cah technology office technology office technology support web, programming and communication...

Download CAH Technology Office Technology Office Technology Support Web, Programming and Communication Network and Security Support Research Provides hardware

If you can't read please download the document

Upload: caren-nichols

Post on 18-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Slide 2
  • CAH Technology Office Technology Office Technology Support Web, Programming and Communication Network and Security Support Research Provides hardware and software support and troubleshooting Provides loaner hardware Provides hardware setup and workstation file transfers Provides server maintenance and configuration Provides user accounts and share access levels Provides security implementation Provides Web site design and support Promotes news and events Designs databases Provides Web forms and Web application programming Provides consultation on research initiatives Provides customized software and configurations Supports the Special Projects Lab
  • Slide 3
  • CAH Technology Office Web, Programming & Communication [email protected] 407-823-3450 o Matthew Dunn , [email protected] o Bryce Jackson , [email protected] o Lin Jackson, [email protected] Network & Security, 407-823-2478 o John Turner , [email protected] Research, 407-823-3450 o Bryce Jackson , [email protected] o John Turner , [email protected] Technology Support [email protected] 407 823 2719 o John Lazar , Supervisor [email protected] 407 823 0993 o Joseph LaLiberte o Christian Hernandez o JT Razdai o Jacob Skinner o Kristen Hugo o Steven Thomas o Tulsi Parikh Full-time
  • Slide 4
  • Policy Implementation Current progress report o Departments are partially on the domain o IT Liaisons and Content Managers are assigned o Procedures are being established Next steps o Setup meetings with departments to discuss scheduling and process o Work out isolated issues o Reexamine evolving policy Examples: Center for Distributed Learning, Regional Campuses, Reexamination Cycle
  • Slide 5
  • Policy Benefits Two-way centralized point of contact for staff/faculty and the Technology Office o IT Liaisons and Content Managers Quality assurance of hardware and software purchases Secure network file shares Protection of individual workstations Consistency of service, support and communication
  • Slide 6
  • Licensing All software that runs on university machines must have valid licenses Three types of licensing: o Purchased by Deans Office Maintained by CAH Technology Support Example: Symantec Anti-Virus o Purchased by Dean's Office in conjunction with the department Maintained by CAH Technology Support Example: Microsoft Office o Purchased and maintained by the department Examples: Adobe Photoshop, Adobe Acrobat. Adobe and other 3rd party licensed products must be purchased and records maintained by the department.
  • Slide 7
  • Licensing (cont.) Legacy Software If a computer is rebuilt, and there is no documented license associated with that computer or user, Technology Support will re-install that software on the rebuild if the following criteria are met: o Technology Support has determined that the software was previously installed on the computer o It serves a valid work-related purpose o We have access to the software and serial key to activate the software. Adobe and other 3rd party licensed products must be purchased and records maintained by the department o Technology Support will not upgrade any version of any program if we cannot verify a purchased license o More information on software licensing is available on page 11 of the Technology Policy
  • Slide 8
  • Purchasing All computer related hardware, which will be supported by Technology Support, must fall under one of the following scenarios: It is a supported device found on page 12 of the CAH Technology Policy It is a legacy device that has been supported by Technology Support prior to the enactment of the policy It is approved by the CAH Technology Office It doesnt exceed the supported hardware limit per user o One desktop workstation and one laptop
  • Slide 9
  • Work Requests All work order requests must be initiated by: o Calling the Technology Support Help Desk at 3-2719 o E-mail to [email protected] o Non-emergency work requests should be submitted by e-mail for documentation purposes Who can submit a work order to the Technology Support Help Desk? o Anyone... all faculty and staff that are full or part-time can make a request -- except for multi-user machines, work orders for multi-user machines must be submitted by the IT Liaison o All e-mail requests must come from a valid ucf.edu address
  • Slide 10
  • Work Requests (cont.) When not immediately available, technicians will schedule an appointment Issues may be redirected to the appropriate units Example: Office of Instructional Resources, Division of Computer Services and Telecommunications, Network and Security Support, or Web, Programming and Communication List of buildings, classrooms and labs supported by Technology Support is found on page 13 of the Technology Policy.
  • Slide 11
  • Network and Security Support What is Active Directory? o What does this mean for me? o Benefits/Limitations File Server o Improved access and security o Limitations Security o Anti-Virus o University security guidelines
  • Slide 12
  • Web Requests The CAH Web Policy is available online at technology.cah.ucf.edu Updates should be submitted via e-mail by departments Content Manager All Web requests must be sent to [email protected]@mail.ucf.edu Content must follow university brand standards o UCF Style Guide o UCF Graphic Standards o Associated Press Stylebook Help the Web, Programming and Communication group promote the college and its departments by submitting news and events to your Content Manager
  • Slide 13
  • Questions? and Thanks!