首页 > 最新文献

Proceedings of the 35th annual ACM SIGUCCS fall conference最新文献

英文 中文
Tracking system bugs: why are buffer overruns still around? 跟踪系统bug:为什么缓冲区溢出仍然存在?
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294112
C. Owen
A buffer overrun is caused by the limited size of a string variable's allocated space and the unlimited size of the actual string that is stored in the space. In the C programming language, it is the programmer's responsibility to make sure the actual string size does not exceed the size of the space allocated for it. However, programmers sometimes fail to put in the necessary checks for string size. It is possible, when programming in C, to write past the end of the current string and into the allocated space for an entirely different variable. The affected variable may or may not be another string. However, the integrity of both variables will be compromised. This paper will present the results of an experiment which shows exactly what happens when strings and other variables are compromised in this way. Writing beyond the end of a string allocation seems like a trivial problem. These faults should be easy to find and fix. However, in reality, they are nearly impossible to find in many situations. The experiment makes the problem very clear so that everyone will understand why these faults are not easy to find and fix before they cause serious problems. Since this is a C programming language problem, and both Windows and Unix operating systems are written mostly in C, many system errors may be a result of this problem. Understanding the problem can save countless hours in system debugging.
缓冲区溢出是由字符串变量分配的空间的大小有限和存储在空间中的实际字符串的大小无限引起的。在C编程语言中,程序员有责任确保实际字符串大小不超过为其分配的空间大小。然而,程序员有时无法对字符串大小进行必要的检查。在C语言中编程时,有可能将当前字符串后面的内容写入为完全不同的变量分配的空间中。受影响的变量可能是也可能不是另一个字符串。然而,这两个变量的完整性将受到损害。本文将展示一个实验的结果,该实验显示了当字符串和其他变量以这种方式受到损害时会发生什么。在字符串分配结束后写入似乎是一个微不足道的问题。这些错误应该很容易发现和修复。然而,在现实中,在许多情况下,它们几乎是不可能找到的。这个实验让问题变得非常清晰,这样每个人都能理解为什么这些故障在引起严重问题之前不容易被发现和修复。由于这是一个C编程语言问题,而Windows和Unix操作系统大部分都是用C编写的,因此这个问题可能会导致许多系统错误。了解问题可以在系统调试中节省无数的时间。
{"title":"Tracking system bugs: why are buffer overruns still around?","authors":"C. Owen","doi":"10.1145/1294046.1294112","DOIUrl":"https://doi.org/10.1145/1294046.1294112","url":null,"abstract":"A buffer overrun is caused by the limited size of a string variable's allocated space and the unlimited size of the actual string that is stored in the space. In the C programming language, it is the programmer's responsibility to make sure the actual string size does not exceed the size of the space allocated for it. However, programmers sometimes fail to put in the necessary checks for string size. It is possible, when programming in C, to write past the end of the current string and into the allocated space for an entirely different variable. The affected variable may or may not be another string. However, the integrity of both variables will be compromised. This paper will present the results of an experiment which shows exactly what happens when strings and other variables are compromised in this way. Writing beyond the end of a string allocation seems like a trivial problem. These faults should be easy to find and fix. However, in reality, they are nearly impossible to find in many situations. The experiment makes the problem very clear so that everyone will understand why these faults are not easy to find and fix before they cause serious problems. Since this is a C programming language problem, and both Windows and Unix operating systems are written mostly in C, many system errors may be a result of this problem. Understanding the problem can save countless hours in system debugging.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The wild wild waste: e-waste 疯狂的垃圾:电子垃圾
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294083
Scott E. Hanselman, Mahmoud Pegah
E-Waste is a popular, informal name for discarded electronic products such as computers, VCRs, cameras, which have reached the end of their "useful life". Discarded electronic products contain a stew of toxic metals and chemicals such as lead, mercury, cadmium, chromium, and PCBs. Based on the Gartner estimation over 133,000 PCs are discarded by U.S. homes and businesses each day. Less than 10 percent of all electronics are currently recycled. Most European countries and a growing number of countries around the world require electronic companies to finance and manage recycling programs for their products. There is no such federal law in the United States. Being environmentally responsible makes perfect sense for higher education institutions. Unfortunately, e-Waste, a dangerous byproduct of technology's relentless expansion is one of the fastest growing segments of higher education institutions' waste stream. We need to be strong advocates of "producer responsibility" and give companies an incentive to produce environmentally friendly products. In addition we must learn about and educate our campus communities about managing old electronics and associated materials. In this report, we attempt to answer the question "What should be done with old electronic products?" discuss opportunities for waste prevention and reuse, and talk about regulatory issues.
