Use Case Experiment Investigator: Soren Lauesen,
|
|
|
- Randolph Walker
- 10 years ago
- Views:
Transcription
1 Use Case Experiment Investigator: Soren Lauesen, SL We - the IT professionals - often write some kind of use cases. Our "use cases" may be quite different, e.g. UML-style, tasks, scenarios, or user stories. Which kind is best? It is hard to tell when we compare across different projects. In this experiment we will look at a single real-life project and compare how various professionals specify the use cases in their preferred way. If you work professionally with IT, we invite you to participate in the experiment. We expect that you spend between 3 and 20 work hours. We will compare the specifications and publish the result. You will of course see the result before it is published. You may comment on it and decide whether you want your name and a short profile to be published. The project is this: A company wants to acquire a support system for their hotline. Your job is to specify part of the requirements. (The project details are shown on the next pages.) 1. If you want to participate in the experiment, send an to Soren Lauesen <[email protected]>. We will tell you whether we have capacity to handle your later submission. Provide your name and the number of years you have worked as an IT professional. You may also ask questions for clarification. 2. Write the use cases (or the like) that are necessary for the acquisition project. 3. Choose the kind of use cases you prefer or are familiar with. Tell us why you chose it. 4. You may add diagrams or descriptions of data if you find it useful. 5. Don't attempt to write quality requirements such as security, response time, or ease-of-use. 6. The project details reflect interviews and studies in the domain. They are not supposed to be complete. You may include something you believe is missing, e.g. the need to delete a request. However, don't add information from related domains, for instance multi-national hotlines. The customer cares only about support of his present situation. 7. Your use cases may not take up more than 10 pages. If necessary, write some of the more interesting ones in detail and provide a list of the rest. 8. Send the result to [email protected]. Send also an estimate of the time used and any additional comments. 9. Deadline for your reply is Monday 28th September 2009.
2 2 Hotline support system A company with around 1000 IT users has its own hotline (help desk). They are unhappy with their present open-source system for hotline support, and want to acquire a better one. They don't know whether to modify the system they have or buy a new one. An analyst has interviewed the stakeholders and observed what actually goes on. You find his report below. Based on this, your task is to specify some of the requirements to the new system: use cases (or the like) and if necessary the data requirements. IT users The users encounter problems of many kinds. For instance they may have forgotten their password, so they cannot start their work; or the printer lacks toner; or they cannot remember how to make Word write in two columns. The problem may also be to repair something, for instance a printer, or to order a program the user needs. The easiest solution is to phone hotline or walk into their office. In many cases this solves the problem right away. However, hotline prefers to receive the problem request by to hotline@... Sometimes this is impossible, for instance if the problem is that the user has forgotten his password. If the user cannot have his problem solved right away, it is annoying not knowing when it will be solved. How often will he for instance have to go to the printer to check whether it has got toner now? In many cases the problem has been solved, but the user doesn't know. The present support system allows the user to look up his problem request to see what has happened, but it is inconvenient and how often should he look? The company has an employee database with the user's name, phone number, address, user name and password. The support system should retrieve data from it and not keep an employee file of its own. Hotline Hotline is staffed by supporters. Some supporters are first line, others are second line. First-line supporters receive the requests by phone or , or when the user in person turns up at the hotline desk. In busy periods, a first-line supporter may receive around 50 requests a day. Around 80% of the requests can be dealt with right away, and for these problems it is particularly hard to ensure that supporters record them for statistical use. The remaining 20% of the requests are passed on to the second line. Based on the problem description and talks with the user, first line can often give the request a priority and maybe an estimated time for the solution. (Experience shows that users shouldn't be allowed to define the priority themselves, because they tend to give everything a high priority.)
