We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEric Stone
Modified over 2 years ago
© , Actuate Corporation Engineer Orientation IT Facility
© , Actuate Corporation Main Process IT Policy Computer Accounts Setup your PC Install Software Apply Accounts Standard Desktop Configuration HQ Passwords/ Password Changing HQ Password IT Support Request
© , Actuate Corporation IT Policy Network Policy There should be no personal use, especially downloading video or game, of company network during normal work hours. Policy Prohibit personal usage – may be used only for Company Business, It is a violation of company policy to use the company system for any personal purposes. l Prohibit disclose sensitive message –Company technology and trade secretes –Project information of co-workers –Contact information of co-workers l Prohibit propagate political, religionary message l Read & Reply intime
© , Actuate Corporation IT Policy Computer Software Policy Use licensed software only. Core desktop applications such as MS Office, Outlook, PVCS Tracker client and anti-virus programs should be kept up-to-date by the individual using the computer. Exercise caution when downloading free software: some contain bugs that may destabilize the system; some may not allow commercial use.
© , Actuate Corporation Company Accounts HQ Domain Account/ Account Tracker Account Perforce Account VSS Account CVS Account BIRT Bugzilla Account BIRT Mailing List Local Bugzilla Account
© , Actuate Corporation Setup your PC Change your computer name to your Chinese name(Pinyin) Create a new user name same as your account and let it be a member of administrator Create a password for your account Run Windows Update,Install all Critical/Recommended updates Let Windows Firewall to be on Turn on Windows Automatic Updates Enable Anti-virus software Mcafee Autoupdate Disable Administrator account
© , Actuate Corporation Install Software If you need other software, you can find it on \\shanghai\software\\shanghai\software
© , Actuate Corporation Apply Accounts Sign up Bugzilla account on Eclipse Go to for applying a bugzilla account. Subscribing to birt-dev mailing list Go to for subscribing birt-news mailing list. Other accounts will send to your mailbox.
© , Actuate Corporation Standard Desktop Configuration Hardware CPU P4 2.8GHz or above Memory 512MB Disk 80GB Network100Mbps Software OS Windows XP MS Office XP Mcafee 7.0 or above Eclipse 3.1 JSDK or above Ant or above Acrobat Reader 6.0 or above Visual Source Safe 6.0 PVCS Client 8.0
© , Actuate Corporation HQ Domain/ Password Password policy Password protection is an important part of Actuate Corporation security.The following are guidelines that All employees must follow: 1. Passwords must be at least six (6) characters long. 2. Password must contain at least one number and one uppercase letter. 3. Passwords are case sensitive. 4. You cannot use your previously used password. 5. All passwords expire every six months. 6. Do not write down your username and password. Password should be memorized.
© , Actuate Corporation HQ Domain/ Password Changing Password 1.) Remotely log on server ts.
© , Actuate Corporation HQ Domain/ Password
© , Actuate Corporation HQ Domain/ Password Changing Password 2.) Click Start at left-bottom, then click Windows Security on the pop-up menu
© , Actuate Corporation HQ Domain/ Password Changing Password 3.) At last click Change Password
© , Actuate Corporation IT Support Request n We now have a Bugzilla server on local for IT Supprot Request. n Go to here to submit your requesthere
© , Actuate Corporation Thank You!
Microsoft SQL Server 2005 Express Edition & SQL Server Management Studio Express Installation and Configuration Guides.
Your essential guide to student IT QMU QuickstartIT.
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
How to Use Stowe School District Open Internet Explorer. Outlook is optimized for Internet Explorer. Other browsers may not have advanced features.
Mercy Tablet Hardware/Use and care Network Login Tablet Power Settings Printing Saving Files , PowerSchool, Moodle, Dyknow Acceptable.
1 Kaspersky CCleaner VerbAce WinRar. 2 About VerbAce 2008 Freeware VerbAce 2008 freeware is a translation software with a Arabic-English-Arabic dictionary.
First Class communication in european projects What is First Class ? First Class is perhaps the most used communication program in the world. It runs through.
Laptop Orientation 2013 Welcome Please do not open anything yet.
Setting up File sharing, Personal and Network Printers Brent Murphy Matt Griffin Edwin Edwards Chris Wyatt.
Helping our customers keep their computers safe. Using your pet’s, business, family, friend’s names Using number or letter sequences (0123, abcd)
FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION FILEMAKER PRO 5.5 SERVER SOFTWARE.
Doc.: IEEE /1247r0 Submission November 2008 Adrian Stephens, Intel CorporationSlide nd Vice Chairs Report Nov 2008 Date:
SPECIAL EDUCATION MANDATED ACTIVITIES PROJECTS Presented by Judy Byrnes Office of Grants Coordination & School Support 8/30/2007.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Web Hosting. The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one.
Outpost Network Security Product presentation. What is Outpost Network Security? Combined manageable software firewall and anti-spyware solution designed.
PrevNext | Slide 1 WELCOME TO THE MEGS SYSTEM READING FIRST APPLICATION Created: 12/14/2004.
Working with Outlook 2007 at CERN Outlook Main window Customize views Send s Organize s: Category, Follow-up flag, To-Do Bar Create signatures.
CYBER SECURITY TRAINING Virginia Marine Resources Commission MIS Dept. October 2012.
© 2012 Microsoft Corporation. All rights reserved. Add a contact Your Contacts list simplifies your communications and lets you see presence and contact.
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Doc.: IEEE /0513r1 Submission May 2008 Adrian Stephens, Intel CorporationSlide nd Vice Chairs Report May 2008 Date: Authors:
Introduction to Computer Security USC School of Medicine Office of Information Technology.
Virginia Department for Aging and Rehabilitative Services.
Student IT Induction Friday 9 th October Dominic Bown Andrew Roberts.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Microsoft Word Microsoft Excel Operations.
Welcome to eDMR This PowerPoint presentation is designed to show eDMR users how to login and begin using the eDMR system.
Digital Certificate Installation & User Guide For Class-3 Certificates.
We have designed a new style of database that we create entirely on your behalf. By using this database you will have access to a range of features to.
© 2016 SlidePlayer.com Inc. All rights reserved.