Mobile Computing for Mac Users By Alan Doo PPD Christmas Lectures 2009.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
Speaker Name, Title Windows 8 Pro: For Small Business.
Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
Unleashing Your Data From the Local Desktop Webinar.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Senior Design Lab Policies Presented by: Trey Murdoch CSC IT Staff.
Department of Epidemiology & Biostatistics K12 Scholar Presentation: Terminal Server.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Rob Hwacinski Sr. Program Manager Lead Microsoft Corporation WEM206 Ashwin Kulkarni Sr. Product Manager Microsoft Corporation.
Desktop in the Clouds Using Virtualization to Extend Client Outreach and Protect Data.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Comparing functions and features of operating systems.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Information Technology Practical information for new faculty about information technology at UMR Christopher Dew Manager, Relationship.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
PPD Computing “Business Continuity” Windows and Mac Kevin Dunford May 17 th 2012.
PPD & CLRC's response to the (IS) Security Threat Gareth Smith PPD/CG Christmas Lectures 2002.
Introducing… …taking desktop computing to the cloud making business effortless!
BUCS / Department of Pharmacy & Pharmacology Pharmacy & Pharmacology Computing Services Pascal Loizeau Computing Services Supporter Dept. of Pharmacy &
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
© British Telecommunications plc BT Managed Services Innovate
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Kevin Dunford – Windows Support & Development What do I do.. Support, configuration, and development of - Windows servers, desktops, Laptops, printers,
An Introduction to Progress Arcade ™ June 12, 2013 Rob Straight Senior Manager, OpenEdge Product Management.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Brian Arkills Software Engineer, LDAP geek, AD guy, Chief Troublemaking Officer Windows HiEd Conference 2006 Managed Workstations: UW Nebula.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
RAL PPD Computing A tier 2, a tier 3 and a load of other stuff Rob Harper, June 2011.
1 CSE 390 Lecture 9 Do anything from anywhere – tools to free your choice of OS slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson.
Information Technology Practical information for new faculty about information technology at Missouri S&T it.mst.edu Christopher Dew Director, IT Operations.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Gareth Smith RAL PPD RAL PPD Site Report. Gareth Smith RAL PPD RAL Particle Physics Department Overview About 90 staff (plus ~25 visitors) Desktops mainly.
Skill Area 214 Introduce World wide web(www)
By Shreya Mozumdar 6B.  An operating system (OS) is a program that, after being loaded onto the computer, manages all the other programs on the computer.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Introduction TO Network Administration
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
Operating Systems By-Anoushka Puri. What is an Operating System An operating system is an interface between the user and the computer hardware. It is.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Gareth Smith RAL PPD HEP Sysman. April 2003 Security Changes at RAL.
Department of Mathematics Technology Orientation.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
System Software Chapter Handles technical details Works with end users, application software, and computer hardware Four types of programs –Operating.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
 Midas PC touch is one of the fastest growing companies that offer 24X7 technical assistance and online computer support services to computer users worldwide.
Computer Science/IM Cookbook
VCL Best practices Lee Toderick, Department of Technology Systems
Getting Connected to NGS while on the Road…
Physics Network Integration
Everything you wanted to know about
Office 365 is cloud-based productivity, hosted by Microsoft.
Dell Latitude E5570 Laptop Heather L Horvath.
THANK YOU… Welcome to Microsoft office 365 Customer Support Number Welcome to Microsoft office 365 Customer Support Number For more visit on:
Physics Network Integration
Software and Programming
Getting Connected to NGS while on the Road…
Do anything from anywhere – tools to free your choice of OS
Software and Programming
Pavel Dobrý Engineering Director
Types of Software Mrs. S. Palmer Office Administration.
Division of Engineering Computing Services
Presentation transcript:

Mobile Computing for Mac Users By Alan Doo PPD Christmas Lectures 2009

Macs in Particle Physics During the days of VMS, Mac was a increasingly popular alternative computing platform in Particle Physics. Mac popularity is growing once again. We now have nearly 30 in the department. More are purchased each year. The Dark Matter group have the highest concentration using a variety of Mac desktops, laptops and servers. Departmental service support for Macs already includes Sophos Anti-Virus and will soon be joined by Pakiti, the patch monitoring system. 1

You only support Windows, right? PPD Computing Group is a multi-discipline team. We seek to anticipate and respond to the IT needs of the department. The business IT infrastructure supports, or can be accessed by, non-Windows client Operating Systems, including Mac OS.  support in Entourage, Outlook for Mac or Mac Mail via IMAP.  File system access using SMB (Server Message Block) connections.  Printing using LPR connections via HEPWIN2008A. Lab and department remote access services are readily available to Mac users.  VPN connections are quick to set up for PPTP access.  SSH connections to Bastion are as straight-forward as a UNIX system.  WebDAV support is built-in for Windows DFS file system access. 2 CG currently offer best-efforts support for Mac OS in PPD. We also gratefully acknowledge our expert users.

Can Macs do ______ like Windows? Modern Macs offer a high-level GUI-based interface similar to Windows, but also provide a bridge to UNIX for those who need it. For those who travel or depend on standard STFC Windows applications, a Mac may not be as convenient as a Dell. When considering whether to switch to Mac OS, users should evaluate what changes may be needed in the way they work. 3 Mac OS X is NOT Windows-for-users-who-dislike-Microsoft, any more than Linux is. Power-users or those who work predominantly in a UNIX environment may find a Mac a valuable asset, particularly on the move.

How do I work without my favourite apps? There are many common packages available for Macs. Mac users may also access the PPD Windows Terminal Server using Microsoft RDP client (Remote Desktop). With each iteration of Mac OS, more business features are added. A wealth of GNU/Open Source content is also available online.  Microsoft Office for Mac, including a new Outlook in  Adobe products such as Acrobat and Photoshop.  Many popular browsers are also available. But not IE. 4

But don’t Macs cost so much more? The cost of a 15” MacBook Pro was comparable with a Dell E- series laptop – though the range Dell offer is greater. Other costs will also drive up the TCO, due to the limited warranty, support level and some higher software costs. PPD CG have prepared a new Security Policy which will affect all equipment connected to the internal network. Intel Macs are increasingly being targeted by new and innovative virus and malware attacks. The STFC Security Policies must also be observed. 5

Questions?