Ecommunicator

Total Page:16

File Type:pdf, Size:1020Kb

Ecommunicator N O R T H W E S T E R N U N I V E R S I T Y I N F O R M A T I O N T E C H N O L O G Y SPRING 2 0 0 5 N O. 2 ecommunicaFor staff and faculty interested in using technology that impactstor their work environment. Get Ready for a Leaner, Cleaner Inbox with Northwestern’s New E-mail Defense System If your DELETE key is getting a daily workout from the mountain of unsolicited commercial or junk e-mail, take heart. Soon, your inbox will be lighter and healthier as those annoying “need a 3.25% mortgage rate,” “this pill will fix everything,” or “take your business worldwide” messages begin to disappear. The reason: Northwestern’s new University-wide E-mail Defense System (EDS). The E-mail Defense System is an enterprise e-mail filtering system powered by Sophos PureMessage. It will scan all incoming Northwestern e-mail for junk e-mail, virus, and malicious spyware threats before they are delivered to the University’s central e-mail servers (casbah, hecky, lulu, and merle). How will the E-mail Defense System work? Using a combination of anti-virus, anti-junk e-mail and threat reduction technology, each incoming e-mail is analyzed and assigned a junk e-mail probability rating between 0% and 100%. The higher the rating, the more likely the e-mail is identified as junk and is safely quarantined in a separate location on the network. Each user will receive a daily e-mail digest with a list of quarantined messages and will have the opportunity to access, review, and retrieve any messages falsely identified as junk. Users also have the benefit of managing their quarantined messages, ensuring that desired e-mails are properly delivered. Most importantly, virus-infected e-mail is now automatically blocked, posing no threat to the network or individual computer systems. How did Northwestern choose this system? An evaluation team with University-wide representation was involved in testing the new system. Benchmarking also took place with several peer institutions, such as the University of Chicago and Purdue University, who are currently using this technology with great What’s Inside! success. Electronic Encyclopedia..........page 2 “It was important for us in the testing phase to identify and address University-wide Datacenter Upgrade...........page 2 priorities relating to the new E-mail Defense System,” said Wendy Woodward, director of NUIT Technology Support Services. “The end results were overwhelmingly high. Nearly 95% Keeping Your Data Safe...........page 3 of those who participated in the evaluation saw this system as a benefit to the University.” Q & A: Junk E-mail.......................page 3 When will the E-mail Defense System be implemented? E-Billing Delivery.............page 4 NUIT has already begun scanning all incoming Northwestern e-mail for virus threats, mass CONDUITS Update.............page 4 mailer worms, and other forms of malicious code, before it is delivered to the University’s Featured Web Site....................page 4 central e-mail servers (casbah, hecky, lulu, and merle). Full implementation of the EDS will be an opt-out service launched early fall quarter; however, users who do not wish to Software Corner.......................page 4 participate in the junk e-mail filtering will be able to remove themselves by using easy-to- Go Wireless This Summer...........page 5 follow instructions that will be made available closer to implementation. What’s New & Changing.............page 5 Continued on page 5 Identity Theft ...........page 6 Datacenter Upgrade and Chicago’s History Comes to Life Online Temporary Shutdown Chicago’s legendary history has been Between 6:00 p.m. on Saturday, captured in an exciting, comprehensive June 25 and noon on Sunday, June resource that not only brings the past to 26, a generator and an upgraded power supply will be installed at life, but goes beyond any previous work in the central NUIT Datacenter. The detail, scope, and accessibility. project will unavoidably interrupt online services for up to 18 hours, The Electronic Encyclopedia of Chicago but is necessary to strengthen the <www.encyclopedia.chicagohistory.org>, availability of University applications a collaboration between the Chicago and protect critical data. Functions Historical Society (CHS), the Newberry such as e-mail (including bulkmail Library, and Northwestern University, and listservs), the Library’s Voyager represents nearly three years of work System, Northwestern’s Web sites by specialists from NUIT Academic (including Plan-it Purple), Meeting An interactive “rich map” pinpoints locations of labor unrest Maker, HRIS, CAESAR, and the Technologies and their CHS counterparts. leading up to the 1886 Haymarket bombing. Clickable Course Management System will “hot spots” link to related information. Although it owes much to the recently be unavailable during the upgrade. Among the site’s outstanding features is School and departmental servers released print