How To Get A Computer At Unmass Amherst

Size: px
Start display at page:

Download "How To Get A Computer At Unmass Amherst"

Transcription

1 COMPUTING & TECHNOLOGY at UMass Amherst Parents guide to technology resources

2 Important! Does your student already have a computer to bring to campus? If not, do you intend to purchase a computer before the end of the summer? 2

3 Computer Basics Check our recommended computer configurations U$ave discounts on computers & peripherals Computers must have a wifi-certified, dual-band adapter 3

4 Software & Hardware Discounts STEM students are eligible for free Windows operating systems & other Microsoft software Free Microsoft Office 365, Mathematica & other software Free distribution of Linux - Ubuntu UMass Students are not required to bring a computer 4

5 Public Computers Computer Classrooms & Library Services Windows & Macintosh computers High-end academic software Remote printing in the Learning Commons Digital Media Lab 3D Printers 5

6 Important! How many of you would like access to your student s university bill? 6

7 Privacy & Student Records Federal law limits access to student records. FERPA Privacy Waiver Students can add up to 4 designees in SPIRE PIN can be used when contacting the Office of the Bursar, Financial Aid, and Housing Services Waiver does not apply to academic records (grades) or other university information 7

8 Copyright Infringement UMass Amherst receives hundreds of violations each semester Violators may be subject to legal action, fines, and even academic sanctions Out-of-court settlements, paid by students families, can be very expensive! 8

9 How to Avoid Copyright Infringement Uninstall peer-to-peer (P2P) software, including bittorrent, popcorn time, and other illegal file sharing programs Use Amazon, Pandora, Hulu, Netflix, or other legal alternatives Take our anonymous Copyright Quiz! 9

10 Computer & Personal Protection Software & Data Security Anti-virus software Security patches Software updates Firewall File backups Physical Security Laptop security cable Lock the door Over 100 HELP phones across campus 10

11 Beware of Phishing & Identity Theft Students should not: Post their address, birth date, or class schedule on social networking sites Send sensitive information via in response to official messages Do not ask students for their NetID or password The university will never ask for account passwords or other sensitive personal information via . 11

12 How many of you will discuss Copyright Infringement Software & Data Security Phishing on the ride home with your student? 12

13 Go Wireless with eduroam! In all residence halls & many campus locations Wifi-certified, dual-band adapter required More secure, encrypted network access Automatic login once configured Wireless access at peer institutions Run the XpressConnect setup wizard from home! 13

14 Devices to Leave at Home Signals from wireless-enabled devices can interfere with the campus wireless network. Wireless printers Wireless routers/hotspots Apple Time Capsule Wireless controllers & other peripherals 14

15 UMass Amherst IT Services Moodle Online Courses Google Apps & Collaboration OWL Online Web Learning Atomic Learning Software Tutorials Go.Umass Online Web Portal i>clicker Audience Response System 15

16 Technology Support & Resources Visit our website: it.umass.edu Contact the IT User Services Help Center Chat with us live Submit an online help request Call TECH (8324) or Stop by A109 LGRC Lowrise Monday Friday 8:30 a.m. 4:45 p.m. IT Consultants are also available in the Learning Commons on the Lower Level of the W.E.B. Du Bois Library. 16

17 Student Employment Positions available for year-round work: Computer Classrooms consultants Help Center consultants All majors welcome. Application details available at: it.umass.edu/about/employment 17

18 Students Should Stay Informed youtube.com/umassamherstit blogs.umass.edu/techbytes it.umass.edu/events 18

19 Questions? it.umass.edu

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

Getting Connected. Student Technology Services

Getting Connected. Student Technology Services Getting Connected Student Technology Services 2015-2016 Contents Welcome 3 Your Computer 4 Network Services 5 Network Assistance 6 Emergency Notification 8 Labs and Printing 9 Student Technology Store

More information

Introduction to Technology at Immaculata University. www.immaculata.edu

Introduction to Technology at Immaculata University. www.immaculata.edu Introduction to Technology at Immaculata University IU Campus Network Username: first initial + last name (e.g. John Smith = jsmith) Note: There may be a number at the end of your username if you have

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Account Information... 2 2 - Setting up Accounts for First Time Use... 3 3 - Important Systems... 4 4 - CaTS Website... 5 5 - Logging into the Campus

More information

Computer, Phone, and Network Guidelines at Lipscomb University. Mike Green, VP and CIO Lipscomb University mike.green@lipscomb.

