Computing & Technology at UMass Amherst. Parent s guide to technology resources

Size: px
Start display at page:

Download "Computing & Technology at UMass Amherst. Parent s guide to technology resources"

Transcription

1 Computing & Technology at UMass Amherst Parent s guide to technology resources Fall 2016

2 Does your student already have a computer to bring to campus? If not, do you intend to purchase a computer before the end of the summer?

3 Computer Basics Students are not required to own a computer Check our recommended computer configurations U$ave discounts on computers & peripherals Computers must have a WiFi-certified 802.1X ac compliant adapter

4 Public Computers Computer Classrooms & the Library Learning Commons: Windows & Mac computers with academic software Remote printing in the Learning Commons Digital Media Lab 3D printers & scanners

5

6 Free & Low-Cost Free McAfee Antivirus Free Office 365 Education Discounts on Microsoft & Adobe software Free distribution of Linux Ubuntu UMass Discounts on cell phones, plans & accessories

7 Copyright Infringement UMass Amherst receives hundreds of violations each year. Each notice may result in fines, university sanctions, even a lawsuit. Out-of-court settlements, paid by the students families, can be very expensive!

8 How to Avoid Copyright Infringement Uninstall peer-to-peer (P2P) software, including Bittorrent, Popcorn Time, and other illegal file sharing programs. Use Amazon, Pandora, Hulu, Netflix, or other legal alternatives. Take our anonymous copyright quiz! Available to the public at umass.edu/it/copyright

9 Computer & Personal Protection Software & Data Security McAfee Antivirus Security patches Software updates Firewall File backups Password security program Physical Security Laptop security cable Lock the door

10 Beware of Phishing & Identity Theft Phishing scams rely on human behavior. Students should not: Post their address, birth date, or class schedule on social media. Send sensitive information via in response to official messages. Respond to or engage with suspicious text messages or s Do not ask students for their NetID or password. The university will never ask for account passwords or other sensitive personal information via .

11 Example of a Phishing The from address is UMass Amherst IT will never ask you to verify your account by

12 How many of you will discuss Copyright infringement Software & data security Phishing with your student?

13 Go Wireless with eduroam In all residence halls & many campus locations WiFi-certified, 802.1X ac compliant adapter required Run the XpressConnect setup wizard from home: Go to umass.edu/it/xpressconnect and login with your NetID and password.

14 Devices to Leave at Home Signals from these wireless-enabled devices can interfere with the campus wireless network: Wireless printers Wireless routers Apple Time Capsule Other wireless peripherals (keyboards, game controllers, cordless phones, etc.)

15 IT Services Moodle Online courses Google Apps & Collaboration OWL Online Web Learning Atomic Learning Software tutorials i>clicker Audience response system Box File storage & sharing

16 Technology Support & Resources Visit our website: umass.edu/it Contact IT User Services: Chat with us live Submit an online help request Call TECH (8324) Stop by A109 Lederle Graduate Research Center (Lowrise) (M-F 8:30 a.m. 5:00 p.m.) IT Consultants are available after hours in the Learning Commons on the Lower Level of the W.E.B DuBois Library

17 Student Employment Positions available for year-round work: User Services Consultants Computer Classrooms consultants All majors welcome. Application details can be found at: umass.edu/it/about/employment

18 Stay facebook.com/umassamherstit umass.edu/it/events

19 Questions? umass.edu/it

20 umass.edu/it

Computer, Phone, and Network Guidelines at Lipscomb University. Mike Green, VP and CIO Lipscomb University mike.green@lipscomb.