Encyclopedia of Chicago an online bound volume viewer that allows and research systems housed at developed by the Newberry and CHS, you to browse original archival documents the central Datacenter will also be the Electronic Encyclopedia “takes the page by page in high-resolution detail, affected. information to new levels previously including Daniel Burnham’s complete 1909 unavailable in any form,” said Bob Taylor, “We must be able to provide reliable Plan of Chicago. “This is the nicest example and secure central University director of NUIT Academic Technologies. we’ve seen to date of a historical document computing systems even in the In fact, material in the print Encyclopedia viewer for the Web that pays full respect to event of an electrical utility company accounts for a relative fraction of what is outage,” said Dana Nielsen, director the print original,” Taylor said. contained within the Web version. of NUIT Computing Services. “The generator will provide the power we There are custom-designed tools for The Electronic Encyclopedia seamlessly need to keep our central services viewing the site’s thousands of zoomable, integrates thousands of authored entries, continuously operational.” high-resolution images, and a unique historic documents, photographs, video, “breadcrumb trail” with sequential Although the actual length of service maps, letters, newspapers and more, for thumbnails of recently viewed pages. interruption may be shorter than 18 virtually unlimited browsing without ever hours, NUIT recommends that users reaching a “dead end.” “There’s always a new Each of the site’s 1,400 authored entries is plan for the full implementation window. E-mail service will be direction ahead,” said Taylor. cross-indexed to generate “see also” restored first on Sunday, June 26. references—a challenging task, considering Behind that overwhelming volume of E-mail sent to accounts on the the amount of information available. information is a supporting structure central servers (casbah, hecky, lulu, “We considered each reference very engineered as skillfully as that of any merle) during the service outage will carefully,” Taylor said. “It took an be delivered when the system Chicago skyscraper. A team of NUIT Web amazing amount of work by the Academic is back online. applications developers and media specialists Technologies team led by Harlan, Bill, led by Bill Parod, scholarly technologies As additional services become and Jonathan. I cannot say enough about architect; Jonathan Smith, distributed available, they will be posted to the their effort and their determination to nwu-comp-announce listserv and to learning architect; and Harlan Wallach, meet the goals of CHS, the Newberry, and NUIT’s Status of University Services media services architect, worked in close Northwestern on this project.” page at <status.northwestern.edu>. collaboration throughout the project. For more detailed information, The Electronic Encyclopedia of Chicago is please visit NUIT’s “What’s New and a “living” history of the city, according to Changing with Technology @ NU” Taylor. The Chicago Historical Society plans at <www.it.northwestern.edu/ to continue to build content on the site transitions/>. Please direct questions during the coming years, with the regarding the service outage to it- assistance of NUIT Academic Technologies. [email protected]. Official launch on May 11 (l to r): Mort Rahimi, vice president and chief technology officer, Northwestern University; Lonnie Bunch, president, Chicago Historical Society; Chicago Mayor Richard M. Daley; James R. Grossman, vice president for research and education, Newberry Library. 2 | N O R T H W E S T E R N U N I V E R S I T Y I N F O R M A T I O N T E C H N O L O G Y e C O M M U N I C A T O R Information Security Q & A: Junk e-mail filtering Keeping Your Portable Data Safe Q: My inbox is always full of junk David Kovarik, Director e-mail. How can I control it? NUIT Information & Systems Security/Compliance You’re the key! A: An easy way to reduce the amount Handheld devices such as PDAs, Blackberrys, smartphones, and the of junk e-mail you receive is by more recent “converged devices” that combine various functions of the using an e-mail filter. For example, if first three, continue to become more prevalent in their use and more you see the same unsolicited e-mail advertisements in your Inbox every powerful in their ability to provide services. Convergence of services day, instead of deleting them, you can has unfortunately resulted in expanded exposure to risk. The expanded easily block them so you’ll never see capabilities (e.g., wireless, Instant Messaging) offered by handhelds them again. present increased opportunities for infection by viruses, worms, etc. and provide active, portable platforms for propagation. The Cabir worm and “Skulls” program Many Internet Service Providers (ISPs) or e-mail programs provide junk e-mail are examples of malicious code specifically directed towards handheld devices.