Computer, Phone, and Network Guidelines at Lipscomb University. Mike Green, VP and CIO Lipscomb University mike.green@lipscomb. Computer, Phone, and Network Guidelines at Mike Green, VP and CIO mike.green@lipscomb.edu (615) 966-5667 1 Open Lab Computing Availability There are about 250 student-accessible computers across the campus

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

If you re illegally downloading music from P2P filesharing applications like KaZaA, BitTorrent, or Limwire not only is your computer at risk for viruses, but you re at risk for school suspension, heavy

More information

About This Guide. Security considerations are denoted by a lock icon.

About This Guide. Security considerations are denoted by a lock icon. About This Guide This guide introduces students to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible. It is an overview of the

More information

Corporate Information & Computing Services. IT Services For University Staff.

Corporate Information & Computing Services. IT Services For University Staff. Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate

More information

Computing Services and Systems Development 2015 2016 PittStart

Computing Services and Systems Development 2015 2016 PittStart Computing Services and Systems Development 2015 2016 PittStart CSSD @ Pitt We provide the technology tools and services that make your life at Pitt easier! Visit us at technology.pitt.edu Presentation

More information

Students. Information Technology Support Services Fall 2015

Students. Information Technology Support Services Fall 2015 Information Technology Support Services Fall 2015 Students On behalf of Information Technology, we would like to welcome you to USF. Our job is to make sure you receive the necessary support to complete

More information

Before we get started

Before we get started www.ndsu.edu/it Before we get started Your IT Accounts N.D. University System Identifier Typically FirstName.LastName Use to access: Campus Connection Register for classes Pay tuition and fees NDSU Electronic

More information

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista Get Connected! How to Configure Your Computer for MITnet Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista 2008 Massachusetts Institute of Technology Table of Contents Introduction...3 About

More information

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

The Student Guide to Information Technology at Landmark College

The Student Guide to Information Technology at Landmark College The Student Guide to Information Technology at Landmark College Information technology is an integral part of every aspect of Landmark College's education program. It affects everything from the network

More information

Security considerations are denoted by a lock icon.

Security considerations are denoted by a lock icon. About This Guide This guide introduces you to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible to you. It is an overview of

More information

Getting Your Multifunction Back On Your Network After A Router Or Network Change

Getting Your Multifunction Back On Your Network After A Router Or Network Change Getting Your Multifunction Back On Your Network After A Router Or Network Change PIXMA MX340 Windows OS 1 If any of the following situations exist, you will need to Uninstall and Re-Install the MP Drivers

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

1-port USB 2.0 Print Server. Manual (GPSU21)

1-port USB 2.0 Print Server. Manual (GPSU21) 1-port USB 2.0 Print Server Manual (GPSU21) 2006 IOGEAR. All Rights Reserved. Part No. M0374 IOGEAR, the IOGEAR logo, is trademarks or registered trademarks of IOGEAR, Inc. Microsoft and Windows are registered

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

Information Technology Resources

Information Technology Resources Student Guide 2011-2012 office of the Chief Information Officer Information Technology Resources IT.OSU.EDU The student guide to computing, learning technologies, cable TV, Buckeye Mail, safe computing,

More information

McGill-Toolen Catholic High School Technology Acceptable Use Policy

McGill-Toolen Catholic High School Technology Acceptable Use Policy McGill-Toolen Catholic High School Technology Acceptable Use Policy Ben Fancher Director of Instructional Technology June 24, 2015 Ben Fancher email: fancheb@mcgill-toolen.org McGill-Toolen Catholic High

More information

Corporate Information & Computing Services. IT Services For University Staff.

Corporate Information & Computing Services. IT Services For University Staff. Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Student Affairs Information Technology Policies. January 2013

Student Affairs Information Technology Policies. January 2013 Student Affairs Information Technology Policies January 2013 Contents Applications Consultants and Non-SAIT Technical Staff Computers and Equipment Data: Local, Network, and Backups E-Mail Relationships

More information

Faculty technology Reference Guide

Faculty technology Reference Guide Faculty technology Reference Guide 2015-2016 CONTACTS CENTER FOR INSTRUCTION AND TECHNOLOGY (CIT): 422-2223 Basement of School of Education [ cit@usfca.edu ] CLASSROOM TECHNOLOGY: 422-6668 Lone Mountain

More information

AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network

AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network AeroLab Wireless Network Code of Conduct The AeroLab wireless network is intended for academic use only. Any use of the wireless network for BitTorrent or other Peer-to-Peer file sharing is strictly prohibited.