3 3 Half of the second-line requests are in principle easy, but cannot be dealt with immediately. The supporter may have to move out of the office, for instance to change toner in the printer or help the user at his own PC. Usually this ends the request, but it may also turn into a long request because a specialist or external resources are needed. Around 10% of all problems are long requests because the problem has to be transferred to a hotline person with special expertise, or because spare parts and expertise have to be ordered from external sources. Transferring the problem often fails. The supporter places a yellow sticker on the expert's desk, but the stickers often disappear. Or the expert misunderstands the problem. For this reason it is important that the expert in person or by phone can talk with the supporter who initially received the request, or with the user himself. There are employees who occasionally or full time serve as supporters. They know each other and know who is expert in what. The supporters frequently change between first and second line, for instance to get variation. It happens, unfortunately, that a supporter moves to second line without realizing that nobody remains in first line. The request is sometimes lost because a supporter has started working on it, but becomes ill or goes on vacation before it is finished. Managers ask for statistics of frequent and time-consuming requests in order to find ways to prevent the problems. However, with the present system it is cumbersome to record the data needed for statistics. Gathering this data would also make it possible to measure how long hotline takes to handle the requests. In busy periods, around 100 requests may be open (unresolved). Then it is hard for the individual supporter to survey the problems he is working on and see which problems are most urgent. The existing support system The present system automatically collects all s sent to hotline@... and put them in a list of open requests. Figure 1 shows an example of such a list. You can see the request number (Req), the user (Sender, e.g. his ), the supporter working on it (Owner), and how long ago the request was received (Age). You can also see when someone last looked at the request (ActOn). However, this is not really useful. It would be better to see when the request should be closed according to what the user expects. It would be nice if the system warned about requests that are not completed on time. When a user calls by phone or in person, the supporter creates a new request. It will appear in the normal list of requests. However, when the supporter can resolve the request right away, he often doesn't record it because it is too cumbersome. This causes misleading statistics. As you can tell from the figure, the system cannot handle national letters (Danish), and it is not intuitive what the various functions do.
4 4 Anyway, the basic principle is okay. A supporter keeps the list on the screen so he can follow what is going on. He can open an incoming request (much the same way as you open an ), maybe take on the request (for instance by sending a reply mail), classify the case according to the cause of the problem (printer, login, etc.), give it a priority, transfer it to someone else, etc. When the request has been completed, the supporter closes it, and the request will no longer be on the usual list of open requests. As you can see on the figure, Status isn't used at all. It is too cumbersome and the present state names are confusing. Some of the supporters have proposed to distinguish between these request states: First line...a first-line supporter must take on the request, for instance because it just arrived. Second line...a second-line supporter must take on the request. Taken...The request is handled by a supporter (the owner). The owner may change from one line to another while he is handling the request. Parked...The request awaits something, for instance an external delivery, and hotline need not do anything meanwhile. Reminder...The request hasn't been closed in due time, or the external delivery wasn't received in due time. Closed...The request has been handled. However, it may be opened again, for instance because the user doesn't think the problem has been solved. Open requests are those that are neither parked, nor closed. For statistical purposes and to support the resolution of the request, it would be useful to keep track of when a request has changed state. The present system can be configured to record a problem cause, but then the system insists that a cause be recorded initially, although the real cause may not be known until later. In addition somebody must set up a list of possible causes, and this is a difficult task. As a result, causes are not recorded, and statistics are poor. While a long request is handled, it may receive additional information from the original user as well as from supporters. In the present system it is cumbersome to record this, and as a result the information may not be available for the supporter who later works on the request. A supporter can set the system to send an ordinary to himself when he has to look at some request. This is particularly useful for second-line supporters who concentrate on other tasks until they are needed for support.
5 Figure 1. A list of hotline requests in an existing support system. 5
Computer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
Welcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
AT&T Voice DNA User Guide
AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the
Okay, good. He's gonna release the computers for you and allow you to log into NSLDS.
Welcome to the NSLDS hands-on session. My name is Larry Parker. I'm from the Department of Education NSLDS. Today, I have with me a whole host of folks, so we're gonna make sure that if you have any questions
Part II. Managing Issues
Managing Issues Part II. Managing Issues If projects are the most important part of Redmine, then issues are the second most important. Projects are where you describe what to do, bring everyone together,
Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45
Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net
User manual VU-Mail Webmail Outlook Web App februari 2010
VU University Amsterdam University Centre IT User manual VU-Mail Webmail Outlook Web App februari 2010 This document describes how to access and configure VU Webmail (Outlook Web App). 1. Index 1. Index
Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript
Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Part 1: Why Policy Is Key Stephanie Losi: Welcome to CERT's podcast series: Security for Business Leaders. The
Guidelines for conducting tabletop exercises Penn Mission Continuity Program (MCP)
All Penn organizations are advised to conduct annual tabletop exercises (TTX) to test their Mission Continuity plans. Here are some ideas to help you do that. Our thanks to the School of Arts and Sciences
How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.