Recommended publications
  • 2010 Survey Results
    IT SERVICES 2010 Client Satisfaction Survey March, 2010 Acknowledgements The Stanford IT Services Client Satisfaction Team consisted of the following: Jan Cicero, Client Support Alvin Chew, Communication Services Liz Goesseringer, Business Services Tom Goodrich, Client Support Jim Knox, Facilitator, Client Support Phil Reese, Research Computing Nancy Ware, Strategic Planning Bryan Wear, Computing Services Brian McDonald, MOR Associates Chris Paquette, MOR Associates Alexis Bywater, MOR Associates MOR Associates, an external consulting firm, acted as project manager for this effort, analyzing the data and preparing this report. MOR Associates specializes in continuous improvement, strategic thinking and leadership development. MOR Associates has conducted a number of large-scale satisfaction surveys for IT organizations in higher education, including MIT, Northeastern University, the University of Chicago, and others. MOR Associates, Inc. 462 Main Street, Suite 300 Watertown, MA 02472 tel: 617.924.4501 fax: 617.924.8070 morassociates.com Brian McDonald, President [email protected] Contents Introduction. a1 Methodology . a2 Overview.of.the.Results . 1 Reading.the.Charts. 25 Customer.Service.and.Service.Attributes. 29 Research.Computing.and.IT.Services.Priorities. .33 General.Support. .41 Data.Storage.Services .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..51 Email.and.Webmail. 59 Calendaring. 63 Network.Services. 67 Telecommunications.Services. 73 Remote.Access . 83 Mobile.Devices . 87 Software. .89 Security. 93 Web.Services. 99 Appendix.A:.The.Full.Text.of.Written.Comments. .A-1 Appendix.B:.The.Survey.Instrument. B-. 1 Appendix.C:.Other.Observations . .C-1 Stanford Information Technology Services 2010 Client Survey • Introduction | a1 Introduction This report provides a summary of the purposes, the methodology and the results of the client satisfaction survey sponsored by Stanford Information Technology Services in March, 2010.
    [Show full text]
  • Calendar Quick Start Using Outlook Web Application (OWA) 1 Signing
    Calendar Quick Start using Outlook Web Application (OWA) Signing In • Point your browser to: email.fhda.edu 1 • Select either private or public computer. If you are the only person who has access to the computer it is private. With the private version, the system will allow a longer period of inactivity before signing you out. • Leave the box next to “User light version…” unchecked unless you are visually impaired or are using a very old version of your browser. • Enter you 8-digit Campus Wide ID (CWID) and the password you use to sign into MyPortal. Some basics: 1. E-mail and calendar are completely integrated. A meeting invitation will generate an e- mail that appears in your inbox and displays on your calendar. 2. Right clicking (Control click on a Mac) will often display a menu that contains the action you are looking for. 3. Moving your mouse over an icon will display the icon’s function. 4. Icons without a down-arrow next to them do only one thing. There is no drop-down menu. 5. Clicking on an icon or title can produce something different than when you click on the down arrow next to it. For example clicking on New in the menu bar will bring up the form to create a new e-mail. However clicking on the down arrow to its right will display a list of options. 6. Arrows pointing to the right are used to expand and collapse lists. In the example to the right, the solid arrow shows that Ann Beebe’s list of files is expanded, but the Inbox folder is collapsed.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Installation Guide Meeting Maker
    Enterprise Scheduling & Calendaring Meeting Maker Installation Guide 010-MAN-0560 Copyright © 1999 by ON Technology Corporation. All rights reserved worldwide. Second Printing: June 1999 Information in this document is subject to change without notice and does not represent a commitment on the part of ON Technology. The software described in this document is furnished under a license agreement and may be used only in accordance with that agreement. This document has been provided pursuant to an agreement containing restrictions on its use. This document is also protected by federal copyright law. No part of this document may be reproduced or distributed, transcribed, stored in a retrieval system, translated into any spoken or computer language or transmitted in any form or by any means whatsoever without the prior written consent of: ON Technology Corporation One Cambridge Center Cambridge, MA 02142 USA Telephone: (617) 374 1400 Fax: (617) 374 1433 ON Technology makes no warranty, representation or promise not expressly set forth in this agreement. ON Technology disclaims and excludes any and all implied warranties of merchantability, title, or fitness for a particular purpose. ON Technology does not warrant that the software or documentation will satisfy your requirements or that the software and documentation are without defect or error or that the operation of the software will be uninterrupted. LIMITATION OF LIABILITY: ON Technology's aggregate liability, as well as that of the authors of programs sold by ON Technology, arising from or relating to this agreement or the software or documentation is limited to the total of all payments made by or for you for the license.
