Citrix Workspace, Chrome Enterprise, and Cloudready by Neverware

Total Page:16

File Type:pdf, Size:1020Kb

Citrix Workspace, Chrome Enterprise, and Cloudready by Neverware Solution Overview Citrix Workspace, Chrome Enterprise, and CloudReady by Neverware Deploy a secure and manageable cloud-native endpoint strategy Citrix.com Work outside the box — by simplifying what's inside the box. Organizations need endpoint solutions that provide maximum user flexibility and choice while being simple and straightforward to operate, manage, and secure at scale. Together, Google Chrome Enterprise, CloudReady devices, and Citrix services enable access to mobile apps, cloud-based applications, Software as a Service (SaaS), and virtual apps and desktops. Meanwhile, IT admins get comprehensive, cloud- based solutions that help them meet the evolving demands of their workforce. Embrace a cloud-native endpoint strategy Adoption of SaaS apps in the enterprise is growing dramatically. Highly desirable cloud services like Google G Suite and other SaaS apps are causing a shift in how people work, leading to a new kind of worker — the cloud worker. Free from the constraints of a physical device, cloud workers operate in a world where the workspace is the cloud. With access to information from anywhere on any device, Citrix Workspace these users also have a new set of expectations: Only Citrix offers the most complete • Cloud Workers expect to work securely from any device or location. and integrated workspace to enable people to securely access their apps, • They value speed, convenience, collaboration, and fluidity of work. desktops, and data from anywhere. • They primarily use cloud-connected applications at work, but may occasionally Rely on Windows and Linux app and need access to legacy apps and desktops. desktop delivery from Citrix Virtual This shift is exposing increasing tension around legacy end-user computing Apps and Desktops, device security endpoints. Most organizations still need to retain compatibility with Windows from Citrix Endpoint Management, and Linux apps and desktops to run key applications, even as they seek a more secure file sync and share with Citrix cloud-native endpoint strategy. Unfortunately, the bloat, lag, and never-ending Content Collaboration, and network management costs and insecurities of traditional endpoints are hampering the security with Citrix Gateway. Only ability to move to new service models, impeding user productivity. Citrix Workspace offers you complete choice of device, cloud and network, The combination of Google Chrome Enterprise and CloudReady OS with Citrix streamlined for IT control and simple, Workspace presents a compelling and comprehensive endpoint solution. secure access for users. • Chrome Enterprise unlocks the built-in business capabilities of Chrome OS, including faster deployment, managed security, granular oversight of your endpoints, seamless integration with your existing infrastructure, and 24/7 IT admin support. Native integration with G Suite and the Google Admin console allows organizations to manage, track, and organize users and devices without extra time and effort. • CloudReady by Neverware brings security and ease of management to any computer hardware— from brand new to 10 year old PCs and Macs while Chromebooks running Chrome OS and Chrome Browser securely harness the collaboration, agility, and flexibility of cloud-based tools and services. • Citrix Workspace provides secure access to Citrix Virtual Apps and Desktops as well as file syncing and sharing, either on-premise or in the cloud. Citrix.com | Solution Overview | Citrix Workspace, Chrome Enterprise, and CloudReady by Neverware 2 As they transition to the cloud, most organizations still have large numbers of The Citrix Ready Program traditional endpoints in the form of PCs and Macs. Aging hardware, security TThe Citrix Ready technology partner vulnerabilities, painful updates, and time-intensive maintenance of older, program offers robust testing, insecure operating systems are all growing concerns for traditional endpoints. verification, and joint marketing for Complicating matters, many multinational organizations face challenges sourcing Digital Workspace, Networking, and new endpoints with varying foreign restrictions, import tariffs, and local device Analytics solutions—with over 30,000 availability. Installing Neverware's CloudReady on compatible devices solves these partner verifications listed in the challenges directly. Citrix Ready Marketplace. Together with Chromebooks, laptops and desktops running CloudReady represent an attractive, secure and cost-effective cloud-native endpoint solution. Cloud workers harness the agility of cloud-based tools and services, safely, without dependency on a single device from a single vendor. Employees get secure access to the data they need to work more efficiently. IT administrators can depend on built-in protections and centralized management that mitigates end- user vulnerabilities. The Google Admin console gives administrators extensive management options to enforce policies across a wide range of criteria to control which types of websites, apps, and extensions can be accessed by users. Comprehensive built-in security coverage lets admins easily provision, monitor, and lock down all devices. As a verified and tested Citrix Ready Bundled Solution, the combination of Chrome Enterprise, CloudReady, and Citrix Workspace provides significant benefits: • Secure by design. A multilayered approach implemented in Chrome OS and CloudReady increases endpoint security. Citrix Workspace provides additional security solutions and an extensive choice of Citrix Ready Workspace