ARCH (27994) : (and cross listed with ARCH ) Advanced Revit (BIM in Practice ) Erin Card Spr Spring, Semester 2011

Size: px
Start display at page:

Download "ARCH 6465-001 (27994) : (and cross listed with ARCH 6390-008) Advanced Revit (BIM in Practice ) Erin Card Spr 2010. Spring, Semester 2011"

Transcription

1 COLLEGE OF ARCHITECTURE AND PLANNING UNIVERSITY OF COLORADO, DENVER. ARCH (27994) : (and cross listed with ARCH ) Advanced Revit (BIM in Practice ) Erin Card Spr 2010 Spring, Semester 2011 J. Michael Gerzso Ph.D., Instructor Day and Time: Friday 9:30 am- 12:15 am Class Room 440 Instructor s Office: 502, 5 th flr. Office Hours: to be announced mike.gerzso@cudenver.edu Andrea Paiz Spr 2008

2 Note 1: Laptop with Revit Arch. 2009, 2010 or 2011 required. Windows XP with SP3 or Windows 7 is strongly recommended. See comments at end of syllabus. Note 2: Basic understanding of a Revit program is required. It is strongly recommended that the course Basic or Intermediate Revit be taken first. (V1 Nov.8, ) Objectives This course is the third one of a three course sequence. The first one, Basic Revit, covers the basics, such as drawing, creating walls, windows, etc. as well as the creation of 3D architectural form with the family editor. The second one, Intermediate Revit, course families in more detail, as well as project geometry and linking. This third course focuses on Revit family techniques useful in school design studio and in architectural offices. Topics to be covered: 1-Configuration: the basics setting up Revit to load standard and customized families in addition to those loaded by default (as defined by AutoDesk). 2-Customization: defining families by modifying existing ones and/or creating them scratch. Families: The different characteristics of some of the family templates and hosting will be covered will be covered in more detailed than in the first course, as well as defining their materials and appearance. For example, curtain wall mullions, panels, doors and graphical objects such as lines. Parameterization: A fancy word which means defining the dimension of a family object at the time of insertion, e.g., use in a project or another family. For example, all family objects in the first course had constant, previously defined dimensions, such as the Nervi inclined concrete column. With parameterization, the dimensions of the Nervi column may vary and can be defined at the time of insertion. In this course, the power of parameterization will be illustrated with the creation of a structure in the form of a tree. Several tree structure instances are inserting using one tree family. (see below)

3 3-Construction: The basics of construction detailing using callouts and detailing components, line weights and sheet sets. 4-Communication: The basics of rendering. Some or all of the topics will be illustrated by means of a hypothetical design project, which the students will develop during the entire semester. During the last 4 years, the trend in BIM and the increased need to learn Revit in particular has motivated the development of this course. It is intended to orient the student in the use of programs such as Revit as a producer of building information. Type of course: seminar/workshop The course will not be taught as a series of lectures in the computer lab. Students will be required to bring their laptops with Revit installed to all of the classes and workshop sessions. Revit can be obtained for free from the AutoDesk website. For details, please ask Mike Harring in the Computer Lab (4 th Flr.) mike.harring@cudenver.edu The right computer for running Revit. The right computer for running Revit is the fastest one money can buy. However, most students do have limited financial resources, so some comments are in order. No matter how much money you are willing to spend, you should always try to find a machine that has the fastest graphics card and the fastest bus. The after that, go for the maximum amount of memory and then the speed of the processors (CPU). Many people (if not most) consider price/cpu-speed as their only selection criteria. Krista Klancke Spr 2010

