Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries最新文献

筛选
英文 中文
Facilitating innovative faculty projects: an information technology perspective 促进创新的教师项目:信息技术的角度
Paul Brown, Kenneth Janz
{"title":"Facilitating innovative faculty projects: an information technology perspective","authors":"Paul Brown, Kenneth Janz","doi":"10.1145/1181216.1181225","DOIUrl":"https://doi.org/10.1145/1181216.1181225","url":null,"abstract":"The Center for Instruction, Research, and Technology (CIRT) at Indiana State University assists faculty with integration of emerging and innovative technologies into their instruction and research activities. This support ranges from High Performance Computing (HPC) to visualization services. CIRT also provides academic programming support to the University community. Additionally, one of the center's main goals is to continually explore and evaluate new and emerging technologies to support teaching, research, and student learning. This paper covers an internal grant program established by the center, the process of working with faculty on research proposals, and descriptions of several projects developed by CIRT for faculty.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The matrix and beyond: expanding proactive resources for customers 矩阵及超越:为客户拓展主动资源
Mo Nishiyama, Leslie J. McNeil, Holly E. Wyatt
{"title":"The matrix and beyond: expanding proactive resources for customers","authors":"Mo Nishiyama, Leslie J. McNeil, Holly E. Wyatt","doi":"10.1145/1181216.1181279","DOIUrl":"https://doi.org/10.1145/1181216.1181279","url":null,"abstract":"At Oregon Health & Science University (OHSU), essential duties of the Information Technology Group (ITG) include providing support for a diverse customer base. Faculty, staff, students, volunteers, visiting scholars, interns, vendors, and community healthcare partners all rely on ITG's Customer Relations Management Division (CRMD) for resolving their computing and account access issues. In a dynamic support environment where many of the customer roles falls outside the one-size-fits-all support approach, CRMD expanded their approach to accommodate their diverse clients.CRMD's Computer Access group introduced role-based matrices on their electronic account request forms to help simplify the challenges of granting appropriate network accesses. The revamped forms reduced follow-up contacts from customers. CRMD's HelpDesk launched an online Self-Service Portal for providing customers with one-stop shopping for their diverse computing needs. Content provided on the portal includes self-service password changes, tree-based knowledge base articles organized by applications, quick reference guides for role-based password requirements and core applications, password and access matrix for nearly 40 applications, and computing tips of the week. The portal provides a convenient around-the-clock alternative for customers who wish to resolve their computing issues immediately without having to contact the HelpDesk directly.By implementing proactive forms and resources, ITG has taken steps to address the ever-expanding needs of their diverse customer base. These changes increase the level of self-sufficiency for customers, reduce the staff's customer contact time for routine issues, and provide the ITG a chance to learn the needs of their constituents.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Providing support to the expanding university 为不断扩大的大学提供支持
Louis Kelly, Sandra Johnson
{"title":"Providing support to the expanding university","authors":"Louis Kelly, Sandra Johnson","doi":"10.1145/1181216.1181254","DOIUrl":"https://doi.org/10.1145/1181216.1181254","url":null,"abstract":"Faculty support, classroom remodels and upgrades, student-owned computers, wireless networking, and demands for campus technology are increasing on campuses across the country. To provide support for these and other technology needs of the campus community, Information Technology (IT) departments have had to stretch their resources. Arizona State University is one college that is currently in the process of dealing with these \"growing pains.\" To handle the rising need for services, the University Technology Office (UTO) at Arizona State University is redesigning its model of support into a robust, expandable model that will grow with demand in the coming years. For the expandable model to be successful, careful planning is required from everyone within the department. Such planning allows the department not only to create an expandable model of support, but to create it around the university's overall mission and goals.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Creating synergy to make I.T. happen 创造协同效应来实现it
Stacey Morales, T. Sparks
{"title":"Creating synergy to make I.T. happen","authors":"Stacey Morales, T. Sparks","doi":"10.1145/1181216.1181274","DOIUrl":"https://doi.org/10.1145/1181216.1181274","url":null,"abstract":"Synergy - The working together of two or more things, people, or organizations, especially when the result is greater than the sum of their individual effects or capabilities.At LSU we are making I.T. happen by working together with other organizations on campus to create rich technology spaces where students have access to not only traditional computer labs, but added functions such as social spaces, mobile device circulation, high end media development and output, vending services, digital art gallery, technical support, and library reference.This year LSU will create an Information Commons in our main campus library. The success of this project is the result of a long dialog and working relationship with various organizations that include the LSU Library administration, Contracted Auxiliary Services, Copier management, Graphic Services, College of Art and Design, Information Technology Services, and the Student Technology Fee Oversight Committee.LSU would like to present the ways in which they have created synergy with organizations on campus in order to create spaces where students can gather to collaborate and learn in settings that they are most comfortable and most productive. All of the participating organizations have recognized needs in their areas that without a synergetic effort might have not been possible or resulted in failures. We will speak on why this synergetic solution has worked and reflect on past projects that did not work because they were not coordinated efforts and were missing aspects or functions that could have made them successes.