More information

Simon School IT FAQ Guide

Simon School IT FAQ Guide Simon School IT FAQ Guide 1 What Are The Suggested Specs My Computer Should Have? The Simon School Information Technology Department can make the following suggestions: Windows XP Operating System 1) CPU

More information

McDonough School of Business: MSBTC SLA 2014

McDonough School of Business: MSBTC SLA 2014 McDonough School of Business: MSBTC SLA 2014 Contents Service Level Agreement... 4 Contacting a Technician... 4 MSBTC Hours of Operation... 5 Trouble Call Problem Priority... 5 Priority 1... 5 Priority

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit

Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit Marc D. Goldstone Vice President and Associate General Counsel Community Health Systems Gerald Jud E. DeLoss Gray Plant

More information

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks:

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks: DECS Community IT Michigan State University College of Engineering DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK For all questions and requests visit www.egr.msu.edu/decs or 1325EB, e mail

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

ResNet Computer Consultant Job Description

ResNet Computer Consultant Job Description ResNet Computer Consultant Job Description Description: ResNet is the Internet Service Provider within the Residence Halls and Family and Graduate Housing at Montana State University. In addition to providing

More information

Get In, Get Unpacked, Get Connected.

Get In, Get Unpacked, Get Connected. Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. WELCOME to your New Home and to Unlimited Free Internet Welcome to your new university accommodation and to unlimited free

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Century Commons' Internet Use

Century Commons' Internet Use Century Commons' Internet Use Please Note: Even though you are unable to access the Internet, the sites below are always available. Open up Internet Explorer and type any of these in your address bar to

More information

Common Student Computing Environment

Common Student Computing Environment Getting started Computer clusters www.gla.ac.uk/services /it/forstudents University central provision University Library McMillan Reading Room Fraser Building Social Sciences College provision Stair Building

More information

Carl H. Lindner College of Business

Carl H. Lindner College of Business Carl H. Lindner College of Business Information Technology Overview Autumn 2013 Shannon Funk Director of Information Technology Shannon.Funk@uc.edu LCB IT Team Shannon Funk Director of Information Technology

More information

IT user guide. Campus WiFi eduroam. September 2015. www.kent.ac.uk/itservices Information Services

IT user guide. Campus WiFi eduroam. September 2015. www.kent.ac.uk/itservices Information Services IT user guide Campus WiFi eduroam September 2015 www.kent.ac.uk/itservices Information Services Before you get online Hello eduroam! You can pick up the University WiFi service eduroam in all indoor spaces

More information

EMR Link Server Interface Installation

EMR Link Server Interface Installation EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

Law College Computer and Technology Information

Law College Computer and Technology Information Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow

More information

MANDATORY EMR FUNDING ELIGIBILITY SCHEDULE

MANDATORY EMR FUNDING ELIGIBILITY SCHEDULE MANDATORY EMR FUNDING ELIGIBILITY SCHEDULE The following terms and conditions form a part of the terms and conditions of the contract to which it is attached as a schedule. The subscriber/licensee (in

More information

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification

More information

Networking in the Colleges

Networking in the Colleges Networking in the Colleges A Guide For Internal & Intensive School Students Contents Appropriate Use and Your Obligations... 1 Virus Protection... 2 Minimum Computer Requirements... 2 Registering Your

More information

Agenda. The Bridge New Hire Wizard Security Groups in ezlabormanager and Workforce Now 2.0 ADP Mobile Support Center https://support.adp.

Agenda. The Bridge New Hire Wizard Security Groups in ezlabormanager and Workforce Now 2.0 ADP Mobile Support Center https://support.adp. It s About Time! Agenda The Bridge New Hire Wizard Security Groups in ezlabormanager and Workforce Now 2.0 ADP Mobile Support Center https://support.adp.com The Bridge The Bridge There are currently 285

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases M20462 Administering Microsoft SQL Server Databases Description: This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Technology Quick Reference revised Fall 2014

Technology Quick Reference revised Fall 2014 Where do I go? www.sandburg.edu mysandburg Student Portal Click on the link in the upper right-hand corner of the Sandburg website What is it? How can I use it? Carl Sandburg College website. All general

More information

Wireless Home Network Setup. Dan Wenz Chris Kiscaden

Wireless Home Network Setup. Dan Wenz Chris Kiscaden Wireless Home Network Setup Dan Wenz Chris Kiscaden Key Questions Why is wireless beneficial? What are the necessary components? What do these components do? How do I set up a wireless network? Why wireless?