4 A good place to find reviews for fast machines for a given price is CPU (Computer Power Users) magazine and their online articles. Take what they recommend and then strip out the speed features that are required for gaming and replace them if necessary for CAD. A good example is Alienware Area51 laptop but there are also machines from Dell, HP and Lenovo. Macs, what about Macs? is the question I get at least once a week. The bad news (or good, depending ) is that Macs are no longer made, that is, as hardware. They are just another PC, cute but no different than an Acer or the one you can put together in your garage. The good news is that a Mac can be configured to run Apple Mac OS X only, or in conjunction with Windows at the same time with Parallels, or in cohabitation on the same disk with Windows with Boot Camp (run one or the other but not both) OR just as a plain old PC (POP) running Windows only. For this reason, Mac laptops have been selling like hotcakes. In our school, the three options have worked for running Revit. The ranking of options from best to less good is: Windows only, then Boot Camp and then Parallels. Parallels is not as good as it should be but it is getting better all the time. Last but not least, is Windows XP and Vista. Despite the broadcast of the unusual ad in which Jerry Seinfeld encounters Bill Gates at a Shoe Circus store, Vista remains a market failure. However, the experience of students running Revit on Vista has been mixed. In some cases it runs very fast and with no problems, and in other cases, it is very slow and/or unreliable. The general consensus, including Intel, is to downgrade to Windows XP from Vista, which if pampered and fed regularly- works very well or upgrade to Windows 7. In order to overcome the major problems in Vista, Microsoft has just released a new version of Vista called Windows 7. Why is it number 7? The reason is that it is NT version 7.0. Remember NT? But I digress. The reviews of Windows 7 indicate that the system performs well; better than Vista, and in some cases better than XP. Students in the Dept. of Arch. have found Windows 7 to work well. Nevertheless, a good rule is to install a new version of the operating systems 18 months after it is first released, which means you should buy Windows 7 after April Recommended Software Utilities In addition to Revit, I strongly recommend obtaining (free or purchase) anti virus, disk defragger, and registry cleaner. They are needed whether or not you have a Mac and running Windows. See list of recommended products at end of syllabus. So what is BIM anyway? You Ask Charles Eastman, a nationally recognized expert in BIM, of Georgia Tech s College of Architecture offers a frame of reference for the issue with the following definition: Building information modeling is the provision of rich, integrated information from conception through design to construction and demolition of a building over its lifecycle. It relies on object-based, information-rich 3D modeling as the design of record, and for as-constructed,

5 as-built, and as-operated information. The benefits enabled by BIM will greatly change the ways buildings are designed, fabricated, and operated. Still not clear? You may want to read the last section of this syllabus on BIM terms. Student Responsibilities Students must attend class regularly to ensure successful completion of this course. Participants will be responsible for all information introduced in the individual classes, as well as announcements made during class. Students must complete assigned readings, as well as finish all term assignments. Students who are unable to attend specific classes due to illness, family hardship, or religious holidays must notify the teacher in writing within the first two weeks of the semester. Failure to do so will be considered as unexcused absence and will result in a grade reduction. Evaluation Students will be evaluated primarily on their ability to master the techniques as demonstrated in their assignments, and their class participation. However, the evaluation will also be based on their ability to think critically as demonstrated by the use of Revit. Recommended Reading: All of the techniques needed for the course assignments will be presented in detail in class and/or posted on CU Online Blackboard. There will be no other required reading per se. However, the student is strongly encouraged to select one or more of the following books (in order of my preference) on Revit to complement the class presentations (see list at end of syllabus.) For construction systems, the following book is recommended: Allen, Edward and Iano, Joseph Fundamentals of Building Construction : Materials and Methods (Hardcover), Wiley; 4 edition (December 25, 2003), ISBN: (note: this book is used/required in other courses in the Department of Architecture) So what is BIM anyway? continued.. There has been a lot hype and confusion concerning BIM, and buzzwords abound such as BIM itself, object-based, intelligent objects, parameterization, database, customization, among others. Some of the confusion is a result of marketing campaigns of the software developers themselves. So to understand what this course is offering, the following definitions might be helpful: BIM, aka building information modeling refers to a class of CAD programs which represent buildings in terms of building components instead of simple geometric objects such as lines, circles, etc. BIM programs contain a set of predefined industry standard building components

