{"title":"Facilitating innovative faculty projects: an information technology perspective","authors":"Paul Brown, Kenneth Janz","doi":"10.1145/1181216.1181225","DOIUrl":"https://doi.org/10.1145/1181216.1181225","url":null,"abstract":"The Center for Instruction, Research, and Technology (CIRT) at Indiana State University assists faculty with integration of emerging and innovative technologies into their instruction and research activities. This support ranges from High Performance Computing (HPC) to visualization services. CIRT also provides academic programming support to the University community. Additionally, one of the center's main goals is to continually explore and evaluate new and emerging technologies to support teaching, research, and student learning. This paper covers an internal grant program established by the center, the process of working with faculty on research proposals, and descriptions of several projects developed by CIRT for faculty.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The matrix and beyond: expanding proactive resources for customers","authors":"Mo Nishiyama, Leslie J. McNeil, Holly E. Wyatt","doi":"10.1145/1181216.1181279","DOIUrl":"https://doi.org/10.1145/1181216.1181279","url":null,"abstract":"At Oregon Health & Science University (OHSU), essential duties of the Information Technology Group (ITG) include providing support for a diverse customer base. Faculty, staff, students, volunteers, visiting scholars, interns, vendors, and community healthcare partners all rely on ITG's Customer Relations Management Division (CRMD) for resolving their computing and account access issues. In a dynamic support environment where many of the customer roles falls outside the one-size-fits-all support approach, CRMD expanded their approach to accommodate their diverse clients.CRMD's Computer Access group introduced role-based matrices on their electronic account request forms to help simplify the challenges of granting appropriate network accesses. The revamped forms reduced follow-up contacts from customers. CRMD's HelpDesk launched an online Self-Service Portal for providing customers with one-stop shopping for their diverse computing needs. Content provided on the portal includes self-service password changes, tree-based knowledge base articles organized by applications, quick reference guides for role-based password requirements and core applications, password and access matrix for nearly 40 applications, and computing tips of the week. The portal provides a convenient around-the-clock alternative for customers who wish to resolve their computing issues immediately without having to contact the HelpDesk directly.By implementing proactive forms and resources, ITG has taken steps to address the ever-expanding needs of their diverse customer base. These changes increase the level of self-sufficiency for customers, reduce the staff's customer contact time for routine issues, and provide the ITG a chance to learn the needs of their constituents.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Providing support to the expanding university","authors":"Louis Kelly, Sandra Johnson","doi":"10.1145/1181216.1181254","DOIUrl":"https://doi.org/10.1145/1181216.1181254","url":null,"abstract":"Faculty support, classroom remodels and upgrades, student-owned computers, wireless networking, and demands for campus technology are increasing on campuses across the country. To provide support for these and other technology needs of the campus community, Information Technology (IT) departments have had to stretch their resources. Arizona State University is one college that is currently in the process of dealing with these \"growing pains.\" To handle the rising need for services, the University Technology Office (UTO) at Arizona State University is redesigning its model of support into a robust, expandable model that will grow with demand in the coming years. For the expandable model to be successful, careful planning is required from everyone within the department. Such planning allows the department not only to create an expandable model of support, but to create it around the university's overall mission and goals.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122347362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating synergy to make I.T. happen","authors":"Stacey Morales, T. Sparks","doi":"10.1145/1181216.1181274","DOIUrl":"https://doi.org/10.1145/1181216.1181274","url":null,"abstract":"Synergy - The working together of two or more things, people, or organizations, especially when the result is greater than the sum of their individual effects or capabilities.At LSU we are making I.T. happen by working together with other organizations on campus to create rich technology spaces where students have access to not only traditional computer labs, but added functions such as social spaces, mobile device circulation, high end media development and output, vending services, digital art gallery, technical support, and library reference.This year LSU will create an Information Commons in our main campus library. The success of this project is the result of a long dialog and working relationship with various organizations that include the LSU Library administration, Contracted Auxiliary Services, Copier management, Graphic Services, College of Art and Design, Information Technology Services, and the Student Technology Fee Oversight Committee.LSU would like to present the ways in which they have created synergy with organizations on campus in order to create spaces where students can gather to collaborate and learn in settings that they are most comfortable and most productive. All of the participating organizations have recognized needs in their areas that without a synergetic effort might have not been possible or resulted in failures. We will speak on why this synergetic solution has worked and reflect on past projects that did not work because they were not coordinated efforts and were missing aspects or functions that could have made them successes.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EMS: a homegrown identity management system","authors":"William P. Murphy III","doi":"10.1145/1181216.1181277","DOIUrl":"https://doi.org/10.1145/1181216.1181277","url":null,"abstract":"In 2005 Salem State College upgraded a nine year old email system to Novell's GroupWise. In addition, the College had recently implemented a One Card, web portal, and student administration systems.As we moved forward with these initiatives, we hoped to establish formal user management policies. An IT audit identified a number of problems which needed to be addressed. In the past each IT system was isolated, so users could have different usernames in each system and there were no policies for adding or removing users from these systems. We found: End users with different usernames in each system Users who were deceased or no longer employed Users added or removed from systems without authorization from Human Resources (HR) Users who were not authenticated before they were given College credentials (email address, ID card, etc.) We suspect these challenges/opportunities might exist at other institutions of higher education.With very little time and no budget, we developed EMS, the Employee Management System, a homegrown system designed to authenticate new users, issue usernames, communicate status changes with trusted systems, and continually audit the list of users.Cooperation within IT, and with HR, has helped to make EMS the central point of contact for all IT resources. This system is a work in progress and we are now looking at how this system might be used in other areas.This presentation will include a demonstration of EMS, discussions on where we are, where we are going, and lessons learned along the way.