    [Show full text]
  • Email and Calendaring in Focus - Discussion Notes
    Email and Calendaring in Focus - Discussion Notes Things that are NOT working today: No integration between email and calendar No institutional contact list Contact lists is not shared between web and fat sundial client Multiple calendaring solutions in a particular department.need to use all to get meetings setup Syncing issues User base rejecting central offerings Size of the text changes without reason. Makes it difficult to send something that you think we will see. Find this with external more than email. Webmail and Eudora client versus looking at home. Get rid of spam, go home, and it’s all there again. They reverted back to old webmail version and I lost everything. Webmail the weakest point. I find Cyrus pretty good. Server-side mail features pretty good. Mail can be filtered into folders, don’t have to duplicate into folders, but haven’t rolled out campus-wide. This is an absolute essential, that’s client independent (device and software). Automatic contact lists. Should be able to go to like a division and have their emails loaded into your contacts. And be notified that people left Stanford. It affects the length of my contact list. Ex.: Peoplesoft indicates that they are gone and no longer at this email. Should interface with PeopleSoft. We recognize the corporations don’t have to standardize; they support choice. We work with administrative guidance stuff. Per the admin guide and request of president’s office. Permission has to go through president’s office. And on a personal note: auditing on calendar for date and time stamp, when I create something.
    [Show full text]
  • Information Technology 2000-2001 Activities Report
    Virginia Tech Vice President for Information Technology Annual Report 2000 - 2001 Information Technology & Services for Higher Education Virginia Polytechnic Institute and State University Mission ............................................................................................................................... 1 Goals................................................................................................................................... 1 Structure............................................................................................................................. 1 Financial Summary ........................................................................................................... 2 Highlighted IT Individuals ................................................................................................ 3 Information Systems and Computing ........................................... 8 Information Systems & Computing (ISC) is Comprised of the Following Operational Areas:.................................................................................................................................. 9 Overview:......................................................................................................................... 9 Direct Services to Individuals: Students, faculty, Staff, and Friends of the University 10 Electronic Services........................................................................................................ 10 Direct Support of Information Technology Services..................................................