6 such as walls, foundations, stairs, windows, roofs, structural elements, construction details, etc. In these systems, a building is created using components supplied by the software manufacturer or created by a user/designer. Object-based and intelligent objects: is a computer software manufacturer s term for building components. The motivation for the use of the term is to emphasize the BIM programs explicitly represent building components and relationships between them, such as windows must be placed in walls, and not abstract geometric objects, such as lines, circles, etc. The term intelligent objects refer to the explicit information of component characteristics and relationships. In the human sense, they are not very intelligent. Parametrization: is the process of providing data to BIM while inserting a component into the design. An object such as a wall is defined as having a length, height and material. These are the parameters. A particular instance of a wall must have those parameters explicitly defined, eg. 20ft, 10ft, and brick. Database: for most BIM and CAD systems, this term refers to the CAD file which contains the data of a design. It is a database in the most generic and/or conceptual level, in that it is a file with data, but it is not a database in the strict technical sense of the word. Just to add the confusion, BIM programs can connect to real databases, such as Oracle, Sybase, SQL server, Access, etc. The wave of the future is the marriage of BIM to databases. Customization: even though predefined industry standard building components are a necessary in a BIM, a designer will surely want to create a unique or custom component for a particular project. BIM programs provide procedures to create new components and have them readily available along with the predefined ones. This capability is characteristic of object-oriented systems, that is, they are extensible, eg a predefined set of components can be extended to include new user-defined customized objects. Lawrence Craig Spr 2008

7 Amazon.com: Paul F. Aubin's Mastering Revit Architecture 2010: Paul F... Hello, john michael gerzso. We have recommendations for you. (Not john?) john's Amazon.com Today's Deals Gifts & Wish Lists Gift Cards Kindle: Amazon's Wireless Reading Device Your Account He Shop All Departments Search Cart Your Lists Books Advanced Search Browse Subjects Hot New Releases Bestsellers The New York Times Best Sellers Libros En Español Bargain Books Textbook See larger image (with zoom) john's Amazon.com Today's Deals Gifts & Wish Lists Gift Cards Publisher: learn how customers can search Shop All Departments inside this book. Search Cart Your Lists Books Advanced Tell the Publisher! Search I d like to read this book on Kindle Don t have a Kindle? Get yours here. Editorial Reviews Paul F. Aubin's Mastering Revit Architecture 2010 (Paperback) by Paul F. Aubin (Author) List Price: $87.95 Price: $55.41 & this item ships for FREE with Super Saver Shipping. Details You Save: $32.54 (37%) Pre-order Price Guarantee. Learn more. This title has not yet been released. You may pre-order it now and we will deliver it to you when it arrives. Ships from and sold by Amazon.com. Gift-wrap available. Quantity: Customers Product Description Who Bought This Item Also Bought Page 1 of Master the software that industry professionals are using to create compelling architecture with PAUL F. AUBIN'S MASTERING REVIT ARCHITECTURE 2010! Experienced-based practical advice is at the core of this concise reference guide by veteran author or Sign in to turn on 1-Click ordering. or Amazon Prime Free Trial required. Sign up when you check out. Learn More Amazon.com: Autodesk Revit Architecture 2009 for Architects & Designer... Mastering Tell the Revit Publisher! Architecture 2010 by Greg Demchak Revit I d Architecture like to read this 2010: book Products No Experience & Services Required estoreby Eric Wing Threats on Kindle s Support Partners About Us Products & Don t Services have a Kindle? Get Customers yours Who here. Bought This Item Also Bought Page 1 of Back Hello, john michael gerzso. We have recommendations for you. (Not john?) Browse Subjects Hot New Releases Bestsellers The New York Times Best Sellers Autodesk Revit Architecture 2009 for Architects & Designers (Paperback) by Sham Tickoo (Author) No customer reviews yet. Be the first. List Price: $69.00 Kindle: Amazon's Wireless Reading Device Your Account He Libros En Bargain Textbook Español Share with Books Friends or Special Offers and Product Promotions Price: $69.00 & this item ships for FREE with Super Pre-order Price Guarantee! Order now and Saver if the Shipping. Amazon.com Details price decreases between your order time and the end of the day of the release date, you'll receive In Stock. the lowest price. Here's how (restrictions apply) Ships from and sold by Amazon.com. Gift-wrap available. Frequently Bought Together Quantity: Share with Friends Business Security Price For All Advanced Three: antivirus $ software with maximum spyware protection to guard against viruses, Trojans, and worms, spyware and adware, rootkits, identity theft and Technology Revit Solutions phishing attacks. Architecture + + Introducing Revit Paul F. Aubin's Creating Revit Family 2010: No Experience Architecture 2010: BIM Mastering Revit Content by Ken Jolly Beta Testing Required by Eric Wing fo... by Tatjana Architectur... by Paul F. (5) $9.50 This item: Autodesk (2) $26.39Revit Architecture Dzambazova 2009 for Architects & Aubin Version $59.95 Free Virus Scan Designers by Sham Tickoo $31.49 Users: Years: (12) Mastering Revit Architecture 2009 by Tatjana Dzambazova $57.30 CD Version $ user/1 year Paul F. Aubin's Mastering Revit Architecture 2009 by Paul F. Aubin or Sign in to turn on 1-Click ordering. Amazon Prime Free Trial required. Sign up when you check out. Learn More Frequently Bought Together Want it delivered Thursday, May 14? Order it in the next, and choose One-Day Shipping at checkout. Details More Buying Choices Price For All Three: $ See larger + image + 3 new from $ used from $ used & new from $64.00 Share your own customer images Have one to sell? Publisher: learn how customers can search inside this book. This item: Paul F. Aubin's Mastering Revit Architecture 2010 by Paul F. Aubin Buy Free Virus Scan Anti-Virus Software 2009 with Anti-Spyware Protection - Kaspersky Lab Home Computer Security Internet Security 2009 Anti-Virus 2009 Security for Ultra Portables Mobile Security Compare Products The New Standard in Anti-Virus Software Home / Products & Services / Home Computer Security / Anti-Virus 2009 NOTE NO LONGER RECOMMENDED Kaspersky Anti-Virus 2009 Ne 1 of 5 5/12/20 Back Ne