Security partner solutions. • Lower costs. Organizations escape the high cost of traditional buying cycles by running the more efficient CloudReady operating system on their hardware. The Google Admin console provides simple and effective management, allowing IT resources to be refocused into other areas of the organization. • Ready for a cloud future. Organizations modernizing their end-user computing infrastructure and adopting cloud-oriented technologies need solutions that work now and into the future. This bundled solution provides for short- term needs while maintaining the flexibility to mature with the pace of your organization’s cloud adoption — with on-premise Citrix resources or Citrix Cloud. Key features of the joint solution Citrix is committed to improving the user experience and increasing productivity for an increasingly cloud-connected workforce. This bundled solution provides infrastructure that is secure, easy to use, and easy to manage: • Native Windows apps and desktops. Seamless / Windowed Mode functionality of Citrix Virtual Apps and Desktops brings native Windows app experiences to any Chrome OS or CloudReady device, without compromising the inherent security, manageability, and productivity for the end user. • Storefront management. Organizations can manage both on-premise and cloud-based StoreFront access and gateway configurations with a single Citrix.com | Solution Overview | Citrix Workspace, Chrome Enterprise, and CloudReady by Neverware 3 Google Admin policy by integrating Citrix Beacon functionality. IT departments The Citrix Ready Bundled Solutions benefit because there is a simple, singular point of configuration, allowing Program segregation of policies for security compliance. Users benefit because they can Citrix Ready Bundled Solutions securely roam internal and external networks without having to use a different Program delivers real benefits device, or contacting IT support. for Citrix partners by testing, • Mobility and security. The ability of Citrix Virtual Apps and Desktops to deliver documenting, and marketing two secure virtual Windows and Linux applications accessible from anywhere, on or more Citrix Ready solutions a securely managed Chrome OS or CloudReady endpoint, provides a strong together. Resulting solutions foundation for the mobile workforce of any enterprise business. address more complex use cases • 'Grab and go' loaner program. Users can grab a loaner device and automatically and can dramatically reduce risk register it as theirs when they log in. This results in their Citrix Virtual Apps and and deployment time for our joint Desktops being in logged-in user mode in the Chrome Management policies. customers. • Enhanced printing capabilities. The solution supports both the modular Common UNIX Printing System (CUPS) as well as PrinterLogic enterprise print management software. Solution architecture The solution empowers cloud workers with cloud-native endpoint strategies that are secure, scalable, manageable, and cost-effective. The integration of Citrix, Chrome OS or CloudReady, and the Google Admin console (Figure 1) provides a seamless environment for both cloud and on-premises virtualized apps and desktops — delivering on the promise of access to any app, from any location. Citrix Workspace Google Cloud Platform Citrix Citrix Gateway Networking Chromebook Chromebase Any hardware Citrix Networking Active Directory Chrome Enterprise Citrix device management Access Chromebox Chromebit Control Google Admin Console Server VDAs Storage Zone Figure 1. Citrix, Chrome OS devices, and Google Admin console integration Citrix.com | Solution Overview | Citrix Workspace, Chrome Enterprise, and CloudReady by Neverware 4 Chrome OS and CloudReady devices Citrix Cloud The solution incorporates Citrix Ready endpoints, including Chrome devices as Citrix Cloud makes it easy for IT teams well as laptops and PCs running Neverware's CloudReady OS. Based on Google’s to consolidate and deliver Windows open source Chromium OS, CloudReady
Recommended publications
  • Intro to Google for the Hill
    Introduction to A company built on search Our mission Google’s mission is to organize the world’s information and make it universally accessible and useful. As a first step to fulfilling this mission, Google’s founders Larry Page and Sergey Brin developed a new approach to online search that took root in a Stanford University dorm room and quickly spread to information seekers around the globe. The Google search engine is an easy-to-use, free service that consistently returns relevant results in a fraction of a second. What we do Google is more than a search engine. We also offer Gmail, maps, personal blogging, and web-based word processing products to name just a few. YouTube, the popular online video service, is part of Google as well. Most of Google’s services are free, so how do we make money? Much of Google’s revenue comes through our AdWords advertising program, which allows businesses to place small “sponsored links” alongside our search results. Prices for these ads are set by competitive auctions for every search term where advertisers want their ads to appear. We don’t sell placement in the search results themselves, or allow people to pay for a higher ranking there. In addition, website managers and publishers take advantage of our AdSense advertising program to deliver ads on their sites. This program generates billions of dollars in revenue each year for hundreds of thousands of websites, and is a major source of funding for the free content available across the web. Google also offers enterprise versions of our consumer products for businesses, organizations, and government entities.