SECURITY AWARENESS SURVEY Is a survey necessary A survey will give you insight into information security awareness within your company. The industry has increasingly realized that people are at least as
Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users. https://kayako-test.cv.nrao.edu/
Kayako 4.0 Helpdesk Upgrade Questionnaire Form 1: Users NAME ROLE: USER To submit helpdesk tickets you can access the helpdesk directly at: https://kayako-test.cv.nrao.edu/ NOTE: Due diligence needs to
VACATION REQUEST USER S MANUAL
2013 VACATION REQUEST USER S MANUAL Alejandro Aguilar / IT Application Services Martha P. García / HR 3/21/2013 TABLE OF CONTENTS Vacation Request User s Manual INTRODUCTION... 2 REQUIREMENTS... 3 ACCESSING
eroom user guide English version 7.4.4
eroom user guide English version 7.4.4 JOINT Collaboration AS www.joint.no JOINT Collaboration AS [email protected] www.joint.no Page 1 Contents What is eroom?... 3 Logging into eroom... 4 What is the eroom
DAN'S VAN: AN ACCIDENT STORY PART TWO
'S VAN: AN ACCIDENT STORY PART TWO CHARACTERS: Dan Davis, a 28-yr-old independent construction contractor Tanya, Dan's wife, an assistant manager at Kmart Female recorded voice at Nationwide Richard, a
Activation of your SeKA account
Activation of your SeKA account You need to do this, if you haven't set your password yet in the SeKA system. If you have already activated your SeKA account, but can't remember your password, use Forgotten
Amy wants to use her email to view some photos her friend Sandy sent, from her vacation to Washington DC.
E-mail Attachments Hi, I m Sarah. I m going to show you how to download files people send to you in emails, and how to send your own files to other people using your email. We ll follow along with Amy,
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important.
Securing Your Email Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing email requires the use of a certificate in order to work. Once you sign up for a certificate
Email Basics. For more information on the Library and programs, visit www.bcpls.org BCPLS 08/10/2010 PEMA
Email Basics Email, short for Electronic Mail, consists of messages which are sent and received using the Internet. There are many different email services available that allow you to create an email account
QuickBooks 2010 Installation Guide
QuickBooks 2010 Installation Guide This article provides instructions for installing QuickBooks 2010 on a single computer and in a network environment. QuickBooks Elements Several elements are involved
Tray Thompson: Welcome everyone. We now have our. webinar, our second webinar, which is Banking 101. I
0 Banking 0 Tray Thompson: Welcome everyone. We now have our webinar, our second webinar, which is Banking 0. I have myself, Tray Thompson, here. I work for the Financial Aid Office and I also have Mario.
Flat Rate Per Claim -vs- Percentage Billing Fees. A Devil's Advocate View
Flat Rate Per Claim -vs- Percentage Billing Fees A Devil's Advocate View Assuming a full service solution, there are basically two methods billing services use to charge for their services, either a percentage
Help Desk Documentation
Help Desk Documentation Welcome Submitting a Request Online Submitting a Request via Email Copying Other Users on Your Requests Creating an Account 5 Accessing Your Account 6 Tracking the Progress of a
Track-IT! (ALA Help Desk)
Track-IT! (ALA Help Desk) Where is TrackIT!? Two (2) Ways to TrackIT! Use the link entitled ITTS Help Desk on the ALA KM home page Open a browser and go to http://help.ala.org Entering a ticket is as easy
DOMAIN CENTRAL HOSTING EMAIL
Welcome to our hosting services, we have created the following documents to help you get up and running as quickly as possible. If at any stage you encounter difficulties, you are welcome to send a help
Interchange/Corporate Office. Telephone User Interface (TUI) Pocket Guide
Interchange/Corporate Office Telephone User Interface (TUI) Pocket Guide Interchange/Corporate Office Telephone User Interface (TUI) Pocket Guide Copyright 2004 Comdial Corporation All rights reserved.