8 Diskeeper 2009 Comparison Chart Account Log-In HOME PRODUCTS DOWNLOADS PURCHASE SUPPORT ABOUT US Home Edition Professional Pro Premier HomeServer Purchase Compare Editions Registry Mechanic - Registry Cleaner, Free Registry Repair Software Diskeeper 2009 Comparison Chart Home Editions Windows built-in defrag tool Home $29.95 Buy Now Trialware Professional $59.95 Buy Now Trialware Pro Premier $99.95 Buy Now Trialware Home Server $69.95 Buy Now Trialware InvisiTasking Improved! No Yes Yes Yes Yes I-FAAST 2.0 (File Optimization) Improved! No Yes Yes Terabyte Volume Engine (TVE) New! No Yes Yes Thorough free-space consolidation Improved! No Yes Yes Yes Yes Frag Shield 2.0 No Yes Yes Yes Registry Mechanic 8 for Windows Intelligent Defragmentation No Yes Yes Yes Yes Defrag disks with less than 1% free space No Yes Yes Yes Yes Defrag severely fragmented files No Yes Yes Yes Yes Power Management for Laptops No Yes Yes Yes Yes Volume Shadow Copy Service (VSS) Compatible Mode Limited Yes Yes Yes Yes Real-Time complete defragmentation No Yes Yes Yes Yes Boot-Time Defragmentation of Critical System Files No Yes Yes Yes Yes Automatic Directory Consolidation No Yes Yes Yes Yes Defragment All Volumes Simultaneously No Yes Yes Yes Yes Historical Reporting No Yes Yes Yes Yes Real-Time Dashboard No Yes Yes Yes Yes Designed for Windows Vista (32-bit and 64-bit), 2000 and XP. Intuitive Control Panel No Yes Yes Yes Yes

DISK DEFRAG Professional

DISK DEFRAG Professional auslogics DISK DEFRAG Professional Help Manual www.auslogics.com / Contents Introduction... 5 Installing the Program... 7 System Requirements... 7 Installation... 7 Registering the Program... 9 Uninstalling

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits. SecureIT Plus PC Security To learn more about Security Coverage s suite of security features, select from the Quick Links that follow. This document can also be printed, or saved to your desktop and used