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EMS: a homegrown identity management system EMS:一个本土的身份管理系统
William P. Murphy III
{"title":"EMS: a homegrown identity management system","authors":"William P. Murphy III","doi":"10.1145/1181216.1181277","DOIUrl":"https://doi.org/10.1145/1181216.1181277","url":null,"abstract":"In 2005 Salem State College upgraded a nine year old email system to Novell's GroupWise. In addition, the College had recently implemented a One Card, web portal, and student administration systems.As we moved forward with these initiatives, we hoped to establish formal user management policies. An IT audit identified a number of problems which needed to be addressed. In the past each IT system was isolated, so users could have different usernames in each system and there were no policies for adding or removing users from these systems. We found: End users with different usernames in each system Users who were deceased or no longer employed Users added or removed from systems without authorization from Human Resources (HR) Users who were not authenticated before they were given College credentials (email address, ID card, etc.) We suspect these challenges/opportunities might exist at other institutions of higher education.With very little time and no budget, we developed EMS, the Employee Management System, a homegrown system designed to authenticate new users, issue usernames, communicate status changes with trusted systems, and continually audit the list of users.Cooperation within IT, and with HR, has helped to make EMS the central point of contact for all IT resources. This system is a work in progress and we are now looking at how this system might be used in other areas.This presentation will include a demonstration of EMS, discussions on where we are, where we are going, and lessons learned along the way.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network based storage: getting students to actually use it 基于网络的存储:让学生真正使用它
Allan Chen
{"title":"Network based storage: getting students to actually use it","authors":"Allan Chen","doi":"10.1145/1181216.1181229","DOIUrl":"https://doi.org/10.1145/1181216.1181229","url":null,"abstract":"The Academic Computing department at Stanford University has worked on implementing an effective network storage strategy for some time. Students need to be able to access their files in our labs, in their rooms, and even off campus. While removable media in the form of floppy then Zip discs and now USB \"thumbdrives\" have filled this need to an extent, it is still critical to offer a reliable network option. Central IT has offered a network storage solution for a number of years, but achieving wide-spread use through reliable means has been difficult. They have offered and/or built tools ranging from simple FTP to modified versions of proprietary clients to students to access their home folders. However, it was not until very recently that use of this service has increased. The biggest factor in this change was not simply that the methods for access matured, but that we have designed our desktop experience to make such access seamless and invisible. This, in turn, has encouraged students to use this single solution across campus, in our clusters and on their own machines.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Specialized computer labs: care and feeding 专门的计算机实验室:护理和喂养
Trevor M. Murphy, S. Macklin
{"title":"Specialized computer labs: care and feeding","authors":"Trevor M. Murphy, S. Macklin","doi":"10.1145/1181216.1181276","DOIUrl":"https://doi.org/10.1145/1181216.1181276","url":null,"abstract":"This paper is a brief overview of some of the challenges and successes related to the support of a Geographic Information Systems (GIS) Windows lab and a music technology Mac OS lab at Williams College. Specialized computer labs can present some surprising issues that set them apart from general academic computer labs. The GIS lab and music technology labs at Williams have provided many examples of such challenges, including: Finding academic pricing for non-academic software. Creating secure lab spaces. Handling unusual license management, including dongles and hasps, as well as software management schemes that involve locking software to a specific computer. Working around security issues with products that assume that all users have full administrative access to the lab computers. Solving peripheral software and hardware interface challenges. Training users and creating effective documentation. Troubleshooting non-standard hardware and software-intensive lab stations. Creating and deploying an image for a specialty lab.The authors share their experience supporting these labs and confronting some of these issues at Williams College.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Now that we are all so well-educated about spyware, can we put the bad guys out of business? 既然我们都受过良好的间谍软件教育,我们能把坏人赶出这个行业吗?