Computer, Phone, and Network Guidelines at Lipscomb University. Mike Green, VP and CIO Lipscomb University mike.green@lipscomb. Computer, Phone, and Network Guidelines at Mike Green, VP and CIO mike.green@lipscomb.edu (615) 966-5667 1 Open Lab Computing Availability There are about 250 student-accessible computers across the campus

More information

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

Before we get started

Before we get started www.ndsu.edu/it Before we get started Your IT Accounts N.D. University System Identifier Typically FirstName.LastName Use to access: Campus Connection Register for classes Pay tuition and fees NDSU Electronic

More information

Computing Services and Systems Development 2015 2016 PittStart

Computing Services and Systems Development 2015 2016 PittStart Computing Services and Systems Development 2015 2016 PittStart CSSD @ Pitt We provide the technology tools and services that make your life at Pitt easier! Visit us at technology.pitt.edu Presentation

More information

Student Affairs Information Technology Policies. January 2013

Student Affairs Information Technology Policies. January 2013 Student Affairs Information Technology Policies January 2013 Contents Applications Consultants and Non-SAIT Technical Staff Computers and Equipment Data: Local, Network, and Backups E-Mail Relationships

More information

Getting Connected. Student Technology Services

Getting Connected. Student Technology Services Getting Connected Student Technology Services 2015-2016 Contents Welcome 3 Your Computer 4 Network Services 5 Network Assistance 6 Emergency Notification 8 Labs and Printing 9 Student Technology Store

More information

If you re illegally downloading music from P2P filesharing applications like KaZaA, BitTorrent, or Limwire not only is your computer at risk for viruses, but you re at risk for school suspension, heavy

More information

About This Guide. Security considerations are denoted by a lock icon.

About This Guide. Security considerations are denoted by a lock icon. About This Guide This guide introduces students to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible. It is an overview of the

More information

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff I N T R O D U C T I O N This tutorial provides some basic information and practical suggestions for protecting

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Account Information... 2 2 - Setting up Accounts for First Time Use... 3 3 - Important Systems... 4 4 - CaTS Website... 5 5 - Logging into the Campus

More information

EMR Link Server Interface Installation

EMR Link Server Interface Installation EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call

More information

Security considerations are denoted by a lock icon.

Security considerations are denoted by a lock icon. About This Guide This guide introduces you to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible to you. It is an overview of

More information

ResNet Computer Consultant Job Description

ResNet Computer Consultant Job Description ResNet Computer Consultant Job Description Description: ResNet is the Internet Service Provider within the Residence Halls and Family and Graduate Housing at Montana State University. In addition to providing

More information

Version 2 January 2015

Version 2 January 2015 Version 2 January 2015 IT SUPPORT HANDBOOK FOR BYO DEVICES 2015 INSTALLING SOFTWARE... 1 Microsoft Office... 1 Setting up Office preferences... 5 Setting up your College email account for the first time

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

IT Information Packet

IT Information Packet IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology

More information

Simon School IT FAQ Guide

Simon School IT FAQ Guide Simon School IT FAQ Guide 1 What Are The Suggested Specs My Computer Should Have? The Simon School Information Technology Department can make the following suggestions: Windows XP Operating System 1) CPU

More information

Table of Contents. 1. Specifications of your laptop:

Table of Contents. 1. Specifications of your laptop: Parent/Student Laptop Manual 2012-2013 Table of Contents 1. Specifications of your laptop: 2. Terms of Use: a. Title b. Loss or Damage c. Repossession d. Use and Maintenance Fees e. Network Use f. Internet

More information

Corporate Information & Computing Services. IT Services For University Staff.

Corporate Information & Computing Services. IT Services For University Staff. Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate

More information

Internet and Cable Television Connection Kit. Spring 2016

Internet and Cable Television Connection Kit. Spring 2016 Spring 2016 Internet and Cable Television Connection Kit Your guide to connecting to network and television services within Northeastern s residence halls. ITS Welcomes You! Information Technology Services

More information

High-Speed Internet Quick Start Guide

High-Speed Internet Quick Start Guide High-Speed Internet Quick Start Guide Connect Your World. NEED HELP? Call 1.800.239.4430 or visit Frontier.com/HelpCenter Contents PART #1: Wi-Fi Router Setup... 4 PART #2: Configure Wi-Fi Router... 8

More information

Wireless Home Network Setup. Dan Wenz Chris Kiscaden

Wireless Home Network Setup. Dan Wenz Chris Kiscaden Wireless Home Network Setup Dan Wenz Chris Kiscaden Key Questions Why is wireless beneficial? What are the necessary components? What do these components do? How do I set up a wireless network? Why wireless?