More information

Oracle E-Business Suite Development & Extensibility Handbook (Osborne ORACLE Press Series) (Paperback) ~ Anil Passi (Author), Vladimir Ajvaz (Author)

Oracle E-Business Suite Development & Extensibility Handbook (Osborne ORACLE Press Series) (Paperback) ~ Anil Passi (Author), Vladimir Ajvaz (Author) Hello. Sign in to get personalized recommendations. New customer? Start here. FREE 2-Day Shipping: See details Your Amazon.com Today's Deals Gifts & Wish Lists Gift Cards Your Account Help Shop All Departments

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

School of Architecture Computer Requirement

School of Architecture Computer Requirement School of Architecture Computer Requirement Updated June 3, 2015 ALL STUDENTS IN THE SCHOOL OF ARCHITECTURE ARE REQUIRED TO PROVIDE THEIR OWN PERSONAL LAPTOP COMPUTER. All ENTERING GRADUATE STUDENTS in

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Getting Started with VMware Fusion. VMware Fusion for Mac OS X

Getting Started with VMware Fusion. VMware Fusion for Mac OS X Getting Started with VMware Fusion VMware Fusion for Mac OS X 2 Getting Started with VMware Fusion Getting Started with VMware Fusion Item: EN-000189-00 You can find the most up-to-date technical documentation

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

The Impact of Disk Fragmentation on Servers. By David Chernicoff

The Impact of Disk Fragmentation on Servers. By David Chernicoff The Impact of Disk Fragmentation on Servers By David Chernicoff Contents Testing Server Disk Defragmentation... 2 The Testing Environment...3 The Tests...4 File Copy...4 Backup.5 Anti-Virus Scan...5 VHD

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Computer Information & Recommendations

Computer Information & Recommendations Computer Information & Recommendations Files stored in your "S" drive can be accessed from home ( Detailed instructions at the end of this document ): Type \\soet students.main.ad.rit.edu\students\(ritusername)

More information

Syllabus -- CIS 120 -- Computer Maintenance / A+ Certification

Syllabus -- CIS 120 -- Computer Maintenance / A+ Certification Syllabus -- CIS 120 -- Computer Maintenance / A+ Certification Cuyamaca College: Fall 2015 Tim Phillips Adapt and overcome USMC proverb 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

User Manual. Diskeeper for Windows. August 2003

User Manual. Diskeeper for Windows. August 2003 User Manual Diskeeper for Windows August 2003 This document describes the installation and operation of Executive Software International s Diskeeper, The Standard in Entire Network Defragmentation for

More information

MS SQL Installation Guide

MS SQL Installation Guide MS SQL Installation Guide Microsoft SQL Database For Debtors Manager Table of contents 1. Overview 2. Minimum server installation requirements for MS SQL 3. Installing MS SQL on your server 4. Installing

More information

Maintaining, Updating, and Protecting Windows 7

Maintaining, Updating, and Protecting Windows 7 Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Robert's Rules of Innovation and over 420,000 other books are available for Amazon Kindle Amazon s new wireless reading device.

Robert's Rules of Innovation and over 420,000 other books are available for Amazon Kindle Amazon s new wireless reading device. Hello. Sign in to get personalized recommendations. New customer? Start here. FREE 2-Day Shipping, No Minimum Purchase: See details Your Amazon.com Today's Deals Gifts & Wish Lists Gift Cards Your Account

More information

In addition, over 50% of the colleges in the ACSA have laptop policies that start with first year students.