Karen McDowell
{"title":"Now that we are all so well-educated about spyware, can we put the bad guys out of business?","authors":"Karen McDowell","doi":"10.1145/1181216.1181269","DOIUrl":"https://doi.org/10.1145/1181216.1181269","url":null,"abstract":"The phenomenon known variously as spyware, adware, or malware has grown exponentially in the past few years and has been swamping our computer systems, much like email spam but significantly worse in every sense of the word.Complicating the matter, the line between viruses and spyware is rapidly blurring, largely because of the increasing sophistication of this spyware and the multiplication of \"bots.\" While it is possible that university students are even more susceptible than the general public, it is certainly true that this is a serious national problem.Learning to identify and remove these insidious files is a critical step in securing computers and networks and in enabling faculty, staff, and students to complete their work safely and efficiently.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124706273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dressing up, dressing down: where is your career headed? 正装,便装:你的职业生涯走向何方?
Teresa W. Lockard, Jen Whiting
{"title":"Dressing up, dressing down: where is your career headed?","authors":"Teresa W. Lockard, Jen Whiting","doi":"10.1145/1181216.1181262","DOIUrl":"https://doi.org/10.1145/1181216.1181262","url":null,"abstract":"Your professional abilities are advertised in the first two seconds of every interaction. That's right, you have two seconds to make yourself viewed as capable, professional and ready for the next step in your career. It isn't your experience, your education or your accomplishments that people are assessing in those first two seconds -- it's your image.If you are interested in moving your career forward, in advancing your professional opportunities and in simply being more respected, look in your closet. Is your wardrobe setting you up for success? Do you look as confident as you feel? If you want to move up in management, you need to stop dressing like a sys-admin. Join us as we look at one of the simplest and most straight-forward ways to advance your career: how to dress for success.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124251288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging our campus IT in the wake of the storm 在风暴过后利用我们的校园IT
Scott Delaney, Stacey Morales
{"title":"Leveraging our campus IT in the wake of the storm","authors":"Scott Delaney, Stacey Morales","doi":"10.1145/1181216.1181235","DOIUrl":"https://doi.org/10.1145/1181216.1181235","url":null,"abstract":"In the hours after Hurricane Katrina demolished the Louisiana Coast, Louisiana State University soon became the center of recovery and relief efforts for the state. This was obviously an effort that spanned all parts of the institution, but as one would expect, information and communication were key to the success of all the parties involved.In our discussion we would like to tell the story of how Louisiana State University's IT resources were key to the recovery efforts in our state.Our organization was equipped to put phones, computers, telephone and networking services in the hands of the volunteers who were administering the triage hospital and acute care facilities on our campus. A hotline was established and staffed 24 hours in the weeks after the storm where citizens could get information. Our network operations center opened their doors to fellow universities in the state to recover their systems and redirect their web pages and communications. Computer labs were dismantled and the systems used in all aspects of the recovery where PCs were needed. We leveraged our partnerships with vendors such as Microsoft, IBM and Cisco to get equipment and supplies where they were needed.We would like to share our story with others so that they will hear firsthand what Louisiana State University's IT department did in the wake of the storm. We hope this will open discussion and dialog that will help other universities understand the power of their resources should they be faced with a disaster of this magnitude.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信