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit

Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit Marc D. Goldstone Vice President and Associate General Counsel Community Health Systems Gerald Jud E. DeLoss Gray Plant

More information

Getting Your Multifunction Back On Your Network After A Router Or Network Change

Getting Your Multifunction Back On Your Network After A Router Or Network Change Getting Your Multifunction Back On Your Network After A Router Or Network Change PIXMA MX340 Windows OS 1 If any of the following situations exist, you will need to Uninstall and Re-Install the MP Drivers

More information

Corporate Information & Computing Services. IT Services For University Staff.

Corporate Information & Computing Services. IT Services For University Staff. Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate

More information

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring

More information

Introduction to Technology at Immaculata University. www.immaculata.edu

Introduction to Technology at Immaculata University. www.immaculata.edu Introduction to Technology at Immaculata University IU Campus Network Username: first initial + last name (e.g. John Smith = jsmith) Note: There may be a number at the end of your username if you have

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology

More information

Faculty technology Reference Guide

Faculty technology Reference Guide Faculty technology Reference Guide 2015-2016 CONTACTS CENTER FOR INSTRUCTION AND TECHNOLOGY (CIT): 422-2223 Basement of School of Education [ cit@usfca.edu ] CLASSROOM TECHNOLOGY: 422-6668 Lone Mountain

More information

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks:

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks: DECS Community IT Michigan State University College of Engineering DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK For all questions and requests visit www.egr.msu.edu/decs or 1325EB, e mail

More information

Networking in the Colleges

Networking in the Colleges Networking in the Colleges A Guide For Internal & Intensive School Students Contents Appropriate Use and Your Obligations... 1 Virus Protection... 2 Minimum Computer Requirements... 2 Registering Your

More information

SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started.

SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started. EN SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide Welcome! Lets get started. 1 1 Introduction 1 2 3 4 Congratulations on your purchase of this SwannEye HD Wi-Fi Security Camera from Swann!

More information

Yale Software Library http://www.yale.edu/software/

Yale Software Library http://www.yale.edu/software/ e/ Yale Software Library http://www.yale.edu/software/ For assistance contact the ITS Help Desk 785-3200, 432-9000, helpdesk@yale.edu Remote Desktop General overview With Remote Desktop, you get full access

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

1:1 Student Tablet Program Frequently Asked Questions

1:1 Student Tablet Program Frequently Asked Questions 1. What is included in Hill School s One-to-One Student Tablet Program? Access to a more dynamic curricular experience Use of a state of the art Tablet PC computer (see configuration below) Carrying case

More information

Basic Citrix Manual. Windows Computers and Laptops. Version 1.3. Created by Joshua Lindemann

Basic Citrix Manual. Windows Computers and Laptops. Version 1.3. Created by Joshua Lindemann Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring

More information

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College INFORMATION SECURITY BASICS A computer security tutorial for Holyoke Community College I NTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

Students. Information Technology Support Services Fall 2015

Students. Information Technology Support Services Fall 2015 Information Technology Support Services Fall 2015 Students On behalf of Information Technology, we would like to welcome you to USF. Our job is to make sure you receive the necessary support to complete

More information

GE T Connected @ Northwestern University. Your guide to computers, e-mail, networking, and technology on campus.

GE T Connected @ Northwestern University. Your guide to computers, e-mail, networking, and technology on campus. 2013 GE T Connected @ Northwestern University Your guide to computers, e-mail, networking, and technology on campus. NORTHWESTERN UNIVERSITY INFORMATION TECHNOLOGY ABOUT Get Connected This booklet contains

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

MSP Center Plus Features Checklist

MSP Center Plus Features Checklist Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,

More information

Employee Service Level Agreement

Employee Service Level Agreement Employee Service Level Agreement 1.0 Purpose 2.0 Term and Scope of Agreement 3.0 Scope of Service 3.1 Support Environment 3.2 Local Computer Administrative Privileges 4.0 Support Response Levels 4.1 Exceptions

More information

2. PMP New Computer Installation. & Networking Instructions

2. PMP New Computer Installation. & Networking Instructions ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for

More information

Best Practices for Use of District Laptops

Best Practices for Use of District Laptops Best Practices for Use of District Laptops Penn Manor School District You are responsible for the appropriate use of your Laptop both at school and at home. The laptops are for student educational purposes.