    [Show full text]
  • Google Apps Premier Edition: Easy, Collaborative Workgroup Communication with Gmail and Google Calendar
    Google Apps Premier Edition: easy, collaborative workgroup communication with Gmail and Google Calendar Messaging overview Google Apps Premier Edition messaging tools include email, calendar and instant messaging solutions that help employees communicate and stay connected, wherever and whenever they work. These web-based services can be securely accessed from any browser, work on mobile devices like BlackBerry and iPhone, and integrate with other popular email systems like Microsoft Outlook, Apple Mail, and more. What’s more, Google Apps’ SAML-based Single Sign-On (SSO) capability integrates seamlessly with existing enterprise security and authentication services. Google Apps deliver productivity and reduce IT workload with a hosted, 99.9% uptime solution that gets teams working together fast. Gmail Get control of spam Advanced filters keep spam from employees’ inboxes so they can focus on messages that matter, and IT admins can focus on other initiatives. Keep all your email 25 GB of storage per user means that inbox quotas and deletion schedules are a thing of the past. Integrated instant messaging Connect with contacts instantly without launching a separate application or leaving your inbox. No software required. Built-in voice and video chat Voice and video conversations, integrated into Gmail, make it easy to connect face-to-face with co-workers around the world. Find messages instantly Powerful Google search technology is built into Gmail, turning your inbox into your own private and secure Google search engine for email. Protect and secure sensitive information Additional spam filtering from Postini provides employees with an additional layer of protection and policy-enforced encryption between domains using standard TLS protocols.
    [Show full text]
  • Notes on Chromebooks and Neverware Cloudready Chromium
    Chromebooks Are For Seniors - Ron Brown - APCUG VTC - 8-19-17 https://youtu.be/4uszFPNL-SU http://cb4s.net/ Are Chromebooks more secure than laptops? Google’s security features in ChromeOS When Google set about designing ChromeOS it had the distinct advantage of being able to see the problems that Windows, macOS, and even Linux had struggled with when it came to security. With this in mind it implemented five key features that make ChromeOS a formidable system for hackers to crack. ​ ​ Automatic Updates As new threats become known, it’s vital that patches are applied quickly to thwart them. Google has an excellent track record on this, as not only does it release fixes on a very regular basis, but with Chromebooks guaranteed OS updates for seven years after release, the majority of users are running the most up to date version anyway. his can be an issue on other platforms, where differing combinations of OS ​ ​ versions and hardware can delay patches. Sandboxing If something does go wrong, and malware gets onto a Chromebook, there’s not much damage it can do. Each tab in ChromeOS acts as a separate entity with a restricted environment or ‘sandbox’. This means that only the ​ ​ affected tab is vulnerable, and that it is very difficult for the infection to spread to other areas of the machine. In Windows and macOS the malware is usually installed somewhere on the system itself, which makes it a threat with a much wider scope. There are ways to restrict this of course, with anti-virus software, regular system ​ ​ scans, and not running as an administrator.