21 Questions you should ask your IT service provider Before hiring them to support your network
21 Questions you should ask your IT service provider Before hiring them to support your network Customer Service: Q1: Do they answer their phones live or do you always have to leave a voice mail and wait
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17
Hertfordshire s Secure File Exchange Portal User Guide V2.04 (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 CONTENTS 1. About HertSFX... 3 2. HertSFX Limitations... 3 3. Getting Started... 3
Mail Merge Tutorial (for Word 2003-2007) By Allison King Spring 2007 (updated Fall 2007)
Mail Merge Tutorial (for Word 2003-2007) By Allison King Spring 2007 (updated Fall 2007) What is mail merge? You've probably heard it mentioned around the office or at an interview (especially for a temp
Scenic Video Transcript Direct Cash Flow Statements Topics. Introduction. Purpose of cash flow statements. Level 1 analysis: major categories
Cash Flow Statements» What Do I See?» Direct Cash Flow Statements» Scenic Video http://www.navigatingaccounting.com/video/scenic-direct-cash-flow-statements Scenic Video Transcript Direct Cash Flow Statements
After you install Spark, you'll get going by logging in and adding contacts. Try out a chat with one of your contacts!
Spark User Guide Welcome to Spark! This guide will get you acquainted with the basics of chatting using Spark. You'll get logged in, add contacts, chat by text and voice, exchange files, and more. Note:
How to Keep Your Computer Network Up, Running, and Problem FREE
How to Keep Your Computer Network Up, Running, and Problem FREE Are you frustrated with on-going computer problems - slow computer, error messages, viruses, spyware, printers not working, applications
How To Choose Between A Goat And A Door In A Game Of \"The Black Jackpot\"
Appendix D: The Monty Hall Controversy Appendix D: The Monty Hall Controversy - Page 1 Let's Make a Deal Prepared by Rich Williams, Spring 1991 Last Modified Fall, 2004 You are playing Let's Make a Deal
Why Johnny Can't Encrypt: A Usability Study of PGP
Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security [email protected] Abstract Interfaces
Why Accountability Matters
PREVIEW GUIDE Why Accountability Matters Table of Contents: Sample Pages from Leader s Guide...pgs. 2-8 Program Information and Pricing...pgs. 9-10 Leader s Guide Can We Count on You? CRM Learning s Can
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Manually store e-mail & documents in
SuperOffice AS How to: Manually store e-mail & documents in SuperOffice (for Mac users) Index Introduction... 3 Saving a document into SuperOffice... 3 Editing a document in SuperOffice... 4 Save e-mail
The Court and your child:
The Court and your child: when social workers get involved easy words and pictures The Court and your child when social workers get involved People These are the people who appear in the booklet. 2 3 Text
Scripts for Recruiters
Scripts for Recruiters Companion Script Guide for The New Recruiters Tool Kit www.greatrecruitertraining.com Copyright 2010 Scott Love 1 How to Use This Guide Use this companion script guide while watching
Writing a Requirements Document For Multimedia and Software Projects
Writing a Requirements Document For Multimedia and Software Projects Rachel S. Smith, Senior Interface Designer, CSU Center for Distributed Learning Introduction This guide explains what a requirements
INTRODUCTION TO EMAIL: & BASICS
University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites
How to Recognize Phishing Emails Targeting the University of Mary
How to Recognize Phishing Emails Targeting the University of Mary For the past several years, University of Mary has been targeted by phishing emails. It is important that you recognize these scams so
User Guide Anti-Spam Filter
TABLE OF CONTENTS About the filter...2 Accessing your filter...2 SPAM...3 Held Messages...3 Release...3 Delete...3 Allow...3 Educate your filter with IsSpam NotSpam...3 Settings...4 Filtering...5 Friends...6
Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278
Hospitality Cloud+Plus How Technology Can Benefit Your Hotel LIMOTTA IT LIMOTTAIT.com/hospitality 888 884 6278 Content + + About Us PCI Compliance + Virtualization + + + Unified Technology Single Sign
Getting and Keeping A Checking Account
Getting and Keeping A Checking Account You've decided to get a checking account. That's a good idea. Your money will be safe and you'll have a record of what you've paid for. You'll know how much you have