In addition, over 50% of the colleges in the ACSA have laptop policies that start with first year students. College of Architecture Laptop Policy 2015-2016 Academic Year Computers now are an integral tool to every professional and provide assistance with a myriad of everyday tasks including communication, advanced

More information

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide Stellar Phoenix SQL Database Repair 6.0 Installation Guide Overview Stellar Phoenix SQL Database Repair software is an easy to use application designed to repair corrupt or damaged Microsoft SQL Server

More information

Zinstall HDD User Guide

Zinstall HDD User Guide Zinstall HDD User Guide Thank you for purchasing Zinstall. If you have any questions, issues or problems, please contact us: Toll-free phone: (877) 444-1588 International callers: +1-877-444-1588 Support

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

2014 Electrical Server Installation Guide

2014 Electrical Server Installation Guide 2014 Electrical Server Installation Guide TITLE: 2014 Electrical Server Installation Guide DATE: September 2013 SUBJECT: ABSTRACT: Installation guide for SolidWorks Electrical 2014 on the server Guide

More information

Image Assistant. User Guide. Image Assistant. Laplink Software, Inc. User Guide. The ONLY Way to Restore an Old Image to a New PC!

Image Assistant. User Guide. Image Assistant. Laplink Software, Inc. User Guide. The ONLY Way to Restore an Old Image to a New PC! 1 Image Assistant Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com Laplink Software, Inc. 14335 NE 24th Street, Suite 201

More information

Introduction to Windows 7 (Brought to you by RMRoberts.com)

Introduction to Windows 7 (Brought to you by RMRoberts.com) Introduction to Windows 7 (Brought to you by RMRoberts.com) Note: Because of the number of screen captures needed to adequately explain this topic there have been some page breaks inserted to keep content

More information

Lecture 6: Operating Systems and Utility Programs

Lecture 6: Operating Systems and Utility Programs Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

CME 405 Building Information Modeling for Construction Management 3 Credits (3 Lecture Hours)

CME 405 Building Information Modeling for Construction Management 3 Credits (3 Lecture Hours) CME 405 Building Information Modeling for Construction Management 3 Credits (3 Lecture Hours) Lecture Meets in 154 Baker Hall, Monday, Wednesday, and Fridays 9:30-10:25 AM Instructor Paul Crovella 219

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT

MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT MICROSOFT ENROLLMENT FOR EDUCATION SOLUTIONS (EES) AGREEMENT Frequently Asked Questions Abstract This Enrollment provides Duval County Public Schools a license for certain specified Microsoft Products

More information

End-User troubleshooting guide For Sentinel SuperPro/UltraPro and Sentinel Hardware Keys

End-User troubleshooting guide For Sentinel SuperPro/UltraPro and Sentinel Hardware Keys End-User troubleshooting guide For Sentinel SuperPro/UltraPro and Sentinel Hardware Keys Preface Welcome to Safenet End User Troubleshooting guide! This guide is intended to assist our Distributors, Customers

More information

Yale Software Library

Yale Software Library e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or helpdesk@yale.edu Installation PGP Desktop for Windows Operating Systems Preparing your computer:

More information

COMPUTER SCIENCE 130 Online Course CS-G130 #54558- Survey Of Comp Science/Info Fall 2015 (8/23/15 12/13/15) Class Syllabus and Schedule

COMPUTER SCIENCE 130 Online Course CS-G130 #54558- Survey Of Comp Science/Info Fall 2015 (8/23/15 12/13/15) Class Syllabus and Schedule INSTRUCTOR NAME: INSTRUCTOR EMAIL: COURSE FORMAT: Jyoti Chandra jchandra@gwc.cccd.edu Online COURSE OBJECTIVES: As objectives of the course we shall: be aware of historical computer developments, learn

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

VirtualXP Users Guide

VirtualXP Users Guide VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter

More information

User Guide. Windows 8 Upgrade Assistant. Laplink Software, Inc. MN-PCM-UpgdAssist-EN-08 (REV. 10/2012)

User Guide. Windows 8 Upgrade Assistant. Laplink Software, Inc. MN-PCM-UpgdAssist-EN-08 (REV. 10/2012) 1 Windows 8 Upgrade Assistant User Guide Laplink Software, Inc. For technical support issues or questions, please visit: http://www.laplink.com/contact For other inquiries, please see contact details below:

More information

Autodesk Inventor on the Macintosh

Autodesk Inventor on the Macintosh Autodesk Inventor on the Macintosh FREQUENTLY ASKED QUESTIONS 1. Can I install Autodesk Inventor on a Mac? 2. What is Boot Camp? 3. What is Parallels? 4. How does Boot Camp differ from Virtualization?