    [Show full text]
  • Draft ODIN Delivery Order Requirements ***Master***
    CONTRACT NNL07AA69D (Contract) The following information has been determined to be exempt from disclosure and has been deleted from the contract: • Pages 2&3 of 181: Computer Seat RTS Charge per seat • Page 5 of 181: Asset Transition Charge • Page 30&31 of 181: Quantities/Rates under Virtual Team Meeting (VTM) Seat Clarifications • Page 96 of 181: The Profit Rate • Pages 98&99 of 181: Labor Hour Burdened Rates • Page 101 of 181: Rates in Section 16 • Page 138 of 181: Computer Seat Prices • Page 142 of 181: Rate in 66d • Page 148 of 181: Commercial Telephone Service Costs The deleted material is exempt from disclosure under 14 C.F.R. 1206.300(b)(4) which covers trade secrets and commercial or financial information obtained from a person and privileged and confidential information. It has been held that commercial or financial material is “confidential” for purposes of this exemption if its disclosure would be likely to have either of the following effects: (1) impair the Government’s ability to obtain necessary information in the future; or (2) cause substantial harm to the competitive position of the person from whom the information was obtained, National Parks and Conservation v. Morton, 498 F2.d 765 (D.C. Cir. 1974). 02/02/2002 21:05 3013522620 LMIT ENTERPRISE SOL PAGE SOLICITATION/CONTRACT/ORDER FOR COMMERCIAL ITEMS 1. REQUISITIONNUMBER P4GE PAoGE(S) See Block 25 Below. 1 182 OFFEROR TO COMPLETE BLOCKS 12, 17 23. 24, & 30 2. M~~lerCONTRACT NO. 3 AWARD/EFFECTIVECATE 4 ORDERNUMBER ! 6 SOLICITIITIONNO. S SOLICITATIONISSUE DATE NASS-98145 A riJ 1,2007 NNL07AA69D CODE ARMD DO3 December 18, 2006 7 FOR SOLICrrATION J NIIM~ b.
    [Show full text]
  • Meeting Maker Best Practices
    Meeting Maker Best Practices Chris Johnson Technical Support Specialist Agenda Meeting Maker Best Practices • Solutions for Common Challenges • The Best Source for Help • How to Change the Look and Feel • Creating Activities • Managing Invitees and Proxies • Questions Solutions for Common Challenges Challenge: • “I can’t see my most up-to-date calendar when I use Meeting Maker from off campus.” • Log into VPN before starting Meeting Solution: Maker, this creates a secure connection • Use the MM Web client at https://meetingmaker.northwestern.edu/ mmwebclient/ Solutions for Common Challenges • “Why am I experiencing… Challenge: – inability to print my calendar and events correctly?” – a reset of the format changes I’ve made?” – regular crashes of the program?” – timeouts with the Web client?” Solution: • The Meeting Maker vendor released a fix for many of these bugs, version 8.5.3b171 • Available on the NUIT Web site http://www.it.northwestern.edu/software/ staff/dept/meetingmaker/ Solutions for Common Challenges Challenge: • “This version seems to open and close more slowly than the previous version.” • Your patience is required on this one! Solution: • The Meeting Maker vendor is aware of the issue and tells NUIT that every new version of MM will indeed be slower than you are used to Agenda Meeting Maker Best Practices • Solutions for Common Challenges • The Best Source for Help • How to Change the Look and Feel • Creating Activities • Managing Invitees and Proxies • Questions Get Familiar with Meeting Maker Help Provides step-by-step
    [Show full text]
  • Ecommunicator
    N O R T H W E S T E R N U N I V E R S I T Y I N F O R M A T I O N T E C H N O L O G Y WINTER 2 0 0 5 N O. 1 ecommunicaFor staff interested in using technology that impactstor their work environment. Behind the Scenes: Bringing University Administrative Systems to Life! Have you ever watched the credits roll at the end of a movie? It’s amazing to see how many people it takes to create a blockbuster production. Everyone on the film crew has different jobs, working “behind the scenes” for the same goal . to bring the project to life! Minus the Hollywood glitz, Northwestern’s Information Technology Management Systems (ITMS) team works in much the same way—behind the scenes every day to keep essential University administrative systems running smoothly. If your job involves accessing functions such as payroll, job tracking, registration, or student accounts, or you have enjoyed the convenience of being able to update your directory information, view your paycheck, or review your benefits online, then you are being supported by Management Systems. “We think of ourselves as part of a much larger team within Northwestern,” said Betty Brugger, director of Management Systems. “Collaboration with other departments is essential. The varied talents, skills and interests of those we partner with help us to achieve optimal results.” Major Blockbuster Releases Management Systems’ primary customers are central administrative offices and administrative units of schools and divisions. Among the major initiatives Management Systems has helped develop and maintain for the University are the Human Resources Information System (HRIS), Electronic Time Entry System (ETES), and Student Enterprise System (SES).
    [Show full text]
  • Proposal for Aventri Intelligent Meeting & Event Management Software
    13 Marshall St. Norwalk CT 06854 www.aventri.com MEETING AND EVENT MANAGEMENT SOFTWARE OVERVIEW Prepared by Kathleen Roberge Chief Revenue Officer, Aventri PROPOSAL OUR VALUE PROPOSITION The unique offering and opportunities from Aventri help reduce total cost of ownership (TCO) and enable future growth. These two points and more have been outlined and considered extensively through each part of this proposal. A fundamental question we would pose in helping you decide would be this: would you prefer a partner that has dedicated the majority of its resources to creating, developing and seeking perfection for its product, or a partner that’s reasonably content with its product and pours all its money and resources into marketing and promoting it? Now there’s nothing wrong with marketing, but it doesn’t help Aventri successfully improve the quality of its meetings program or end-to-end event management activities. Our obsession with product perfection means we are working every day to enhance our product and have our customer base share in the results. It is this mindset that allowed us to record a 90+% renewal rate and maintain lasting relationships with organizations like Dell, Amway, Aveda, Colombia University, and The Financial Times, to name a few. It is this same mindset that pushes Aventri to constantly seek added functionality to our already- robust system. We introduce new features every two weeks to ensure the platform is constantly evolving and these updates are available instantly to our clients as part of their subscription. We bring our expertise as former event planners and event strategists to the table and offer our expertise to help you realize your vision and enable future growth.
    [Show full text]
  • BG News (Student Newspaper) University Publications
    Bowling Green State University ScholarWorks@BGSU BG News (Student Newspaper) University Publications 4-21-2008 The BG News April 21, 2008 Bowling Green State University Follow this and additional works at: https://scholarworks.bgsu.edu/bg-news Recommended Citation Bowling Green State University, "The BG News April 21, 2008" (2008). BG News (Student Newspaper). 7921. https://scholarworks.bgsu.edu/bg-news/7921 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. This Article is brought to you for free and open access by the University Publications at ScholarWorks@BGSU. It has been accepted for inclusion in BG News (Student Newspaper) by an authorized administrator of ScholarWorks@BGSU. ESTABLISHED 1920 A daily independent student press serving THE BG NEWS the campus and surrounding community Monday April 21,2008 Univ. senior Volume 101. Issue 143 WWWBGNEWSCOM publishes Yale student's art project short stories 'tests' abortion By Kelly M.tz Reporter A senior art major sparked a community Kenny Rogers Ir. is not just a uproar when she senior at the University; he is also a published writer. allegedly impregnated Rogers sent "Thoughts in herself and then induced Italics" to Publish America in abortions as often as January, and as of last month, the book was searchable as a pub- possible over a nine- lished work on Amazon.com. month period for a "When 1 was a school project. The kid. I wanted to controversial tapes show be a writer, but I was young and her in the shower, stupid and didn't bleeding into a cup think writers are | Pa* 3 remembered," he said.
    [Show full text]
  • Using Skype for Business for Virtual Office Hours
    Using Skype for Business for Virtual Office Hours Skype for Business is a communications platform that allows you to interact with your colleagues and students using instant messaging (IM), audio and video conversations, and Skype for Business Meetings. It runs on Windows and Mac operating systems, mobile devices and the web. The web application has limited setup options that prevent you from restricting access and recording your meetings. It is prudent to restrict access to your virtual room to avoid interruptions if you are discussing an issue with a student, and you do not have to worry about students using the room as a group chat when you are not present. Therefore, you should use the desktop version because the meeting options are more robust and stable, and you have the option to record your office hours. Scenarios There are a variety of scenarios for creating a Skype online meeting using the Outlook client (Outlook on your desktop) and Outlook for web and entering the meeting room using the Skype for Business client and the Skype for Business web application. 1. You can create Skype online meetings using both platforms for Outlook (web and desktop) 2. You only have a full set of meeting options when you create an online meeting using the Outlook client. Meeting options are limited if you create a Skype online meeting from the web application. 3. You can generate a link to the online meeting room without saving or adding attendees in both platforms. However, if you want to save the meeting, you must add yourself as an attendee in the client.
    [Show full text]