WELCOME to STScI October 2007 Our Goal – Enable a smooth transition to STScI.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Information Technology Disaster Recovery Awareness Program.
Background Information. 2 Scope: Computer Hardware  Tablets, Laptops, Embedded Systems  Desktops, Servers, Supercomputers  Peripherals and Accessories:
Booth Computing Services Agenda Who’s in CS? What We Do… Resources Labs and Study Rooms Portal Accounts Responsibilities What Do I Do First? How.
SHRM Hosted Website Program. 2 Overview of Program  In 2004 SHRM conducted a survey of our chapters/councils and found assistance was needed with website.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
Information and Technology Services Customer Services.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Spring 2007.
Comprehensive IT Consulting Services an innovative approach to business.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Alabama Supercomputer Authority A partnership of … and.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Affordable IT Solutions Copyright Scotts Computer Services 2003.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Using SWHS: The AUP [Acceptable Use Policy]
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
DHCH IT Orientation Introduction to DHCH Computer and Information Systems.
Corporate Information Systems Delivery of Infrastructure IT Services.
蓄勢待發迎WebSAMS Preparation Forum for WebSAMS Implementation Document 12
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Information Services June 2015 Information Services June 2015 Information Services_ ctybrd16june15.1.
LPHI ITG Emergency Preparedness Information Sessions & Training.
Welcome! West Allis: Yes you can!. Terms: Data – Any form of information stored in a computer Data – Any form of information stored in a computer Database.
NPS As ISP Warning:Much of this information such as dates and phone numbers is in flux This is if you want your own home page hosted by NPS not to be confused.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
FLOOR CANDY.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
EDUCAUSE 2005 Annual Conference October 19, 2005.
3.4 Education. Overview Discuss the impact of ICT in schools to including the use of filters to control access to web content and an intranet to facilitate.
Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
HalFILE 2.1 Network Protection & Disaster Recovery.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Creating and Managing Networks CSC February, 1999.
Client – Server Architecture A Basic Introduction 1.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
LO2 Understand the key components used in networking.
What’s New in Fireware v WatchGuard Training.
Welcome to Cal Maritime! Steve Frazier, CIO Greg Crum, Academic Technologist Information Technology Orientation For New Faculty & Staff.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
MSB Network Orientation. Basics Welcome from the MSB Tech Center Tech Center Staff – 13 Permanent – 30+ Students Serve MSB Only – 3200 Users.
Ron Enger Southern Oregon Educational Service District Medford, Oregon Cliff Ehlinger Grant Wood Area Education Agency Cedar Rapids, Iowa December, 2006.
Service Desk Good Practice Guide – Benchmarking survey results January 11 th 2012.
IT Department Introduction
Information Technology Acceptable Use An Overview
Chapter 6 Application Hardening
IT services Miki Kallio Liaison Manager (IT and Research), PhD
Welcom e Welcome to BKD! This presentation will show you some of the technology that you’ll be using everyday here in and out of the office.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Preparing for and ADMINISTERING the ABMGG IN-TRAINING EXAMINATION
Division of Engineering Computing Services
Presentation transcript:

WELCOME to STScI October 2007 Our Goal – Enable a smooth transition to STScI

New Employee Orientation on Computer Resources IT Policies and Security – John Kaylor Computer Support Help Desk – Val Ausherman Web and A/V Services – Steve Dignan General Information – John Kaylor Questions

Policies and Security Unacceptable items on Institute Equipment Inappropriate material File sharing software Web servers Disabled virus protection Non-STScI equipment on internal network

Policies and Security NASA IT Security Training - Do not try to fix your own machine -

Computer Support Help Desk Contact: –Send to Not –Call ext 4400 –Visit us in room 330 –

Web and A/V Services

Web Services Individual Homepages Collaboration Tools (wikis, bulletin boards, blogs, etc.) Web Proxy Server Site Development, Maintenance, Support and Training

A/V Services Webcasting/Streaming –Live and after the fact event streaming: –Presentation tips, guidelines, templates, etc.: (found in the "Getting Started" box in RHN of above site) Building your ppt (fonts, text-size, colors) to optimize video quality Public speaking tips and presentation dry-runs –Hardware support for real-time events

A/V Services (cont’d) Video Conferencing –High-end facilities in 2 separate conference rooms to conduct up to 4-point video conferencing –Project currently underway to solidify STScI policy and supported configurations for desktop video conferencing Teleconferencing Note: Support for both video and teleconferencing provided via to

General Information Backups Discussion Groups: To view your Help Desk tickets: - Public Workstations, tape drives -

General Information Webmail – spam filtering, white & black lists: Visitor Network: Wireless Network: Remote Connections – Dial-in, VPN

General Information ITSD Services Ordering equipment Computer Supplies ITSD Tech Updates Every 2 mths in the Auditorium at 12:00 noon

QUESTIONS Later: Questions can be sent to: