ITSRM – to Identify User Needs and Wishes

Total Page:16

File Type:pdf, Size:1020Kb

ITSRM – to Identify User Needs and Wishes OIS Proposal for a Mac Service IT-GLM 26th July 2010 Andreas Wagner – CERN IT/OIS CERN IT Department CH-1211 Geneva 23 Switzerland www.cern.ch/it OIS Outline • Background • Proposal for Mac Service • From Mac Support to Mac Service • Next Steps and ongoing work • Summary CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 2 www.cern.ch/it OIS Background - History • Mac usage at CERN varied quite a bit over the last decades, e.g. was popular in directorate for some time and with some specific user communities • In the past due to limited resources the aim was to focus IT support efforts for Windows and SLC • Mac Support as one-man-show (2005-2009): for several years Mac Support = Patrick Herzog CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 3 www.cern.ch/it OIS Background - Motivation • Since 2002 Mac OS X – Unix based OS architecture • Mac HW architecture move to Intel – announced June 2005 – first Intel based models Jan 2006 (15" MacBook Pro & iMac Core Duo line) – Mac OS X 10.6 "Snow Leopard“ (released in 2009) was the first OS X version that did not support the PowerPC family anymore Mac became an attractive platform for physicists. CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 4 www.cern.ch/it OIS Background - Motivation Active hardware population at CERN Active devices seen on the network, July 2010 CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 5 www.cern.ch/it OIS Mac Service - Proposal • The existing number of Macs onsite is quite significant • Despite being sometimes more expensive, Macs fully satisfy a number of user communities. Proposal to recognize and support the Apple laptops & desktops with MacOS X as a standard CERN platform • NB: This is not a proposal for a “managed platform” a la NICE, for this users should use Windows (NICE). Mac users will be advices to enable auto-update for OS and applications. CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 6 www.cern.ch/it OIS Mac Service – Key areas • Integration – Interoperability with other IT services • Data protection – Issue of local data • Structured dialog with Mac community via ITSRM – To identify user needs and wishes • Address known pain-points CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 7 www.cern.ch/it OIS Mac Support to Mac Service (I) • Introduce official support via the Service Desk – Standard three level support model already implemented since January 2010 – Already during the negotiations for new desktop support contract, that has started in 2010, a dedicated SubSLA for Mac Support was included – Some cases were already handled via the support contract before, but it was a somewhat grey area since Mac support coverage was not properly reflected in previous contract. – In view of providing non-standard laptop support via desktop support contract, presently together with UDS a review of all SLAs for Windows, Linux and Mac is taking place to be more coherent for both SW and HW support aspects CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 8 www.cern.ch/it OIS Mac Support to Mac Service (II) • Official support via the Service Desk (cont.) – Applies to “CERN supported Mac OS X versions (n, n-1) installed on Standard Apple Hardware” – Help Macintosh users to install/re-install the operating system software or applications – Help for configuration and use of CERN services (mail, web applications, printing, remote logins, file services, etc.). – Help for hardware failure diagnosis – Help users carry out simple maintenance operations on Macintosh hardware, like adding modules of memory, changing disks or internal components. CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 9 www.cern.ch/it OIS Mac Support to Mac Service (III) • Establish link with Apple support to provide adequate technical support for the relevant platforms • Apple offers three levels of enterprise support contracts: “Select” , “Preferred” , “Alliance” – “Select” (~10k/year): • 10 incidents maximum / year – “Preferred” (~34k/year): • unlimited number of reported incidents, • 24x7 support coverage • Includes a dedicated Technical Account Manager – “Alliance” (~84k/year): • multi-sites i.e. covering several institutes – Order for “Preferred” support contract was sent on Friday July 23rd CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 10 www.cern.ch/it OIS Mac Support to Mac Service (IV) • Facilitate Mac hardware purchases: – Together with FP & GS departments identify the best purchase and hardware assistance possible (e.g. Stores / punch-out / dedicated Apple Web portal) • Ensure proper interoperability between IT services and popular Mac Applications such (Mail, Web applications, printing etc...) • Provide good documentation and user help – Provide documentation on recommended configuration of tools and best practices (e.g. fonts to avoid, file extensions, etc...) CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 11 www.cern.ch/it OIS Mac Support to Mac Service (V) • Streamline Mac software license provision: – With help of FP, provide attractive licensing for popular Mac OS X software – today: • OS Upgrades • Antivirus • MS Office • Adobe Products: Dreamweaver, Acrobat, … – other candidates: • Enterprise subscription for Mac SDK (campus license) • Virtualization: Parallels, Vmware CERN IT Department CH-1211 Geneva 23 Switzerland Mac Service - 12 www.cern.ch/it OIS Mac Support to Mac Service (VI) • Role of support-MacOSX mailing list – Today used for simple and advanced self help of Mac user community – Works well, especially for specific problems e.g. with peripherals. For standard requests redirect users to Service desk Keep as moderated expert exchange forum CERN IT Department CH-1211 Geneva 23 Switzerland Mac Service - 13 www.cern.ch/it OIS Mac Service – Key points • Ad Integration – AD integration, i.e. use of CERN accounts, to provide seamless access to CERN resources such as files, Websites etc. – Being looked at again after pilot in 2003 (issue of domain name that Mac ignores) • As data protection – Recommendation to place files on AFS/DFS – Evaluation of central backup facility for professional local data, e.g. time-machine etc. • Address known pain-points – NetBoot installation server for OS upgrades CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 14 www.cern.ch/it OIS Mac Service - Resources • Service Manager: Matthias Schröder (25%) Backup Service Manager: Patrick Herzog (100%) • Prepare proposal to stop support for SLC on PC laptops to liberate some resources that can be reallocated to Mac Support – For users that want Linux based laptop, move in direction to suggest to use Mac CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 15 www.cern.ch/it OIS Next Steps & on-going work (I) • Apple Enterprise Support contract in pipeline • Prepare formal Service Specification • Present new Mac Service to next ITSRM • Extend further Mac user documentation • Prepare user communication (CNL, Bulletin, etc) CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 16 www.cern.ch/it OIS Next Steps & on-going work (II) • Ad Integration – AD integration, i.e. use of CERN accounts, to provide seamless access to CERN resources – Being looked at again after pilot in 2003 (issue of domain name that Mac ignores) • Ad data protection – Evaluation of feasibility of central backup framework for professional local data, e.g. time-machine etc. • Ad known pain-points – Test with NetBoot installation server for OS upgrades CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 17 www.cern.ch/it OIS Summary • Increasing usage of Mac over the last years • A certain range of assistance was already provided via previous Mac Support Acknowledge Mac as supported platform Offer a Mac Service to address the needs of Mac user community CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 18 www.cern.ch/it OIS CERN IT Department CH-1211 Geneva 23 Switzerland CERN Mac Service - 19 www.cern.ch/it.
Recommended publications
  • Internet Privacy Implications Research and Draft
    Internet Privacy Implications A Major Qualifying Project Worcester Polytechnic Institute Submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor of Science. Submitted By: Goncharova, Masha Harnois, Jeffrey Advisors: Wills, Craig PhD Doyle, James PhD May 6, 2021 Abstract Our research focused on understanding the effectiveness of browsers, extensions, mobile applications, and search engines and their protection of user privacy. We ran test cases on the top 100 Alexa sites, using a Fiddler proxy to capture traffic, with certain configurations of tools mentioned to see which ones were efficient in blocking user tracking technologies. We found that Brave and Firefox in Strict mode are the best browsers in terms of tradeoff between percent of websites with degradation versus percent trackers remaining. uBlock Origin, Ghostery and Privacy Badger are the best browser extensions in terms of the same tradeoff. Based on our results, we created a recommendation system using a survey approach. We suggest a combination of tools that are personalized to users based on their reported privacy preferences and desire to switch their current browsing setup. In order to better understand users’ views on privacy, we additionally showed participants their own data Google has synthesized about them to evaluate if that would change their responses. A ceiling effect appeared in our responses, indicating that no matter the condition, all our participants indicated a willingness to switch to the tools that we were recommending. 1 Table of Contents Abstract 1 Table of Contents 2 List of Tables 6 List of Figures 7 Double Major Note 9 1.
    [Show full text]
  • Symantec Encryption Desktop 10.5 for Macos User Guide
    Symantec Encryption Desktop for macOS User Guide 10.5 Last updated: July 2020 Copyright statement Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. Copyright© 2020 Broadcom. All Rights Reserved. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Contents About Symantec Encryption Desktop 10.5 for macOS 7 What's New in Symantec Encryption Desktop 10.5 for macOS 7 Using this Guide 7 “Managed” versus “Unmanaged” Users 8 Conventions Used in This Guide 8 Who Should Read This Document 9 About Symantec Encryption Desktop Licensing 9 About Symantec Encryption Desktop Licensing 9 Checking License Details 10 If Your License Has Expired 11 Technical Support 11 Symantec Encryption Desktop Basics 15 Symantec Encryption Desktop Terminology 15 Product Components 15 Terms Used in Symantec Encryption Desktop 16 Conventional and Public Key Cryptography 18 Using Symantec Encryption Desktop for the First Time 19 Installing Symantec Encryption Desktop 23 Installing
    [Show full text]
  • Schumpeterian Competition and Diseconomies of Scope; Illustrations from the Histories of Microsoft and IBM
    Schumpeterian competition and diseconomies of scope; illustrations from the histories of Microsoft and IBM Timothy Bresnahan Shane Greenstein Rebecca Henderson Working Paper 11-077 Copyright © 2011 by Timothy Bresnahan, Shane Greenstein, Rebecca Henderson Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Schumpeterian competition and diseconomies of scope; illustrations from the histories of Microsoft and IBM. Timothy Bresnahan, Shane Greenstein, Rebecca Henderson* Abstract: We address a longstanding question about the causes of creative destruction. Dominant incumbent firms, long successful in an existing technology, are often much less successful in new technological eras. This is puzzling, since a cursory analysis would suggest that incumbent firms have the potential to take advantage of economies of scope across new and old lines of business and, if economies of scope are unavailable, to simply reproduce entrant behavior by creating a “firm within a firm.” There are two broad streams of explanation for incumbent failure in these circumstances. One posits that incumbents fear cannibalization in the market place, and so under-invest in the new technology. The second suggests that incumbent firms develop organizational capabilities and cognitive frames that make them slow to “see” new opportunities and that make it difficult to respond effectively once the new opportunity is identified. In this paper we draw on two of the most important historical episodes in the history of the computing industry, the introduction of the PC and of the browser, to develop a third hypothesis.
    [Show full text]
  • The Electronic Frontier Foundation and Open Rights Group's
    10 June, 2019 VIA E-MAIL Consultation on the Transposition of the Fifth Money Laundering Directive (5MLD) Sanctions and Illicit Finance Team (2/27) HM Treasury 1 Horse Guards Road London, United Kingdom SW1A 2HQ London [email protected] The Electronic Frontier Foundation and Open Rights Group’s Response to HM Treasury’s Request for Consultation Regarding Transposition of the Fifth Money Laundering Directive I. Introduction The Electronic Frontier Foundation (EFF) and Open Rights Group (ORG) welcome the opportunity to respond to HM Treasury’s consultation regarding the transposition of the Fifth Money Laundering Directive (“5MLD,” EU 2018/843) into national law. EFF is a non-profit civil liberties law and technology organization. Founded in 1990, EFF champions individual privacy, free expression, and innovation. More than 31,000 individuals worldwide are dues-paying members of EFF. EFF uses public education campaigns, impact litigation, open source technology projects, policy analysis, and grassroots activism to ensure that human rights are protected in the digital age. EFF also allows supporters to make donations through Bitcoin, Ethereum, Litecoin, and Zcash. EFF’s membership includes over 560 members in the United Kingdom and has had the privilege of providing comments for Her Majesty’s government and Parliament on previous legislative proposals, including most recently the deliberations by multiple Select Committees prior to the passage of the Investigatory Powers Act,1 and the consultation held by the Home Office on the 1 See “UK Investigatory Powers Bill” EFF.org, ​ ​ https://www.eff.org/issues/uk-investigatory-powers-bill. Consultation on the Transposition of the Fifth Money Laundering Directive (5MLD) Sanctions and Illicit Finance Team (2/27) June 10, 2019 Page 2 of 11 Interception of communications and equipment interference draft codes of practice.2 With over 3,000 active supporters, ORG is a UK based digital campaigning organisation working to protect the rights to privacy and free speech.
    [Show full text]
  • Zebratester Installation Guide
    Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.apicasystem.com Installation Guide Version 5.5 Security Hint: Do not import the common CA Root Certificate delivered by the ZebraTester installation kit (file: root.cer) into your OS or into your Web browser. You have to create your own CA Root Certificate. © 2015, 2016, 2017 February 1, 2017 All Rights Reserved. ZebraTester V5.5 Installation Guide English Edition Table of Contents 1 Installation ................................................................................................................................................................................................................... 3 1.1 System Requirements .......................................................................................................................................................................................... 3 1.2 Recommendations for Load Generators (Exec Agents) ........................................................................................................................................ 3 1.3 Installation on Windows ........................................................................................................................................................................................ 4 1.3.1 Generating an own, private CA Root Certificate on Windows ........................................................................................................................ 6 1.3.2 Windows System Tuning ............................................................................................................................................................................
    [Show full text]
  • Parallels Desktop® 10 for Mac User's Guide
    Parallels Desktop® 10 for Mac User's Guide Copyright © 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com Copyright © 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks. Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Apple, Mac, the Mac logo, Mac OS, iPad, iPhone, iPod touch, FaceTime HD camera and iSight are trademarks of Apple Inc., registered in the US and other countries. Linux is a registered trademark of Linus Torvalds. All other marks and names mentioned herein may be trademarks of their respective owners. Contents Welcome to Parallels Desktop..................................................................................9 What You Can Do ........................................................................................................... 10 Set Up Your Mac to Use Windows Programs.................................................................. 10 Other Operating Systems................................................................................................10 Install or Upgrade Parallels Desktop ......................................................................12
    [Show full text]
  • About the Integration of Mac OS X Devices Into a Centrally Managed UNIX Environment Anton Schultschik – ETH, Zurich, Switzerland
    About the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment Anton Schultschik – ETH, Zurich, Switzerland ABSTRACT The UNIX flavors in use today have so much in common that centralized management of UNIX systems has become almost standard. Since Mac OS X is based on BSD-UNIX it is a promising candidate for integration into a centrally managed UNIX environment. Starting from generic administration concepts, this paper develops an integrated management concept that handles fully automated installation and configuration of hosts. The concept includes a centralized application management system for console and graphical Mac OS X applications. The management concept is then implemented based exclusively on standard UNIX tools. The necessary extensions of these tools to make Mac OS X conform to UNIX standards are presented, including a proxy tool to forward AppleEvents which facilitate the interprocess communication for centrally managed graphical Mac OS X applications. Introduction implementation and deployment of such a system will be layed out built on some basic principles. The result will The increasing diversity of hardware and soft- be a management system for UNIX systems that can be ware makes system management more difficult. Shorter life-cycles of computer systems require more used to manage network-based as well as stand-alone sys- frequent upgrades or replacement of hardware and as a tems. consequence, the installed computers on a large site In system management three basic principles rarely are uniform in hardware but rather split into sev- keep appearing in tools and methods [1], and these eral uniform clusters. Automated management of such shall be used as orientation for our integrated manage- an environment is challenging as complexity grows ment system: with each new configuration of hardware and software.
    [Show full text]
  • Long-Term Observation on Browser Fingerprinting: Users' Trackability
    Proceedings on Privacy Enhancing Technologies ; 2020 (2):558–577 Gaston Pugliese*, Christian Riess, Freya Gassmann, and Zinaida Benenson Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective Abstract: Browser fingerprinting as a tracking technique plugins, were sufficient to uniquely recognize between to recognize users based on their browsers’ unique fea- 83.6% and 94.2% of browsers in his dataset. tures or behavior has been known for more than a Motivation. The collected browser fingerprints of decade. We present the results of a 3-year online study Panopticlick have not been published. Ten years later, on browser fingerprinting with more than 1,300 users. after many related studies [2–6], research on browser This is the first study with ground truth on user level, fingerprinting still lacks available and appropriate data. which allows the assessment of trackability based on Depending on the investigated aspects of browser finger- fingerprints of multiple browsers and devices per user. printing, the requirements for data collection are quite Based on our longitudinal observations of 88,000 mea- extensive: long-term, large-scale, fine-grained, diversi- surements with over 300 considered browser features, fied, sometimes cross-browser and cross-device. These we optimized feature sets for mobile and desktop de- requirements apply to research studying the evolution vices. Further, we conducted two user surveys to deter- of browser features over time, assessing users’ trackabil- mine the representativeness of our user sample based on ity, or examining the effectiveness of countermeasures. users’ demographics and technical background, and to At the time of writing, we are aware of only two learn how users perceive browser fingerprinting and how available datasets of browser fingerprints.
    [Show full text]