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network based storage: getting students to actually use it","authors":"Allan Chen","doi":"10.1145/1181216.1181229","DOIUrl":"https://doi.org/10.1145/1181216.1181229","url":null,"abstract":"The Academic Computing department at Stanford University has worked on implementing an effective network storage strategy for some time. Students need to be able to access their files in our labs, in their rooms, and even off campus. While removable media in the form of floppy then Zip discs and now USB \"thumbdrives\" have filled this need to an extent, it is still critical to offer a reliable network option. Central IT has offered a network storage solution for a number of years, but achieving wide-spread use through reliable means has been difficult. They have offered and/or built tools ranging from simple FTP to modified versions of proprietary clients to students to access their home folders. However, it was not until very recently that use of this service has increased. The biggest factor in this change was not simply that the methods for access matured, but that we have designed our desktop experience to make such access seamless and invisible. This, in turn, has encouraged students to use this single solution across campus, in our clusters and on their own machines.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specialized computer labs: care and feeding","authors":"Trevor M. Murphy, S. Macklin","doi":"10.1145/1181216.1181276","DOIUrl":"https://doi.org/10.1145/1181216.1181276","url":null,"abstract":"This paper is a brief overview of some of the challenges and successes related to the support of a Geographic Information Systems (GIS) Windows lab and a music technology Mac OS lab at Williams College. Specialized computer labs can present some surprising issues that set them apart from general academic computer labs. The GIS lab and music technology labs at Williams have provided many examples of such challenges, including: Finding academic pricing for non-academic software. Creating secure lab spaces. Handling unusual license management, including dongles and hasps, as well as software management schemes that involve locking software to a specific computer. Working around security issues with products that assume that all users have full administrative access to the lab computers. Solving peripheral software and hardware interface challenges. Training users and creating effective documentation. Troubleshooting non-standard hardware and software-intensive lab stations. Creating and deploying an image for a specialty lab.The authors share their experience supporting these labs and confronting some of these issues at Williams College.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Now that we are all so well-educated about spyware, can we put the bad guys out of business?","authors":"Karen McDowell","doi":"10.1145/1181216.1181269","DOIUrl":"https://doi.org/10.1145/1181216.1181269","url":null,"abstract":"The phenomenon known variously as spyware, adware, or malware has grown exponentially in the past few years and has been swamping our computer systems, much like email spam but significantly worse in every sense of the word.Complicating the matter, the line between viruses and spyware is rapidly blurring, largely because of the increasing sophistication of this spyware and the multiplication of \"bots.\" While it is possible that university students are even more susceptible than the general public, it is certainly true that this is a serious national problem.Learning to identify and remove these insidious files is a critical step in securing computers and networks and in enabling faculty, staff, and students to complete their work safely and efficiently.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124706273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dressing up, dressing down: where is your career headed?","authors":"Teresa W. Lockard, Jen Whiting","doi":"10.1145/1181216.1181262","DOIUrl":"https://doi.org/10.1145/1181216.1181262","url":null,"abstract":"Your professional abilities are advertised in the first two seconds of every interaction. That's right, you have two seconds to make yourself viewed as capable, professional and ready for the next step in your career. It isn't your experience, your education or your accomplishments that people are assessing in those first two seconds -- it's your image.If you are interested in moving your career forward, in advancing your professional opportunities and in simply being more respected, look in your closet. Is your wardrobe setting you up for success? Do you look as confident as you feel? If you want to move up in management, you need to stop dressing like a sys-admin. Join us as we look at one of the simplest and most straight-forward ways to advance your career: how to dress for success.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124251288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging our campus IT in the wake of the storm","authors":"Scott Delaney, Stacey Morales","doi":"10.1145/1181216.1181235","DOIUrl":"https://doi.org/10.1145/1181216.1181235","url":null,"abstract":"In the hours after Hurricane Katrina demolished the Louisiana Coast, Louisiana State University soon became the center of recovery and relief efforts for the state. This was obviously an effort that spanned all parts of the institution, but as one would expect, information and communication were key to the success of all the parties involved.In our discussion we would like to tell the story of how Louisiana State University's IT resources were key to the recovery efforts in our state.Our organization was equipped to put phones, computers, telephone and networking services in the hands of the volunteers who were administering the triage hospital and acute care facilities on our campus. A hotline was established and staffed 24 hours in the weeks after the storm where citizens could get information. Our network operations center opened their doors to fellow universities in the state to recover their systems and redirect their web pages and communications. Computer labs were dismantled and the systems used in all aspects of the recovery where PCs were needed. We leveraged our partnerships with vendors such as Microsoft, IBM and Cisco to get equipment and supplies where they were needed.We would like to share our story with others so that they will hear firsthand what Louisiana State University's IT department did in the wake of the storm. We hope this will open discussion and dialog that will help other universities understand the power of their resources should they be faced with a disaster of this magnitude.","PeriodicalId":131408,"journal":{"name":"Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}