More information

Please review and make copies of the following documents for each designated staff in need of Valley Express access.

Please review and make copies of the following documents for each designated staff in need of Valley Express access. Welcome to Valley Express (VE) Valley Express is Valley Health Plan s (VHP) Authorization and Referral data system. By signing this document, the individual signifies that the County s User Responsibility

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

Essentials. IT services for undergraduate and. taught postgraduate students 2015/16

Essentials. IT services for undergraduate and. taught postgraduate students 2015/16 Essentials IT services for undergraduate and taught postgraduate students 2015/16 Getting Started Activate your computing account This guide will help you to get started with the IT services you will use

More information

Office of Information Technology. Welcome

Office of Information Technology. Welcome Welcome Main Offices in Echlin Hall M-F 8:30-4:30 Vincent Mangiacapra Associate VP/CIO 203-932-7058 / VMangiacapra@newhaven.edu Greg Bartholomew Director of Networking/Systems Operations 203-932-7059 GBartholomew@newhaven.edu

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

Yale School of Art Digital Technology Office Information

Yale School of Art Digital Technology Office Information Yale School of Art Digital Technology Office Information Online: http://art.yale.edu/diglab/ Email: art.help@yale.edu Phone: 203-432- 9120 Edgewood Email: sculpture.help@yale.edu The Digital Technology

More information

AirWatch for Android Devices

AirWatch for Android Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

Computing Orientation

Computing Orientation Computing Orientation Welcome to Carnegie Mellon! Computing Orientation Online Orientation Computing Resources Websites Security Online Orientation http://www.heinz.cmu.edu Current Students -> Computing

More information

Information Technology Services August 19, 2015 - Fall 2015

Information Technology Services August 19, 2015 - Fall 2015 Information Technology Services August 19, 2015 - Fall 2015 IT Services Cover All of the University and Community 2 Internally Connected University & Community Teaching & Learning Research Support R&D

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

Internet and Cable Television Connection Kit. Spring 2016

Internet and Cable Television Connection Kit. Spring 2016 Spring 2016 Internet and Cable Television Connection Kit Your guide to connecting to network and television services within Northeastern s residence halls. ITS Welcomes You! Information Technology Services

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

AMBERTON UNIVERSITY e-course SYLLABUS

AMBERTON UNIVERSITY e-course SYLLABUS AMBERTON UNIVERSITY e-course SYLLABUS MGT6154.E1 PROJECT MANAGEMENT APPLICATIONS SPRING 2016 PROFESSOR INFORMATION: Name: Dr. Ron C. Darnell Phone Number: 972-279-6511 ext. 152 (Use Amberton ext. #) Email

More information

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff I N T R O D U C T I O N This tutorial provides some basic information and practical suggestions for protecting

More information

Discovering Computers

Discovering Computers Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD)

Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD) Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD) Contents PURPOSE AND PLAN... 3 FREQUENTLY ASKED QUESTIONS... 4 STUDENTS... 4 STAFF... 5 PARENTS... 6 POLICY REFERENCES

More information

HIGHER EDUCATION LEADERSHIP & MANAGEMENT GRADUATE CERTIFICATE STUDENT HANDBOOK

HIGHER EDUCATION LEADERSHIP & MANAGEMENT GRADUATE CERTIFICATE STUDENT HANDBOOK HIGHER EDUCATION LEADERSHIP & MANAGEMENT GRADUATE CERTIFICATE STUDENT HANDBOOK 2015-2016 Higher Education Program Educational Policy, Research & Administration College of Education University of Massachusetts

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Employee Service Level Agreement

Employee Service Level Agreement Employee Service Level Agreement 1.0 Purpose 2.0 Term and Scope of Agreement 3.0 Scope of Service 3.1 Support Environment 3.2 Local Computer Administrative Privileges 4.0 Support Response Levels 4.1 Exceptions

More information

Version 2 January 2015

Version 2 January 2015 Version 2 January 2015 IT SUPPORT HANDBOOK FOR BYO DEVICES 2015 INSTALLING SOFTWARE... 1 Microsoft Office... 1 Setting up Office preferences... 5 Setting up your College email account for the first time

