|
|
|||||
| NUMBER 97 |
August, 2008 |
||||
|
Click here to see an Adobe Acrobat PDF version of this newsletter, suitable for printing. Archives of CATPrints are available at
http://www.oneonta.edu/technology/comptech/newsletter/
|
|||||
New Calendar Dates available for OutlookUsers of Outlook can download a set of pre-entered campus events
for inclusion in their online calendar. These events are
grouped in categories based on audience. There are sections
for Academic Calendars and Employee Calendars for different
bargaining units.
|
|||||
Getting Support on I.T. Related ProjectsIs your department developing a new web application or considering purchasing a new computer program? More and more of our functions and procedures are moving to web or network-based applications. The efficiencies and customer service benefits can be great and vendors are always happy to discuss the money and time saving possibilities of their products. Often, we attend conferences and come back with a new vision of what we can offer to our students and the College based on the latest technologies and software. Or we see a need in our business process and begin searching for solutions. The answer may be a commercial product or it may be developed by a member of the campus community. If your department is considering a new application, website, product or hardware, don’t go it alone! Long before you spend any money on a commercial product or go live with a custom page, you should contact us to discuss your needs and the requirements of your planned solution. There are always technical and security considerations to be addressed before something new is deployed. Even if you do not think there will be any issues with your project or the vendor assures you there is nothing to worry about, you should contact us during the planning/assessment phase. Waiting can delay the implementation of your project if we find that there are technical or security issues to be addressed. Chances are, your project will require some support from Networking, Academic or Administrative Computing, TLTC, Web Development or I T Security. It may require special network settings, firewall rules, accounts on our systems, enhanced security or even a new server. Too often, we hear about projects in the very late stages of the process and have missed the opportunity to offer our assistance, ask questions and plan the work required. Call the Information Technology Helpdesk the next time you are investigating a program, service or webpage and have them assign a ticket to the appropriate support office, and we will be happy to assess the technical and security aspects of your project and help assure a smooth implementation.
|
|||||
Asset Classification SurveyThe Department of IT Security is conducting a survey in order to classify the College’s data assets (information, digital or paper, which the College collects and stores). This is an important requirement of SUNY Oneonta’s Information Technology Security Program. To protect our information assets, we must know what they are and where they are stored. Once we have collected survey responses, we will be able to identify steps to take to ensure the confidentiality, integrity and availability of the information that is vital to the College. The survey is being sent to the College community through an e-mail with a link to an on-line form that will take about ten minutes to complete. (We want you to be assured that it is not a Phishing attempt, but extra credit to those of you who called to check!) When you receive the e-mail, please take a few minutes to respond to the survey and think carefully about all of the data you collect or access and where it is stored. Almost everyone who works for the College has access to some information that requires protection, and it is critical for us to know who needs that information and how it is being protected for security and business continuity purposes. We appreciate your cooperation and comments! |
|||||
Why do they call it that?"Booting" a computer: A term that was originally "bootstrapping" and which was used as early as 1958, describing the process by which computers load code elements of increasing complexity until the operating system is ready for you to use it. Supposedly because the computer was starting up and loading all necessary software without any intervention from the operator - "lifting itself by its own bootstraps".
|
|||||
PIN Security
You can now choose a PIN that has both alphabetic and numeric characters. Changing to an alphanumeric PIN will make your PIN much harder to crack. Also, PINs will now expire after 180 days from their creation or from the date that they are changed, in the case of established PINs. You will be notified that your PIN is about to expire with a message upon logging into Webservices. If your PIN has expired when you attempt to log in, you will be prompted to change it.
You may change your PIN by visiting
https://webservices.oneonta.edu. Watch for notices of future
PIN security enhancements and if you have any questions, please call the
Information Technology Helpdesk at x4567. |
|||||
Changes in Administrative Information TechnologyJohn Bugyi has joined the College’s Administrative Desktop Support Team, working side-by-side with Ryan Swan. Administrative Desktop
Support supports the Information Technology needs of all Administrative
users, with services ranging from new hardware acquisitions to software
installations to remediating hardware failures. They are also
responsible for the maintenance and support of OAS and Sodexo equipment,
including cash registers, credit card terminals, vending machines, ID
card readers, ID card creation, and the servers each system requires.
In addition, Ryan and John work in collaboration with other departments
to utilize new technologies and develop ways to increase support
capabilities.
|
|||||
|
If you have a question for Computer and Telecommunication Services about: Computer Problems or Related Issues - Call the
Information Technology Help Desk
at 436-4567 |
|||||