The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults
The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults S. Joseph Levine, Ph.D. Michigan State University [email protected] One of a series of workshop handouts made
731-04-joel_maloff-phone.com-cloud_based_phone_service Page 1 of 5
731-04-joel_maloff-phone.com-cloud_based_phone_service Page 1 of 5 Ranked the #1 radio show in the Boston Market in its time-slot, and with more than 5,500,000 Podcast downloads, Tech Talk With Craig Peterson
Equity Value, Enterprise Value & Valuation Multiples: Why You Add and Subtract Different Items When Calculating Enterprise Value
Equity Value, Enterprise Value & Valuation Multiples: Why You Add and Subtract Different Items When Calculating Enterprise Value Hello and welcome to our next tutorial video here. In this lesson we're
Pharos User Process Guide
Pharos User Process Guide TABLE OF CONTENTS CHAPTER 1 USING THE PS20 TERMINALS...2 OVERVIEW...2 OBJECTIVES...2 DEMONSTRATION CHANGING YOUR PASSWORD...3 DEMONSTRATION RUNNING COPY JOBS...5 DEMONSTRATION
Bank $21,000 a month with CPA
Bank $21,000 a month with CPA By: Andrew Gotti I will show you the best group of people to target with your offers. Firstly, I would like to thank all of you for purchasing my short guide. I will show
EUROPEAN COMMISSION Directorate-General for Education and Culture
EUROPEAN COMMISSION Directorate-General for Education and Culture Lifelong Learning: policies and programme Coordination of the "Lifelong learning" programme ECAS User Manual The European Commission Authentication
HELP DESK CALL HANDLING SCRIPTS
HELP DESK CALL HANDLING SCRIPTS FUTURE TECHNOLOGIES, INC. Error! Bookmark not defined. June 1999 1999 No part of this publication may be reproduced without permission from Future Technologies, Inc. Page
Introduction... 2. Configuration & Spam Detection... 2. WinWare Webmail... 3. Email Accounts... 3. Email Account Notes... 4. Definitions...
Page 1 Table of Contents Introduction... 2 Configuration & Spam Detection... 2 WinWare Webmail... 3 Email Accounts... 3 Email Account Notes... 4 Definitions... 5 Sender Policy Framework (SPF)... 5 Email
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
Introduction to Open Atrium s workflow
Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling
this guide will help you understand in detail who the Asset Management module works and relates to other modules.
Asset Management Introduction this guide will help you understand in detail who the Asset Management module works and relates to other modules. this module is critical for most of you looking forward the
Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives
Trust Library Services http://www.mtwlibrary.nhs.uk http://mtwweb/cgt/library/default.htm http://mtwlibrary.blogspot.com KNOW HOW: Outlook Using Microsoft Outlook Guide for using E-mail, Contacts, Personal
12Planet Chat end-user manual
12Planet Chat end-user manual Document version 1.0 12Planet 12Planet Page 2 / 13 Table of content 1 General... 4 1.1 How does the chat work?... 4 1.2 Browser Requirements... 4 1.3 Proxy / Firewall Info...
TIE-PROJ, Project Management workshop 16.09.2014 questions from ten groups:
TIE-PROJ, Project Management workshop 16.09.2014 questions from ten groups: 1. members from groups: G6, G7, G9 Q1: How to ensure that all group members have understood the requirements and got the idea
Patient survey for Moss Valley Medical Practice using the General Practice Assessment Questionnaire (GPAQ)
Patient survey for Moss Valley Medical Practice using the General Practice Assessment Questionnaire (GPAQ) Standard report and analysis for GPAQ Consultation Version 3 Contents: How the survey was carried
Managing User Accounts and User Groups
Managing User Accounts and User Groups Contents Managing User Accounts and User Groups...2 About User Accounts and User Groups... 2 Managing User Groups...3 Adding User Groups... 3 Managing Group Membership...
The information in this document belongs to Digibilly. It may not be used, reproduced or disclosed without written approval.
Re- En g in e e rin g e C o m m e rc e F o r O n lin e B u s in e s s Customer User Guide Last Updated: June 2012 2012 Digibilly - All Rights Reserved Worldwide. PayPal is a registered trademark of PayPal,
How to move email to your new @students.ecu.edu account with MAC Mail
How to move email to your new @students.ecu.edu account with MAC Mail 1. Open Mail, and then do one of the following: If you've never set up any e mail accounts using Mail, the Welcome to Mail page appears.