More information

How To Install The Safenet-Inc.Com Software On A Pc Or Mac Or Macintosh (For A Powerpoint) With A Powerline (For Windows) Or Ipad (For Mac) With The Safetime (For Pc

How To Install The Safenet-Inc.Com Software On A Pc Or Mac Or Macintosh (For A Powerpoint) With A Powerline (For Windows) Or Ipad (For Mac) With The Safetime (For Pc End-User troubleshooting guide For Sentinel SuperPro/UltraPro and Sentinel Hardware Keys 1 Preface Welcome to Safenet End User Troubleshooting guide! This guide is intended to assist our Distributors,

More information

Compare Diskeeper with the built-in Defragmenter in Windows 2000, Windows XP and Windows Server 2003

Compare Diskeeper with the built-in Defragmenter in Windows 2000, Windows XP and Windows Server 2003 Compare Diskeeper with the built-in Defragmenter in Windows 2000, Windows XP and Windows Server 2003 Diskeeper for Windows NT /2000/XP SPEED OF OPERATION Fastest Windows defragmenter ever built. Defragments

More information

Student Wireless Network Access Guide (Windows) v2.6 (21/09/2011)

Student Wireless Network Access Guide (Windows) v2.6 (21/09/2011) Student Wireless Network Access Guide (Windows) v2.6 (21/09/2011) To successfully connect the student wireless network your device must meet the following requirements: Windows XP with Service Pack 2,

More information

User s Manual Diskeeper for Windows

User s Manual Diskeeper for Windows User s Manual Diskeeper for Windows May 2006 This document describes the installation and operation of Diskeeper Corporation s Diskeeper, The Number One Automatic Defragmenter for Microsoft Windows. It

More information

Autodesk 3ds Max 2010 Boot Camp FAQ

Autodesk 3ds Max 2010 Boot Camp FAQ Autodesk 3ds Max 2010 Boot Camp Frequently Asked Questions (FAQ) Frequently Asked Questions and Answers This document provides questions and answers about using Autodesk 3ds Max 2010 software with the

More information

Information Technology

Information Technology Information Technology Symantec Endpoint Protection Download and Installation The packages on the web include virus and spyware protection for 32 and 64 bit Microsoft Windows systems. Minimum system requirements:

More information

How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications

How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications Important Applies to Windows 7 Professional, Ultimate, Enterprise As of April 8, 2014, technical

More information

Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services

Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services 2000 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 www.filemaker.com FileMaker

More information

Minimum Computer System Requirements

Minimum Computer System Requirements Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

Basic Computer Maintenance

Basic Computer Maintenance Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0

INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0 INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0 PLEASE NOTE PRIOR TO INSTALLING On Windows 8, Windows 7 and Windows Vista you must have Administrator rights to install the software. Installing Enterprise Dynamics

More information

Using Spectra on Mac

Using Spectra on Mac Using Spectra on Mac Last updated 03/22/2013 Please note: Instructions related to all third party software contained in this document are subject to change without notice. Please refer to the appropriate

More information

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Getting Started with VMware Fusion

Getting Started with VMware Fusion Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

Install and Configure SQL Server Database Software Interview Questions and Answers

Install and Configure SQL Server Database Software Interview Questions and Answers Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle

More information

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide

Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS Quick Start Guide Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS (1-866-787-8677). For online support

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

USER MANUAL SlimComputer

USER MANUAL SlimComputer USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14

More information

Ubuntu Linux Reza Ghaffaripour May 2008

Ubuntu Linux Reza Ghaffaripour May 2008 Ubuntu Linux Reza Ghaffaripour May 2008 Table of Contents What is Ubuntu... 3 How to get Ubuntu... 3 Ubuntu Features... 3 Linux Advantages... 4 Cost... 4 Security... 4 Choice... 4 Software... 4 Hardware...

