We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEric Stone
Modified over 3 years ago
© 1995-2005, Actuate Corporation Engineer Orientation IT Facility
© 1995-2005, Actuate Corporation Main Process IT Policy Computer Accounts Setup your PC Install Software Apply Accounts Standard Desktop Configuration HQ Passwords/E-Mail Password Changing HQ Password IT Support Request
© 1995-2005, Actuate Corporation IT Policy Network Policy There should be no personal use, especially downloading video or game, of company network during normal work hours. E-mail Policy Prohibit personal usage –Email may be used only for Company Business, It is a violation of company policy to use the company email system for any personal purposes. l Prohibit disclose sensitive message –Company technology and trade secretes –Project information of co-workers –Contact information of co-workers l Prohibit propagate political, religionary message l Read & Reply email intime
© 1995-2005, Actuate Corporation IT Policy Computer Software Policy Use licensed software only. Core desktop applications such as MS Office, Outlook, PVCS Tracker client and anti-virus programs should be kept up-to-date by the individual using the computer. Exercise caution when downloading free software: some contain bugs that may destabilize the system; some may not allow commercial use.
© 1995-2005, Actuate Corporation Company Accounts HQ Domain Account/E-mail Account Tracker Account Perforce Account VSS Account CVS Account BIRT Bugzilla Account BIRT Mailing List Local Bugzilla Account
© 1995-2005, Actuate Corporation Setup your PC Change your computer name to your Chinese name(Pinyin) Create a new user name same as your email account and let it be a member of administrator Create a password for your account Run Windows Update,Install all Critical/Recommended updates Let Windows Firewall to be on Turn on Windows Automatic Updates Enable Anti-virus software Mcafee Autoupdate Disable Administrator account
© 1995-2005, Actuate Corporation Install Software If you need other software, you can find it on \\shanghai\software\\shanghai\software
© 1995-2005, Actuate Corporation Apply Accounts Sign up Bugzilla account on Eclipse Go to http://www.eclipse.org/birt/index.php?page=community.html for applying a bugzilla account. http://www.eclipse.org/birt/index.php?page=community.html Subscribing to birt-dev mailing list Go to http://www.eclipse.org/birt/index.php?page=community.html for subscribing birt-news mailing list. http://www.eclipse.org/birt/index.php?page=community.html Other accounts will send to your mailbox.
© 1995-2005, Actuate Corporation Standard Desktop Configuration Hardware CPU P4 2.8GHz or above Memory 512MB Disk 80GB Network100Mbps Software OS Windows XP MS Office XP Mcafee 7.0 or above Eclipse 3.1 JSDK 1.4.2 or above Ant 1.6.0 or above Acrobat Reader 6.0 or above Visual Source Safe 6.0 PVCS Client 8.0
© 1995-2005, Actuate Corporation HQ Domain/E-Mail Password Password policy Password protection is an important part of Actuate Corporation security.The following are guidelines that All employees must follow: 1. Passwords must be at least six (6) characters long. 2. Password must contain at least one number and one uppercase letter. 3. Passwords are case sensitive. 4. You cannot use your previously used password. 5. All passwords expire every six months. 6. Do not write down your username and password. Password should be memorized.
© 1995-2005, Actuate Corporation HQ Domain/E-Mail Password Changing Password 1.) Remotely log on server ts.
© 1995-2005, Actuate Corporation HQ Domain/E-Mail Password
© 1995-2005, Actuate Corporation HQ Domain/E-Mail Password Changing Password 2.) Click Start at left-bottom, then click Windows Security on the pop-up menu
© 1995-2005, Actuate Corporation HQ Domain/E-Mail Password Changing Password 3.) At last click Change Password
© 1995-2005, Actuate Corporation IT Support Request n We now have a Bugzilla server on local for IT Supprot Request. n Go to here to submit your requesthere
© 1995-2005, Actuate Corporation Thank You!
Introduction to Student Name Student Class.
Installing the ALSMS Software on a Windows Platform Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
ExamSoft at BU LAW Boston University School of Law Office of Systems & Technology.
You will find applications that are installed on the computer. Go to Start – Programs (depending on view Start – All Programs). All applications installed.
CSEE Graduate Student Orientation CSEEIT. Introduction Geoff Weiss Computer Systems Manager.
C HAPTER 2 Introduction to Windows XP Professional.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Introduction to Your Name Goes Here
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
LPHI ITG Emergency Preparedness Information Sessions & Training.
Remote Assistance Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission The other.
IT Support IT Support Help… Bath University Computing Services (BUCS)Bath University Computing Services (BUCS)Bath University Computing Services (BUCS)Bath.
Configuring the MagicInfo Pro Display Once the MagicInfo Pro Server software is installed on a networked PC, the next step in assembling the MagicInfo.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
OZEKI NG - SMS Gateway Take advantage of the SMS technology in your organization today!
Powered by : Multiicon USER GUIDE 1.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NetTech Solutions Protecting the Computer Lesson 10.
Go to Start >> Programs >> Outlook Express ( as shown)
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
Laptop Security in the current IT world W3 group.
© 2008 Alt-N Technologies - Confidential Technical Training and Demonstration Matt McDermott Team Leader - Product Developer.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Product Training 1 JetFlash Software Application.
Installing and running COMSOL on a Windows HPCS2008(R2) cluster.
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Module 10 Securing Microsoft® Exchange Server 2010.
Verify Hardware Requirements Install Windows Server 2008 R2 Configure Active Directory Install SQL Server 2008 Install SharePoint Server 2010 Configure.
Installation and Deployment in Microsoft Dynamics CRM 4.0 Uninstalling and Repairing Microsoft Dynamics CRM /08/08.
1 Computer Security: Protect your PC and Protect Yourself.
DIT314 ~ Client Operating System & Administration CHAPTER 2 INTRODUCTION TO WINDOWS XP PROFESSIONAL Prepared By : Suraya Alias.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Jeff McCashland. Agenda Supported Deployment Scenarios System Requirements Installing DTM Controller Installing the DTM Logo Tests Installing DTM Studio.
ICT Facilities in State Secondary Schools. This Presentation Computer Labs Software Lab availability Network Login Internet Connectivity Filtering .
TERMINAL SERVER DEPLOYMENT PLAN. STEP 1: PREPARATION UTILIZE THE CURRENT SERVER FOR: ACTIVE DIRECTORY (AD) ACTIVE DIRECTORY (AD) NEEDED FOR STORAGE.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
DSS Tips and Tricks A Must-Read for DSS Beginners Rev. Apr 2008.
Getting Started with Microsoft Office 365. Getting Started - Overview How to use your existing desktop software to connect to Office 365. Install the.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Skype Presentation By: B. Hardman Image used from
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS.
Apple Remote Desktop Hey! I got some new software for my school. For free. For what?
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
© 2017 SlidePlayer.com Inc. All rights reserved.