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

McGill-Toolen Catholic High School Technology Acceptable Use Policy

McGill-Toolen Catholic High School Technology Acceptable Use Policy McGill-Toolen Catholic High School Technology Acceptable Use Policy Ben Fancher Director of Instructional Technology June 24, 2015 Ben Fancher email: fancheb@mcgill-toolen.org McGill-Toolen Catholic High

More information

Get In, Get Unpacked, Get Connected.

Get In, Get Unpacked, Get Connected. Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. WELCOME to your New Home and to Unlimited Free Internet Welcome to your new university accommodation and to unlimited free

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

San Jacinto College District Information Technology Services Desktop Support Guidelines

San Jacinto College District Information Technology Services Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving to provide a secure and efficient

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012 Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT

More information

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.

More information

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents

Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

CSG Windows Support Policy

CSG Windows Support Policy CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics

More information

Computing Facilities Orientation September, 2017

Computing Facilities Orientation September, 2017 Computing Facilities Orientation September, 2017 Introductions Steve Miley Director of IT Brad Hill Manager of Desktop Support Geoff Jewel Help Desk Manager First, a few questions Most common food dropped

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

McDonough School of Business: MSBTC SLA 2014

McDonough School of Business: MSBTC SLA 2014 McDonough School of Business: MSBTC SLA 2014 Contents Service Level Agreement... 4 Contacting a Technician... 4 MSBTC Hours of Operation... 5 Trouble Call Problem Priority... 5 Priority 1... 5 Priority

More information

Yale School of Art Digital Technology Office Information

Yale School of Art Digital Technology Office Information Yale School of Art Digital Technology Office Information Online: http://art.yale.edu/diglab/ Email: art.help@yale.edu Phone: 203-432- 9120 Edgewood Email: sculpture.help@yale.edu The Digital Technology

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

Connecting to the Staff Desktop Service

Connecting to the Staff Desktop Service Connecting to the Staff Desktop Service Access your programs and files just like you were in the office Get Setup The first step to use our Remote Connection service is to check that you have the free

More information

IT matters @ Cambridge

IT matters @ Cambridge IT matters @ Cambridge A guide to computing services for students MICHAELMAS TERM 2014 STUDENT EDITION University Information Services (UIS) Welcome to your UIS computing accounts The University of Cambridge

More information

Office of Information Technology. Welcome

Office of Information Technology. Welcome Welcome Main Offices in Echlin Hall M-F 8:30-4:30 Vincent Mangiacapra Associate VP/CIO 203-932-7058 / VMangiacapra@newhaven.edu Greg Bartholomew Director of Networking/Systems Operations 203-932-7059 GBartholomew@newhaven.edu

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

1:1 LAPTOP PROGRAM FAQS

1:1 LAPTOP PROGRAM FAQS 1:1 LAPTOP PROGRAM FAQS Accessories Batteries Breakage, Theft or Loss Costs Distribution File Access and Storage Internet Access Loaner Laptops Logging in Ownership Personal Use Philosophy of Program Printing

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista

Get Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista Get Connected! How to Configure Your Computer for MITnet Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista 2008 Massachusetts Institute of Technology Table of Contents Introduction...3 About

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

Acellus Lab Cart. User s Manual. Version 4B. Acellus Corporation www.acellus.com. Copyright 2010 Acellus Corporation. All Rights Reserved.