    [Show full text]
  • Crisis Spurs Vast Change in Jobs Trump,Speaking in the White Faces a Reckoning
    P2JW090000-4-A00100-17FFFF5178F ADVERTISEMENT Breaking news:your old 401k could be costing you. Getthe scoop on page R14. **** MONDAY,MARCH 30,2020~VOL. CCLXXV NO.74 WSJ.com HHHH $4.00 Last week: DJIA 21636.78 À 2462.80 12.8% NASDAQ 7502.38 À 9.1% STOXX 600 310.90 À 6.1% 10-YR. TREASURY À 1 26/32 , yield 0.744% OIL $21.51 g $1.12 EURO $1.1139 YEN 107.94 In Central Park, a Field Hospital Is Built for Virus Patients Trump What’s News Extends Distance Business&Finance Rules to edical-supplies makers Mand distributors are raising redflagsabout what April 30 they sayisalack of govern- ment guidanceonwhereto send products, as hospitals As U.S. death toll passes competefor scarce gear amid 2,000, experts call for the coronavirus pandemic. A1 GES staying apart amid Washingtonisrelying on IMA the Fed, to an unprecedented need formoretesting degree in peacetime,topre- GETTY servebusinessbalancesheets SE/ President Trump said he was as Congressreloads the cen- extending the administration’s tral bank’sability to lend. A4 ANCE-PRES social-distancing guidelines Manyactivist investorsare FR through the end of April as the walking away from campaigns U.S. death toll from the new GENCE or settling with firms early as /A coronavirus surgedpast 2,000 some demands seem less over the weekend. pertinent in altered times. B1 ANCUR BET Thestock market’s unri- By Rebecca Ballhaus, valed swingsthis month have KENA Andrew Restuccia OPEN ARMS: The Samaritan’s Purse charity set up an emergency field hospital in Central Park on Sunday near Mount Sinai Hospital, ignited even more interest and Jennifer Calfas which it said would be used to care for coronavirus patients.
    [Show full text]
  • Learn How to Use Google Reviews at Your Hotel
    Learn How to Use Google Reviews at your Hotel Guide Managing Guest Satisfaction Surveys: Best Practices Index Introduction 2 Can you explain Google’s rating system? 3 What’s different about the new Google Maps? 5 Do reviews affect my hotel’s search ranking? 6 How can we increase the number of Google reviews? 7 Can I respond to Google reviews? 8 Managing Guest Satisfaction1 Surveys: Best Practices Introduction Let’s be honest, Google user reviews aren’t very helpful And then there’s the near-ubiquitous “+1” button, a way when compared to reviews on other review sites. for Google+ users to endorse a business, web page, They’re sparse, random and mostly anonymous. You photo or post. can’t sort them, filtering options are minimal, and the rating system is a moving target. These products are increasingly integrated, allowing traveler planners to view rates, availability, location, But that’s all changing. photos and reviews without leaving the Google ecosystem. Reviews and ratings appear to play an increasingly critical role in Google’s master plan for world domination This all makes Google reviews difficult to ignore—for in online travel planning. They now show prominently in travelers and hotels. So what do hotels need to know? In Search, Maps, Local, Google+, Hotel Finder and the this final instalment in ReviewPro’s popular Google For new Carousel—and on desktops, mobile search and Hotels series, we answer questions from webinar mobile applications. attendees related to Google reviews. Managing Guest Satisfaction2 Surveys: Best Practices Can you Explain Google’s Rating System? (I) Registered Google users can rate a business by visiting its Google+ 360° Guest Local page and clicking the Write a Review icon.
    [Show full text]
  • GOOGLE LLC V. ORACLE AMERICA, INC
    (Slip Opinion) OCTOBER TERM, 2020 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus GOOGLE LLC v. ORACLE AMERICA, INC. CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FEDERAL CIRCUIT No. 18–956. Argued October 7, 2020—Decided April 5, 2021 Oracle America, Inc., owns a copyright in Java SE, a computer platform that uses the popular Java computer programming language. In 2005, Google acquired Android and sought to build a new software platform for mobile devices. To allow the millions of programmers familiar with the Java programming language to work with its new Android plat- form, Google copied roughly 11,500 lines of code from the Java SE pro- gram. The copied lines are part of a tool called an Application Pro- gramming Interface (API). An API allows programmers to call upon prewritten computing tasks for use in their own programs. Over the course of protracted litigation, the lower courts have considered (1) whether Java SE’s owner could copyright the copied lines from the API, and (2) if so, whether Google’s copying constituted a permissible “fair use” of that material freeing Google from copyright liability. In the proceedings below, the Federal Circuit held that the copied lines are copyrightable.
