTUGAL COMMUNITY SUPPORT FRAMEWORK.
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
Local Health Department Contact Tracking Database An easy to use, efficient way to track the contacts, inquiries and complaints your local health department.
Linux Basics. What is an Operating System (OS)? An Operating System (OS) is an interface between hardware and user which is responsible for the management.
SOFTWARE.
Comparing functions and features of operating systems.
Lieberman Software Random Password Manager & Workflow Delegation.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
DB2 (Express C Edition) Installation and Using a Database
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
ETP Reloaded e-Commission Technological Platform Upgrade to Microsoft Office 2003 DIGIT Adapted to DG SCIC.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
Open Web App. Purpose To explain Open Web Apps To explain Open Web Apps To demonstrate some opportunities for a small business with this technology To.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Module 14: Configuring Server Security Compliance
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Module 6: Designing Security for Network Hosts
GROUP MEMBERS: Asjad Bin Aqdas Javaria Khan Mishal Arshad Nauman Ansari Bushra Waheed Presented to: Ma’am Ayisha Qureshi.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Network Security & Accounting
Sync and Exchange Research Data b2drop.eudat.eu This work is licensed under the Creative Commons CC-BY 4.0 licence B2DROP EUDAT’s Personal.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
Windows Administration How to protect your computer.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
CHAPTER 2 COMPUTER SOFTWARE. LEARNING OUTCOMES At the end of this class, students should be able to:  Explain the significance of software  Define and.
Reference Management Module I: Introduction By Rehema Chande-Mallya(PhD)
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
BY: SALMAN 1.
Introduction to Barracuda IM Firewall
BY: SALMAN.
Chapter 6 Application Hardening
The Visible Computer Chapter 3.
Printer Admin Print Job Manager
Getting Started.
Getting Started.
Information Technology Ms. Abeer Helwa
Advantages of Networking
Operating System Hardening
Chapter 9: Managing Groups, Folders, Files, and Object Security
Presentation transcript:

 För anställda – Insidan  Genvägar  Forskningsdokumentation (LabNotes)

LabNotes Replaces laboratory notebook on paper Centrally procured system, has been used by three groups (since 2006) Enables integration of various computer programs Information can be reused Secure access – accessibility Easy to share and seek information Secure archiving Works on all computers, not only at UU

Access 1.User UUid (AKKAID or studentID) 2. Computer PC - A client, administrator on pc Else - Through web browser 3. Network access Works on; mac OS10.5 or later Windows XP, Vista, Win7 Linux – Ubuntu, Slackware

Safety of the system The user's computer has virus protection All traffic over the network is encrypted Server and database are behind a firewall and perimeter protection Every night the database is copied The database is Oracle A PDF document is created of each experiment

System organisation

User organisation ELN coordinator – ie me -Administrates all accounts and communicates Research groups with projects - Group administrators that administrates projects, templates and rights for the group Scientists - One experiment belongs one user part of a group and a project

The group administrator To be the contact point between the group's users and the LabNotes coordinator Create projects and set the privileges within the group for these projects Create public templates, that the group can use Inform the LabNotes coordinator when users start or leave Help the members in the group with the installation of the PC client and how the LabNotes system can be used Keep contact with the LabNotes coordinator and report improvements and problems

Projects and experiments Each experiment belongs to a project and get a unique experiment number Automatically saved The group decides what projects they have Hide projects to parts of the group, or share projects with other groups / researchers Seeing each other's experiments or not Share experiments Countersign

Users Personal account Creates experiments When a user leaves all experiments remain

Costs All it takes for the system to work is paid by the medical, pharmaceutical, engineering and science disciplines together. Each new license will cost 2500 SEK initially, then 750 SEK each following year Licenses can be inherited

The Process This seminar Decision how to organize, as one or several (PA) groups Excel file from homepage -> me Training for all users, mac/pc Training for the group administrator Possibility for further training/support until everyone can use the system

Questions ? Demonstration