Acellus Lab Cart. User s Manual. Version 4B. Acellus Corporation www.acellus.com. Copyright 2010 Acellus Corporation. All Rights Reserved. Acellus Lab Cart User s Manual Version 4B Acellus Corporation www.acellus.com 1 Table of Contents Using Acellus... 3 Acellus Lab Cart and Server... 3 Acellus Laptops... 3 Acellus Updates... 4 Accessing

More information

Discovering Computers

Discovering Computers Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown

More information

Internet and Cable Television Connection Kit. Fall 2014

Internet and Cable Television Connection Kit. Fall 2014 Fall 2014 Internet and Cable Television Connection Kit Your guide to connecting to network and television services within Northeastern s residence halls. Technology Support at Northeastern ITS Welcomes

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Student Desktop@ Home

Student Desktop@ Home Student Desktop@ Home Full Off Campus Access to your Programs and Files Full Access to the University from Home You can access the University from any computer with an internet connection. This system

More information

Initial Setup. How To Run A Mac Server:

Initial Setup. How To Run A Mac Server: How To Run A Mac Server: Initial Setup By Brian Stucki Macminicolo.net - Your Mac mini in a data center. The perfect low-cost server. FarAwayMac.com - Tips on running a Mac server. System Preferences can

More information

The I.T. Experience Service and Pricing List 2015

The I.T. Experience Service and Pricing List 2015 The I.T. Experience Service and Pricing List 2015 Hourly Rates and Additional Services Residential Hourly Rate Hourly Rate All Services $59.00/hr. Business Hourly Rate Hourly Rate All Services $85.00/hr.

More information

Before you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3

Before you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3 Advanced IT user guide Staff laptop setup For staff laptops owned by the University Contents Before you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3

More information

IT@DUSON. IT Service Desk

IT@DUSON. IT Service Desk IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

Ball State University Technology Guide

Ball State University Technology Guide Ball State University Technology Guide 2012 HELP with Computer Labs If you don t have a particular software program, don t forget to check the public desktop locations on campus where many of the popular

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

To get started, you will need the following items Product Key Router with firewall capability Network cables

To get started, you will need the following items Product Key Router with firewall capability Network cables Quick Start Guide Windows Small Business Server 2011 Standard Installing Your New Server Depending on how your server came from the manufacturer, your set up steps are slightly different. Follow the instructions

More information

Useful Tips for Reducing the Risk of Unauthorized Access for Inkjet Printer (PIXMA series) Business Inkjet Printer (MAXIFY series)

Useful Tips for Reducing the Risk of Unauthorized Access for Inkjet Printer (PIXMA series) Business Inkjet Printer (MAXIFY series) Useful Tips for Reducing the Risk of Unauthorized Access for Inkjet Printer (PIXMA series) Business Inkjet Printer (MAXIFY series) IMPORTANT If you are connecting your printer(s) to the network, read this

More information

Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. Welcome to your new home and to unlimited free internet

Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. Welcome to your new home and to unlimited free internet Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. Welcome to your new home and to unlimited free internet Welcome Welcome to your new home and to unlimited free internet.

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

1-port USB 2.0 Print Server. Manual (GPSU21)

1-port USB 2.0 Print Server. Manual (GPSU21) 1-port USB 2.0 Print Server Manual (GPSU21) 2006 IOGEAR. All Rights Reserved. Part No. M0374 IOGEAR, the IOGEAR logo, is trademarks or registered trademarks of IOGEAR, Inc. Microsoft and Windows are registered

More information

Carl H. Lindner College of Business

Carl H. Lindner College of Business Carl H. Lindner College of Business Information Technology Overview Autumn 2013 Shannon Funk Director of Information Technology Shannon.Funk@uc.edu LCB IT Team Shannon Funk Director of Information Technology

More information

ENTERPRISE INFORMATION TECHNOLOGY SERVICES 2016-2017 STUDENT HANDBOOK UNIVERSITY OF GEORGIA. University of Georgia. 1

ENTERPRISE INFORMATION TECHNOLOGY SERVICES 2016-2017 STUDENT HANDBOOK UNIVERSITY OF GEORGIA. University of Georgia. 1 ENTERPRISE INFORMATION TECHNOLOGY SERVICES 2016-2017 STUDENT HANDBOOK UNIVERSITY OF GEORGIA University of Georgia. 1 WELCOME The University of Georgia s central IT department Enterprise Information Technology

More information

Useful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs

Useful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs Useful Tips for Reducing the Risk of Unauthorized Access for Laser Beam Printers and Small-Office MFPs (LBP and MF series) Important: System administrators are advised to read. Overview and Use of this

More information