    [Show full text]
  • Advanced Search Options
    ADVANCED SEARCH OPTIONS Even the most powerful search engine requires a bit of fine-tuning. To enhance your Google search, try the following options: Phrase Searches Search for complete phrases by enclosing them in quotation marks. Words enclosed in double quotes ("like this") appear together in all results exactly as you have entered them. Phrase searches are especially useful for finding famous sayings or proper names. Category Searches The Google Web Directory (located at directory.google.com) is a good place to start if you're not sure exactly what terms to use. A directory can also eliminate unwanted results from your search. For example, searching for "Saturn" within the Science > Astronomy category of the Google Web Directory returns only Google supports several advanced operators. Many are pages about the planet Saturn, while searching for "Saturn" accessible from the Google advanced search page. within the Automotive category of the Google Web Directory returns only pages about Saturn cars. Advanced Searches Made Easy You can increase the accuracy of your searches by adding Domain Restrict Searches operators that fine-tune your keywords. Most of the options listed If you know the website you want to search but aren't sure on this page can be entered directly into the Google search box or where the information you want is located within that site, you selected from Google's "Advanced Search" page, which can be can use Google to search only that domain. Do this by entering found at: http://www.google.com/advanced_search what you're looking for, followed by the word "site" and a colon followed by the domain name.
    [Show full text]
  • In the Common Pleas Court Delaware County, Ohio Civil Division
    IN THE COMMON PLEAS COURT DELAWARE COUNTY, OHIO CIVIL DIVISION STATE OF OHIO ex rel. DAVE YOST, OHIO ATTORNEY GENERAL, Case No. 21 CV H________________ 30 East Broad St. Columbus, OH 43215 Plaintiff, JUDGE ___________________ v. GOOGLE LLC 1600 Amphitheatre Parkway COMPLAINT FOR Mountain View, CA 94043 DECLARATORY JUDGMENT AND INJUNCTIVE RELIEF Also Serve: Google LLC c/o Corporation Service Co. 50 W. Broad St., Ste. 1330 Columbus OH 43215 Defendant. Plaintiff, the State of Ohio, by and through its Attorney General, Dave Yost, (hereinafter “Ohio” or “the State”), upon personal knowledge as to its own acts and beliefs, and upon information and belief as to all matters based upon the investigation by counsel, brings this action seeking declaratory and injunctive relief against Google LLC (“Google” or “Defendant”), alleges as follows: I. INTRODUCTION The vast majority of Ohioans use the internet. And nearly all of those who do use Google Search. Google is so ubiquitous that its name has become a verb. A person does not have to sign a contract, buy a specific device, or pay a fee to use Good Search. Google provides its CLERK OF COURTS - DELAWARE COUNTY, OH - COMMON PLEAS COURT 21 CV H 06 0274 - SCHUCK, JAMES P. FILED: 06/08/2021 09:05 AM search services indiscriminately to the public. To use Google Search, all you have to do is type, click and wait. Primarily, users seek “organic search results”, which, per Google’s website, “[a] free listing in Google Search that appears because it's relevant to someone’s search terms.” In lieu of charging a fee, Google collects user data, which it monetizes in various ways—primarily via selling targeted advertisements.
    [Show full text]
  • Native Cloud Applications: Why Virtual Machines, Images and Containers Miss the Point!
    Institute of Architecture of Application Systems Native Cloud Applications: Why Virtual Machines, Images and Containers Miss the Point! Frank Leymann, Christoph Fehling, Sebastian Wagner, Johannes Wettinger Institute of Architecture of Application Systems, University of Stuttgart, Germany, [email protected] : @inproceedings{INPROC-2016-19, author = {Frank Leymann, Christoph Fehling, Sebastian Wagner and Johannes Wettinger}, title = {Native Cloud Applications: Why Virtual Machines, Images and Containers Miss the Point!}, booktitle = {Proceedings of the 6th International Conference on Cloud Computing and Service Science (CLOSER 2016)}, year = {2016}, pages = {7-- 15}, publisher = {SciTePress} } These publication and contributions have been presented at CLOSER 2016 http://closer.scitevents.org © 2016 SciTePress. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the SciTePress. Native Cloud Applications: Why Virtual Machines, Images and Containers Miss the Point! Frank Leymann, Christoph Fehling, Sebastian Wagner and Johannes Wettinger Institute of Architecture of Application Systems, Universität Stuttgart, Universitätsstraße 38, Stuttgart, Germany {leymann, fehling, wagner, wettinger}@iaas.uni-stuttgart.de Keywords: Cloud Computing, Virtualization, Cloud Migration, SOA, Microservices, Continuous Delivery Abstract: Due to the current hype around cloud computing, the term “native cloud application” becomes increasingly popular. It suggests an application to fully benefit from all the advantages of cloud computing. Many users tend to consider their applications as cloud native if the application is just bundled in a virtual machine image or a container.