More information

At Your Service Repair Centre Installation Guide

At Your Service Repair Centre Installation Guide At Your Service Repair Centre Installation Guide Revision 3.4.014 Copyright 2000-2012 At Your Service Software, Inc. At Your Service Software, Inc. P.O. Box 83021 1180 Victoria Park Avenue Toronto, ON

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Installation Guide Sybase ETL Small Business Edition 4.2 for Windows

Installation Guide Sybase ETL Small Business Edition 4.2 for Windows Installation Guide Sybase ETL Small Business Edition 4.2 for Windows Document ID: DC00738-01-0420-01 Last revised: April 2007 Topic Page 1. Overview 2 2. Before you begin 2 2.1 Review system requirements

More information

F ALL 2 0 1 5 Computer Purchase Guide

F ALL 2 0 1 5 Computer Purchase Guide COLLEGE OF ARTS + ARCHITECTURE F ALL 2 0 1 5 Computer Purchase Guide WHO IS REQUIRED TO HAVE A LAPTOP? First year students (both undergraduate and graduate) are required to have a laptop in their first

More information

Crystal Quality Business Optimization System Installation Guide

Crystal Quality Business Optimization System Installation Guide Crystal Quality Business Optimization System Installation Guide Crystal Quality Installation Crystal quality has a fully automated installation package that install all the needed softwares and components.

More information

User Manual. HitmanPro.Kickstart User Manual Page 1

User Manual. HitmanPro.Kickstart User Manual Page 1 User Manual HitmanPro.Kickstart User Manual Page 1 Table of Contents 1 Introduction to HitmanPro.Kickstart... 3 2 What is ransomware?... 4 3 Why do I need HitmanPro.Kickstart?... 6 4 Creating a HitmanPro.Kickstart

More information

About Parallels Desktop 7 for Mac

About Parallels Desktop 7 for Mac About Parallels Desktop 7 for Mac Parallels Desktop 7 for Mac is a major upgrade to Parallels' award-winning software for running Windows on a Mac. About this Update This update for Parallels Desktop for

More information

Syllabus: TB143 Introduction to Personal Computers

Syllabus: TB143 Introduction to Personal Computers Syllabus: TB143 Introduction to Personal Computers Instructor: Office hours: Class hours: Course Description Organization of a typical Personal Computer (PC) is examined in a given popular operating systems

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...

More information

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4. Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations.

To ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations. Step 2- Computer Check Before you attempt to login to University resources it is important to make sure your computer will support an online course, or an accelerated course with an online component. It

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl

More information

iborrow Technical Report (Client Environment)

iborrow Technical Report (Client Environment) iborrow Technical Report (Client Environment) Geoff Kimmons 17.12.2009 1 Table of Contents 1 Introduction... 3 2 Client environment... 3 3 Technical issues... 3 3.1 iborrow client hardware... 3 3.2 Client

More information

FortiClient dialup-client configurations

FortiClient dialup-client configurations FortiClient dialup-client configurations By, Rahul Prajapati Sr. Engineer Network Security Sify Technologies Limited Page 1 of 14 Introduction of FortiClient The FortiClient Host Security application is

More information

AP ENPS ANYWHERE. Hardware and software requirements

AP ENPS ANYWHERE. Hardware and software requirements AP ENPS ANYWHERE Hardware and software requirements Contents Server requirements 3 Hard drives 5 Virtual machines 6 AP ENPS mobile server 6 Client requirements 7 AP ENPS client on a Mac-based computer

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

7 Steps to Safer Computing

7 Steps to Safer Computing 7 Steps to Safer Computing These are the seven essentials: - Use a firewall. - Keep your software up to date. - Use an up to date antivirus program. - Use an up to date anti-spyware program. - Only download

More information

Simnet Registry Repair 2011. User Guide. Edition 1.3

Simnet Registry Repair 2011. User Guide. Edition 1.3 Simnet Registry Repair 2011 User Guide Edition 1.3 1 Content Getting Started...3 System requirements...3 Minimum system requirements...3 Recomended system specifications...3 Program Overview...4 About

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

Setting up for Adobe Connect meetings

Setting up for Adobe Connect meetings Setting up for Adobe Connect meetings When preparing to lead a live lecture or meeting, you probably ensure that your meeting room and materials are ready before your participants arrive. You run through

More information