电子垃圾是一个流行的、非正式的名称,指的是已达到“使用寿命”的废弃电子产品,如电脑、录像机、照相机等。废弃的电子产品含有大量有毒金属和化学物质,如铅、汞、镉、铬和多氯联苯。据Gartner估计,美国家庭和企业每天丢弃的个人电脑超过13.3万台。目前,只有不到10%的电子产品被回收利用。大多数欧洲国家和世界上越来越多的国家要求电子公司为其产品的回收项目提供资金和管理。美国没有这样的联邦法律。对环境负责对高等教育机构来说是完全有意义的。不幸的是,电子垃圾是科技无情扩张的危险副产品,是高等教育机构废物流中增长最快的部分之一。我们需要大力提倡“生产者责任”,鼓励企业生产环保产品。此外,我们必须了解并教育我们的校园社区如何管理旧电子产品和相关材料。在这篇报告中,我们试图回答“如何处理旧电子产品”的问题,讨论预防和再利用废物的机会,并讨论监管问题。
{"title":"The wild wild waste: e-waste","authors":"Scott E. Hanselman, Mahmoud Pegah","doi":"10.1145/1294046.1294083","DOIUrl":"https://doi.org/10.1145/1294046.1294083","url":null,"abstract":"E-Waste is a popular, informal name for discarded electronic products such as computers, VCRs, cameras, which have reached the end of their \"useful life\". Discarded electronic products contain a stew of toxic metals and chemicals such as lead, mercury, cadmium, chromium, and PCBs. Based on the Gartner estimation over 133,000 PCs are discarded by U.S. homes and businesses each day. Less than 10 percent of all electronics are currently recycled. Most European countries and a growing number of countries around the world require electronic companies to finance and manage recycling programs for their products. There is no such federal law in the United States. Being environmentally responsible makes perfect sense for higher education institutions. Unfortunately, e-Waste, a dangerous byproduct of technology's relentless expansion is one of the fastest growing segments of higher education institutions' waste stream. We need to be strong advocates of \"producer responsibility\" and give companies an incentive to produce environmentally friendly products. In addition we must learn about and educate our campus communities about managing old electronics and associated materials. In this report, we attempt to answer the question \"What should be done with old electronic products?\" discuss opportunities for waste prevention and reuse, and talk about regulatory issues.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115479321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Tulane faculty symposium on digital trends: an experiment in instructional technology and outreach 杜兰大学教师研讨会:数字趋势:教学技术和推广的实验
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294070
Ariana French, L. Wright
Tulane Faculty Symposium on Digital Trends: An experiment in instructional technology and outreach. In many universities, instructional technology groups struggle with creating new opportunities for collaboration with faculty. Nonexistent or infrequent communication, overburdened workload, and lack of active outreach and resources prevent the full and appropriate utilization of instructional technology teams. At Tulane University, these challenges are being addressed through a multi-faceted program designed to bring instructional technology and faculty into a mutually beneficial partnership. One aspect of this outreach program, the Tulane Faculty Symposium on Digital Trends, was specifically designed to introduce faculty to the instructional technology group and instructional new media topics through discussion-based sessions on current technology trends. This program was launched in March 2007, and the response from campus faculty has been overwhelmingly positive.
杜兰大学数字化趋势研讨会:教学技术和推广的实验。在许多大学里,教学技术小组努力创造与教师合作的新机会。不存在或不频繁的交流,负担过重的工作量,以及缺乏积极的外联和资源阻碍了教学技术团队的充分和适当的利用。在杜兰大学,这些挑战正在通过一个多方面的项目来解决,该项目旨在将教学技术和教师引入互惠互利的伙伴关系。这个外展项目的一个方面,杜兰大学数字趋势教师研讨会,是专门设计的,通过讨论当前技术趋势的会议,向教师介绍教学技术小组和教学新媒体主题。该项目于2007年3月启动,校园教师的反应非常积极。
{"title":"Tulane faculty symposium on digital trends: an experiment in instructional technology and outreach","authors":"Ariana French, L. Wright","doi":"10.1145/1294046.1294070","DOIUrl":"https://doi.org/10.1145/1294046.1294070","url":null,"abstract":"Tulane Faculty Symposium on Digital Trends: An experiment in instructional technology and outreach. In many universities, instructional technology groups struggle with creating new opportunities for collaboration with faculty. Nonexistent or infrequent communication, overburdened workload, and lack of active outreach and resources prevent the full and appropriate utilization of instructional technology teams. At Tulane University, these challenges are being addressed through a multi-faceted program designed to bring instructional technology and faculty into a mutually beneficial partnership. One aspect of this outreach program, the Tulane Faculty Symposium on Digital Trends, was specifically designed to introduce faculty to the instructional technology group and instructional new media topics through discussion-based sessions on current technology trends. This program was launched in March 2007, and the response from campus faculty has been overwhelmingly positive.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126076056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Working and training from home 在家工作和训练
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294101
Jerry Martin
Due to a serious illness of a family member, I recently needed to perform a large percentage of my normal work duties from home. These included the easy things like reports, e-mail, and documentation. The more difficult tasks were attending meetings, held sometimes in rooms with very little technology, and training. During training I needed to see what the student was doing on their computer, as well as being able to demonstrate on a large screen projection system in the same room. In addition to the technical challenges, the needs of the family members at home had to be balanced with work, sometimes both needs were concurrent. As some of us who are staring retirement age in the face, but still working, the need to balance care for a family member and work pulls at us from both sides. In this paper I will concentrate on the technical challenges, but I will also share some of the family issues that I encountered as well.
由于一位家庭成员身患重病,我最近需要在家完成大部分的正常工作。这些包括简单的事情,如报告、电子邮件和文档。更困难的任务是参加会议,有时在几乎没有技术的房间里举行,以及培训。在培训期间,我需要看到学生在他们的电脑上做什么,以及能够在同一房间的大屏幕投影系统上演示。除了技术上的挑战外,家庭成员在家里的需要必须与工作相平衡,有时这两种需要是同时发生的。对于我们中的一些人来说,面对退休年龄,但仍在工作,需要平衡照顾家庭成员和工作,这两方面都在拉着我们。在本文中,我将集中讨论技术挑战,但我也将分享我遇到的一些家庭问题。
{"title":"Working and training from home","authors":"Jerry Martin","doi":"10.1145/1294046.1294101","DOIUrl":"https://doi.org/10.1145/1294046.1294101","url":null,"abstract":"Due to a serious illness of a family member, I recently needed to perform a large percentage of my normal work duties from home. These included the easy things like reports, e-mail, and documentation. The more difficult tasks were attending meetings, held sometimes in rooms with very little technology, and training. During training I needed to see what the student was doing on their computer, as well as being able to demonstrate on a large screen projection system in the same room. In addition to the technical challenges, the needs of the family members at home had to be balanced with work, sometimes both needs were concurrent. As some of us who are staring retirement age in the face, but still working, the need to balance care for a family member and work pulls at us from both sides. In this paper I will concentrate on the technical challenges, but I will also share some of the family issues that I encountered as well.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116676285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Desktop security in an academic environment...: how to herd cats successfully 学术环境中的桌面安全…如何成功地放牧猫
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294058
Blaine A. D'Amico
This paper describes a successful methodology for achieving more secure computing in an Academic Environment where getting the disparate client populations to accept any desktop computer standards can often seem like herding (or training) cats. In a highly distributed, highly decentralized computing environment such as the George Washington University, it is exceedingly difficult to ensure compliance with desktop security measures. This is true whether they are the requisite and almost constant patches or the use of properly configured and updated antivirus and firewall software. Through the use of volume purchasing power, quality service delivery, University wide collaboration and targeted incentives (both tangible and intangible) GWU has moved from knowing very little about the patch and virus/firewall state of its 6000+ desktop computers to being able to remediate vulnerabilities across the enterprise and determine the status of that remediation in realtime.
本文描述了一种在学术环境中实现更安全计算的成功方法,在这种环境中,让不同的客户机群体接受任何桌面计算机标准通常看起来就像放牧(或训练)猫一样。在乔治华盛顿大学(George Washington University)这样高度分布式、高度分散的计算环境中,确保遵守桌面安全措施是极其困难的。这是正确的,无论是必要的和几乎不变的补丁或使用正确配置和更新的防病毒和防火墙软件。通过使用批量购买力、高质量的服务交付、大学范围内的合作和有针对性的激励措施(包括有形和无形的),GWU已经从对其6000多台台式计算机的补丁和病毒/防火墙状态知之甚少,转变为能够修复整个企业的漏洞,并实时确定修复状态。
{"title":"Desktop security in an academic environment...: how to herd cats successfully","authors":"Blaine A. D'Amico","doi":"10.1145/1294046.1294058","DOIUrl":"https://doi.org/10.1145/1294046.1294058","url":null,"abstract":"This paper describes a successful methodology for achieving more secure computing in an Academic Environment where getting the disparate client populations to accept any desktop computer standards can often seem like herding (or training) cats. In a highly distributed, highly decentralized computing environment such as the George Washington University, it is exceedingly difficult to ensure compliance with desktop security measures. This is true whether they are the requisite and almost constant patches or the use of properly configured and updated antivirus and firewall software. Through the use of volume purchasing power, quality service delivery, University wide collaboration and targeted incentives (both tangible and intangible) GWU has moved from knowing very little about the patch and virus/firewall state of its 6000+ desktop computers to being able to remediate vulnerabilities across the enterprise and determine the status of that remediation in realtime.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The blackboard performance monitor: a mystery online 黑板性能监视器:网上的一个谜
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294069
George Gaffer Fitch, Jerry Marceau
In late September 2005, the University of New Hampshire's Blackboard Learning and Community System began to slow down, disrupting the learning experience of UNH's entire academic community. We assembled an interdepartmental team to ascertain the cause of and ultimately solve this problem of stagnation. This cause itself was elusive, hidden within scores of possibilities, suggestions, and conjecture. Were online assessments overtaxing the servers? Are more servers needed? Was there a cascading effect in the internal processes, one impeding another, impeding another, etc? As questions, needs, and theories mounted, it became clear to us that comprehensive, objective, and quantifiable information would be essential to lift this fog of ignorance. Such necessity was the mother of the Blackboard Performance Monitor (BBPM), our custom designed, in-house system which collects data from the many facets of Blackboard and transforms that data into useful, web-based, graphical information. Initially, the BBPM provided us with many interesting and unfortunately unexpected answers, merely bringing yet more questions to light. But as the BBPM evolved with the needs of the team, it brought us closer and closer to our goal, until we eventually found the connection we sought, or in truth, the lack thereof.
2005年9月下旬,新罕布什尔大学的黑板学习和社区系统开始放缓,扰乱了新罕布什尔大学整个学术社区的学习体验。我们组织了一个跨部门小组,查明原因,最终解决了这个停滞问题。这个原因本身是难以捉摸的,隐藏在许多可能性、建议和猜想之中。在线评估是否使服务器负担过重?是否需要更多的服务器?内部流程中是否存在级联效应,一个阻碍另一个,又阻碍另一个,等等?随着问题、需求和理论的增加,我们越来越清楚地认识到,全面、客观和可量化的信息对于消除这种无知的迷雾至关重要。这种需求就是Blackboard性能监视器(BBPM)的根源,这是我们定制的内部系统,它从Blackboard的许多方面收集数据,并将这些数据转换为有用的、基于web的图形信息。最初,BBPM为我们提供了许多有趣而不幸的出乎意料的答案,只是带来了更多的问题。但随着BBPM随着团队需求的发展,它使我们越来越接近我们的目标,直到我们最终找到了我们所寻找的联系,或者事实上,缺乏联系。
{"title":"The blackboard performance monitor: a mystery online","authors":"George Gaffer Fitch, Jerry Marceau","doi":"10.1145/1294046.1294069","DOIUrl":"https://doi.org/10.1145/1294046.1294069","url":null,"abstract":"In late September 2005, the University of New Hampshire's Blackboard Learning and Community System began to slow down, disrupting the learning experience of UNH's entire academic community. We assembled an interdepartmental team to ascertain the cause of and ultimately solve this problem of stagnation. This cause itself was elusive, hidden within scores of possibilities, suggestions, and conjecture. Were online assessments overtaxing the servers? Are more servers needed? Was there a cascading effect in the internal processes, one impeding another, impeding another, etc? As questions, needs, and theories mounted, it became clear to us that comprehensive, objective, and quantifiable information would be essential to lift this fog of ignorance. Such necessity was the mother of the Blackboard Performance Monitor (BBPM), our custom designed, in-house system which collects data from the many facets of Blackboard and transforms that data into useful, web-based, graphical information. Initially, the BBPM provided us with many interesting and unfortunately unexpected answers, merely bringing yet more questions to light. But as the BBPM evolved with the needs of the team, it brought us closer and closer to our goal, until we eventually found the connection we sought, or in truth, the lack thereof.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What happens at the end of the outsourcing contract? 外包合同结束时会发生什么?
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294131
Charles R. Williams
The concepts of outsourcing and right sourcing are given great consideration in higher education. I will cite some reasons for outsourcing and some of the reasons for why it does not live up to its expectations. I will look at the history of one institution that decided to abandon its outsourcing decision. I will examine the consequences of the decision to move from an outsourced IT provider to an in-house staff. The primary conclusion is: we should prepare the exit strategy for outsourcing at the time of contract negotiation.
外包和权利外包的概念在高等教育中受到重视。我将列举一些外包的原因,以及为什么外包没有达到预期的一些原因。我将看看一个决定放弃外包决策的机构的历史。我将检查从外包IT提供商转移到内部员工的决定的后果。主要结论是:在合同谈判的时候就应该准备好外包的退出策略。
{"title":"What happens at the end of the outsourcing contract?","authors":"Charles R. Williams","doi":"10.1145/1294046.1294131","DOIUrl":"https://doi.org/10.1145/1294046.1294131","url":null,"abstract":"The concepts of outsourcing and right sourcing are given great consideration in higher education. I will cite some reasons for outsourcing and some of the reasons for why it does not live up to its expectations. I will look at the history of one institution that decided to abandon its outsourcing decision. I will examine the consequences of the decision to move from an outsourced IT provider to an in-house staff. The primary conclusion is: we should prepare the exit strategy for outsourcing at the time of contract negotiation.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poof: no more viruses 噗的一声:再也没有病毒了
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294068
Teresa Fernandez, Michal Grinnell, Eric Weakland
American University's office of Information Technology (IT) deployed Cisco Clean Access (CCA) across the student network in 2005 to combat the continual rise in virus and spyware infections. After two years, there has been a 79% reduction of malware infections reported by our students to the IT Help Desk. Several factors combined to facilitate the tremendous success of this Network Admission Control (NAC) implementation. These factors included: extensive communication with users; requirements selection, which reflected a thorough analysis of requirements to address the greatest areas of risk in the simplest way possible; and development of custom software tools to simplify the process of performing individual updates. After the dramatic reduction in malware infections for the student population, IT is in the process of transitioning all AU staff and faculty to CCA during the spring and summer of 2007. Due to an accelerated timeline for deployment and the unique needs of staff and faculty, IT developed a new transition strategy that leverages AU's existing Novell infrastructure and new features of CCA to create an almost seamless transition for the end user. As CCA is enabled in each department, machines can be silently evaluated to determine if they meet AU's requirements and new applications and patches may be deployed through the use of login scripts. The end result is magic. Therefore, IT is prepared to quickly and painlessly migrate all 3400 staff and faculty to CCA within months.
2005年,美国大学信息技术办公室(IT)在学生网络中部署了思科清洁访问(CCA),以对抗持续上升的病毒和间谍软件感染。两年后,我们的学生向IT帮助台报告的恶意软件感染减少了79%。有几个因素共同促成了网络准入控制(NAC)实现的巨大成功。这些因素包括:与用户的广泛沟通;需求选择,它反映了需求的彻底分析,以尽可能简单的方式处理最大的风险区域;并开发定制软件工具来简化执行单个更新的过程。在学生感染恶意软件的人数大幅减少之后,IT部门正在将所有非盟员工和教职员工在2007年春夏期间过渡到CCA。由于部署时间的加快和教职员工的独特需求,IT部门开发了一个新的过渡策略,利用AU现有的Novell基础设施和CCA的新功能,为最终用户创建一个几乎无缝的过渡。由于在每个部门中启用了CCA,可以对机器进行静默评估,以确定它们是否满足AU的要求,并且可以通过使用登录脚本部署新的应用程序和补丁。最终的结果是神奇的。因此,IT部门准备在几个月内迅速、轻松地将所有3400名员工和教职员工迁移到CCA。
{"title":"Poof: no more viruses","authors":"Teresa Fernandez, Michal Grinnell, Eric Weakland","doi":"10.1145/1294046.1294068","DOIUrl":"https://doi.org/10.1145/1294046.1294068","url":null,"abstract":"American University's office of Information Technology (IT) deployed Cisco Clean Access (CCA) across the student network in 2005 to combat the continual rise in virus and spyware infections. After two years, there has been a 79% reduction of malware infections reported by our students to the IT Help Desk. Several factors combined to facilitate the tremendous success of this Network Admission Control (NAC) implementation. These factors included: extensive communication with users; requirements selection, which reflected a thorough analysis of requirements to address the greatest areas of risk in the simplest way possible; and development of custom software tools to simplify the process of performing individual updates. After the dramatic reduction in malware infections for the student population, IT is in the process of transitioning all AU staff and faculty to CCA during the spring and summer of 2007. Due to an accelerated timeline for deployment and the unique needs of staff and faculty, IT developed a new transition strategy that leverages AU's existing Novell infrastructure and new features of CCA to create an almost seamless transition for the end user. As CCA is enabled in each department, machines can be silently evaluated to determine if they meet AU's requirements and new applications and patches may be deployed through the use of login scripts. The end result is magic. Therefore, IT is prepared to quickly and painlessly migrate all 3400 staff and faculty to CCA within months.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133090746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Teleteaching anywhere solution kit (Tele-TASK) goes mobile 远程教学随处解决方案工具包(Tele-TASK)移动
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294132
Katrin Wolf, Serge Linckels, C. Meinel
Tele-TASK is a tool for recording lectures and presentations. It does not only record the audio and video of the speaker but also everything happening on the presenter's computer. No matter if he is showing a Powerpoint presentation, a software demo or even the BIOS configuration of the computer, tele-TASK is able to record, encode and stream the whole presentation out of the box. The result is one synchronized and platform independent multimedia video in the RealMedia format. Hundreds of Tele-TASK lectures are already available online (http://www.tele-task.de. Apple has a big success with the release of the iPod series and accessories. It enables the user to carry around music and videos, play them back while he is on bus or even use it as a digital multimedia library accessible via your TV set. Unfortunately the video iPod is neither able to play videos encoded in Real format nor to play back several videos at once. Current development in e-learning technologies aims to make learning and teaching available everywhere. In the stream of this evolution, the Web-University Project at the Hasso-Plattner-Institute explores and studies novel Internet- and IT-technologies with the aim to enhance university teaching and research. This paper describes how we extended our teleteaching system to supply the learner not only with streaming media but also with additional iPod-ready lecture recordings and presentations in order to enable mobile learning wherever the learner likes to.