    [Show full text]
  • Serverless Cloud Computing: a Comparison Between "Function As a Service"
    SERVERLESS CLOUD COMPUTING : A COMPARISON BETWEEN "F UNCTION AS A SERVICE " P LATFORMS Víctor Juan Expósito Jiménez and Herwig Zeiner JOANNEUM RESEARCH Forschungsgesellschaft mbH, Steyrergasse, Graz, Austria ABSTRACT Cloud computing is moving fast and continually progressing. Beyond the microservices architecture, a new paradigm appears to be evolving and complementing it. By using a serverless computing architecture, faster and more reliable developments are possible in several fields such as the Internet of Things, industrial or mobility applications. In this paper, a serverless computing architecture is described and, in addition, a comparison of the most important "Function as a Service" platforms is given. KEYWORDS Serverless Architecture, Function as a Service (FaaS), Cloud Computing, Microservices 1. I NTRODUCTION The Internet of Things (IoT) has changed the way applications are designed. Billions of devices will be connected to the network in a near future. The next generation of connected applications has to change the way they have been designed to support this exponential growth of connected devices and their corresponding services. At the moment, a microservices architecture can fulfill these requirements where the combination of different services is a main issue. In this kind of cloud computing architecture, all tasks and the logic are split in small services, where each is able to serve just one specialized purpose instead of one monolithic component for all purposes. This allows a more versatile development in which maintenance and updates can be done only to the needed components without changing the whole core system. Every service is isolated and all information and all controllers are accessible through external APIs.
    [Show full text]
  • Polycom UC Software 5.4.3 Administrator Guide
    ADMINISTRATOR GUIDE UC Software 5.4.3 | March 2016 | 3725-49104-010A Polycom® UC Software 5.4.3 Copyright© 2016, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Polycom, Inc. 6001 America Center Drive San Jose, CA 95002 USA Trademarks Polycom®, the Polycom logo and the names and marks associated with Polycom products are trademarks and/or service marks of Polycom, Inc. and are registered and/or common law marks in the United States and various other countries. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Polycom. Disclaimer While Polycom uses reasonable efforts to include accurate and up-to-date information in this document, Polycom makes no warranties or representations as to its accuracy. Polycom assumes no liability or responsibility for any typographical or other errors or omissions in the content of this document. Limitation of Liability Polycom and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Polycom and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Polycom has been advised of the possibility of such damages.
    [Show full text]
  • REGULAR MONTHLY BOARD MEETING March 28, 2017 7:00 PM
    REGULAR MONTHLY BOARD MEETING March 28, 2017 7:00 PM Educational Support Center Board Meeting Room 3600-52nd Street Kenosha, Wisconsin This page intentionally left blank Regular School Board Meeting March 28, 2017 Educational Support Center 7:00 PM I. Pledge of Allegiance II. Roll Call of Members III. Awards/Recognition A. KUSD Elementary Spelling Bee Winners B. KUSD Middle School Spelling Bee Winners C. Future Business Leaders of America Regional Leadership Conference Award Winners (Bradford & Tremper) D. Exchange Club of Kenosha A.C.E. Award Recipient IV. Administrative and Supervisory Appointments V. Introduction and Welcome of Student Ambassador VI. Legislative Report VII. Views and Comments by the Public VIII. Response and Comments by Board Members (Three Minute Limit) IX. Remarks by the President X. Superintendent’s Report XI. Consent Agenda A. Consent/Approve 4 Recommendations Concerning Appointments, Leaves of Absence, Retirements, Resignations and Separations B. Consent/Approve 5 Minutes of 2/23/17, 2/28/17 and 3/7/17 Special Meetings and Executive Sessions, 2/23/17, 3/6/17 and 3/7/17 Special Meetings, and 2/28/17 Regular Meeting C. Consent/Approve 20 Summary of Receipts, Wire Transfers and Check Registers D. Consent/Approve 27 Changes to Building Permit Fees & Regulations and Board Policies 1330 & 1331 (Second Reading) E. Consent/Approve 45 School Board Policies Update - Employee Handbook (Second Reading) XII. Old Business A. Discussion/Action 134 Employee Health Clinic Cost Savings Option XIII. New Business A. Discussion/Action 138 Resolution No. 331 Authorizing a State Trust Fund Loan in the Amount of $16,355,000 for Energy Efficiency Projects B.
    [Show full text]