the ombudsman and smaller businesses
the ombudsman and smaller businesses your guide to the Financial Ombudsman Service the independent expert in settling complaints between consumers and businesses providing financial services about this
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
Terminal Server Guide
Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing
How To Know If You Missed A Call From The Help Desk At The Library
The IT Help Desk Survey Report Fall 2013 Prepared by the Office of Data Analytics and Institutional Research (DAIR) December 2013 Introduction: The IT Help Desk Survey Report is designed to assess the
TMD Friction IT Helpdesk
TMD Friction IT Helpdesk USER MANUAL TMD Friction UK, MIS Department Published: Monday, 09 January 2012 2:30 PM Contents Our global helpdesk Creating your new account My home screen My Profile I need help
Blocking Junk email in Outlook Version 1.00
Blocking Junk email in Outlook Version 1.00 Need to Know TM Junk and offensive email is unfortunately a fact of life these days but there is way that you can use Outlook to assist you dealing with these
Proposal to Migrate from a Workgroup to a Domain
Proposal to Migrate from a Workgroup to a Domain Kenneth Ketola K M S T o o l s & E q u i p m e n t L t d. 1 1 0 W o o l r i d g e S t r e e t C o q u i t l a m, B r i t i s h C o l u m b i a V 3 K 5 V
Guideline to purchase a CRM Solution
Guideline to purchase a CRM Solution esphere Whitepaper Content list Introduction... 3 Challenges... 3 Overview... 4 Define Your CRM Requirements and Business Objectives and start gather information...
Transcription. Crashplan vs Backblaze. Which service should you pick the short version
Transcription Crashplan vs Backblaze Hey and welcome to cloudwards.net and another exciting video of two major unlimited online backup services namely Backblaze and CrashPlan or CrashPlan or Backblaze.
Good CAD / Bad CAD. by Tony Richards
Good CAD / Bad CAD by Tony Richards Looking for a new computer-aided dispatch and/or records management system? Trying to figure out exactly what you should be looking for? What distinguishes good from
My Secure Backup: How to reduce your backup size
My Secure Backup: How to reduce your backup size As time passes, we find our backups getting bigger and bigger, causing increased space charges. This paper takes a few Newsletter and other articles I've
The Help Line. Everyone who has ever had to call to. Linux Trouble Ticket Software
Linux Trouble Ticket Software The Help Line If your help line serves outside users, keeping track of support requests can mean the difference between a repeat customer and a lost customer. If the line
using your voicemail system
using your voicemail system facilities management bcit.ca/facilitiesmanagement/ services/telecom.shtml first time setup Logging into your mailbox for the first time 1. Dial 6777 or press the Message key
Spam Management. Manage your FOPE Spam Quarantine
Spam Management Alverno College uses two tools for email spam management: Microsoft s Forefront Online Protection for Exchange (FOPE) filters spam before it reaches your inbox. FOPE will send you periodic
SARS_20131230_173118 Page 1 of 6
Speaker 1: In this episode, I want to discuss how to describe things in your personal statements or in your application materials when you have to talk about something that's a bad thing from your past,
Outlook Today. Microsoft Outlook a different way to look at E-MailE. By Microsoft.com
Outlook Today Microsoft Outlook a different way to look at E-MailE By Microsoft.com What to do, What to do How many times have you received a message from your system administrator telling you that you're
UNFCCC Online Registration System
UNFCCC Online Registration System Admitted Observer Organizations (IGOs & NGOs) User Manual Release 1.3.4 June 2015 Page 1 of 43 Table of Contents 1 Overview... 3 1.1 What the System does for you... 3
Chapter 2 An Introduction to Forwards and Options
Chapter 2 An Introduction to Forwards and Options Question 2.1. The payoff diagram of the stock is just a graph of the stock price as a function of the stock price: In order to obtain the profit diagram
Produced by: Flinders University Centre for Educational ICT
Produced by: Flinders University Centre for Educational ICT Introduction to Outlook 2010 Contents Microsoft Online Services Sign-in to Outlook/Exchange... 2 Key Features... 3 Outlook Screen... 4 To-Do
Software Outsourcing - Software Development. [email protected]
Hi I m Tony Radford from West Town Web Services. We area UK based great value, high quality software development and outsourcing solutions business. If you need software built or looked after please get
A: We really embarrassed ourselves last night at that business function.
Dialog: VIP LESSON 049 - Future of Business A: We really embarrassed ourselves last night at that business function. B: What are you talking about? A: We didn't even have business cards to hand out. We
This is Tray Thompson. Today we ll be having our first. webinar of the semester, Credit cards versus Debit
1 1 1 1 0 1 Credit cards versus Debit cards This is Tray Thompson. Today we ll be having our first webinar of the semester, Credit cards versus Debit Cards. As you know we have a Chat feature in this as