More information

MSP Center Plus Features Checklist

MSP Center Plus Features Checklist Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,

More information

Table of Contents. 1. Specifications of your laptop:

Table of Contents. 1. Specifications of your laptop: Parent/Student Laptop Manual 2012-2013 Table of Contents 1. Specifications of your laptop: 2. Terms of Use: a. Title b. Loss or Damage c. Repossession d. Use and Maintenance Fees e. Network Use f. Internet

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Richardson ISD. BYOD Bring Your Own Device

Richardson ISD. BYOD Bring Your Own Device Richardson ISD BYOD Bring Your Own Device BRING YOUR OWN DEVICE It is a goal of the Board of Trustees of the Richardson Independent School District (RISD or the District) that students are prepared for

More information

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011 Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up

More information

Before you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3

Before you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3 Advanced IT user guide Staff laptop setup For staff laptops owned by the University Contents Before you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3

More information

Service Level Standard

Service Level Standard Service Level Standard Personal Devices Revision History Date Version Changes 2/17/2012 1.00 Initial Draft Special Note: Service Level Standards will be reviewed and updated following the end of the spring

More information

Information Technology Services (ITS) Update

Information Technology Services (ITS) Update May 9, 2012 Dear Trinity Community, Information Technology Services (ITS) Update As the flurry of the end of a busy spring semester comes to close, Information Technology Services is gearing up for many

More information

1:1 LAPTOP PROGRAM FAQS

1:1 LAPTOP PROGRAM FAQS 1:1 LAPTOP PROGRAM FAQS Accessories Batteries Breakage, Theft or Loss Costs Distribution File Access and Storage Internet Access Loaner Laptops Logging in Ownership Personal Use Philosophy of Program Printing

More information

Welcome to Vernier LabQuest Viewer Software v1.0 Note: LabQuest Viewer Features Set up LabQuest 2 to work with LabQuest Viewer software via Wi-Fi

Welcome to Vernier LabQuest Viewer Software v1.0 Note: LabQuest Viewer Features Set up LabQuest 2 to work with LabQuest Viewer software via Wi-Fi Welcome to Vernier LabQuest Viewer Software v1.0 The LabQuest Viewer is computer software that is used to display and control the screen of a LabQuest using a computer. This can be done to demonstrate

More information

Useful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs

Useful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs Useful Tips for Reducing the Risk of Unauthorized Access for Laser Beam Printers and Small-Office MFPs (LBP and MF series) Important: System administrators are advised to read. Overview and Use of this

More information

Use of ESF Computing and Network Resources

Use of ESF Computing and Network Resources Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among

More information

AzMERIT Secure Browser Installation Manual For Technology Coordinators

AzMERIT Secure Browser Installation Manual For Technology Coordinators AzMERIT Secure Browser Installation Manual For Technology Coordinators 2014-2015 Revised January 5, 2015 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information

More information

UW IT Help Desk - Best Email Storage SkyDrive, Office 365

UW IT Help Desk - Best Email Storage SkyDrive, Office 365 Fall 2013 In this issue: Welcome Help Desk - Best IT Resource More Email Storage SkyDrive, Office Web Apps Faster Response Times Training Workshop Schedule Classroom Technology Computing Research Support

More information

TE100-P21/TEW-P21G Windows 7 Installation Instruction

TE100-P21/TEW-P21G Windows 7 Installation Instruction Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

A guide to the systems & procedures utilized

A guide to the systems & procedures utilized Student Guidebook A guide to the systems & procedures utilized in your DeVry education 1 Table of Contents IT Helpdesk - Hours of Operation. 3 IT Helpdesk - Contact Information... 3 Student Accounts. 4

More information

IT Information Packet

IT Information Packet IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology

More information

Sharing Pictures, Music, and Videos on Windows Media Center Extender

Sharing Pictures, Music, and Videos on Windows Media Center Extender Sharing Pictures, Music, and Videos on Windows Media Center Extender Applies to: Microsoft Windows XP Media Center Edition Microsoft Windows Media Center Extender Microsoft Windows Media Center Extender

More information

New Student Checklists

New Student Checklists New Student Checklists Before the Semester Begins Get Your Education Benefits in Check Veteran Education Benefits Visit the VONAPP (Veterans On Line Application) website to apply for your GI Bill benefits.

More information

Intel Unite Solution. Standalone User Guide

Intel Unite Solution. Standalone User Guide Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel

More information