Tele-TASK是一个记录讲座和演讲的工具。它不仅能记录演讲者的音频和视频,还能记录演讲者电脑上发生的一切。无论他展示的是Powerpoint演示、软件演示还是计算机的BIOS配置,tele-TASK都能够记录、编码和流式传输整个演示。其结果是一个同步和平台独立的RealMedia格式的多媒体视频。网上已经有数百个远程任务讲座(http://www.tele-task.de)。随着iPod系列和配件的发布,苹果取得了巨大的成功。它可以让用户随身携带音乐和视频,在公共汽车上播放,甚至可以通过电视机将其用作数字多媒体图书馆。不幸的是,视频iPod既不能播放Real格式编码的视频,也不能一次播放几个视频。目前电子学习技术的发展旨在使学习和教学无处不在。在这一发展过程中,哈索-普拉特纳研究所的网络大学项目探索和研究了新的互联网和信息技术,目的是加强大学的教学和研究。本文描述了我们如何扩展我们的远程教学系统,不仅为学习者提供流媒体,还提供额外的ipod支持的讲座录音和演示,以便学习者随时随地进行移动学习。
{"title":"Teleteaching anywhere solution kit (Tele-TASK) goes mobile","authors":"Katrin Wolf, Serge Linckels, C. Meinel","doi":"10.1145/1294046.1294132","DOIUrl":"https://doi.org/10.1145/1294046.1294132","url":null,"abstract":"Tele-TASK is a tool for recording lectures and presentations. It does not only record the audio and video of the speaker but also everything happening on the presenter's computer. No matter if he is showing a Powerpoint presentation, a software demo or even the BIOS configuration of the computer, tele-TASK is able to record, encode and stream the whole presentation out of the box. The result is one synchronized and platform independent multimedia video in the RealMedia format. Hundreds of Tele-TASK lectures are already available online (http://www.tele-task.de. Apple has a big success with the release of the iPod series and accessories. It enables the user to carry around music and videos, play them back while he is on bus or even use it as a digital multimedia library accessible via your TV set. Unfortunately the video iPod is neither able to play videos encoded in Real format nor to play back several videos at once. Current development in e-learning technologies aims to make learning and teaching available everywhere. In the stream of this evolution, the Web-University Project at the Hasso-Plattner-Institute explores and studies novel Internet- and IT-technologies with the aim to enhance university teaching and research. This paper describes how we extended our teleteaching system to supply the learner not only with streaming media but also with additional iPod-ready lecture recordings and presentations in order to enable mobile learning wherever the learner likes to.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114500505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The proper care and feeding of your help desk 你的服务台的适当照顾和喂养
Pub Date : 2007-10-07 DOI: 10.1145/1294046.1294066
Kristi Evans, G. Sperl
You are now comfortable with your role as your staff's leader and they're comfortable with you. You might even be able to leave for the duration of a lunch break with things under control. Almost all is right with the world, except...why do your staff members keep leaving?. The issues that lead staff members to leave a position are numerous. You yourself don't want to be one of the problems simply because you aren't sure how to properly care for your help desk. The question of how and why to show your staff appreciation is one of the most difficult to answer, because it will be different for each institution and may vary based on the type of staff you employ. However, to have a successful help desk, this issue needs to be addressed. Morale, work ethic, and motivation all can be severely impacted when a manager overlooks the importance of training, incentive programs and appreciation of the contributions of his or her workers. In this paper we will discuss ways to acknowledge and appreciate your employees to keep your turnover rate low, how to use turnover to your advantage, and how to forecast trends in your staff in order to make the proper management adjustments. We will also explore how to make training a part of your incentive program and how proper training affects morale and productivity.
你现在很适应你作为员工领导的角色,他们也很适应你。你甚至可以在事情得到控制的情况下,在午餐休息期间离开。世界上几乎一切都很好,除了……为什么你们的员工不断离职?导致员工离职的原因有很多。您自己也不希望仅仅因为不确定如何正确地照顾您的帮助台而成为问题之一。如何以及为什么向你的员工表示感谢是最难回答的问题之一,因为每个机构的情况都不一样,而且可能根据你雇用的员工类型而有所不同。然而,要建立一个成功的帮助台,需要解决这个问题。如果管理者忽视了培训、激励计划和对员工贡献的重视,员工的士气、职业道德和积极性都会受到严重影响。在这篇文章中,我们将讨论如何承认和欣赏你的员工,以保持你的低流动率,如何利用离职为你的优势,以及如何预测员工的趋势,以便做出适当的管理调整。我们还将探讨如何使培训成为您的激励计划的一部分,以及适当的培训如何影响士气和生产力。
{"title":"The proper care and feeding of your help desk","authors":"Kristi Evans, G. Sperl","doi":"10.1145/1294046.1294066","DOIUrl":"https://doi.org/10.1145/1294046.1294066","url":null,"abstract":"You are now comfortable with your role as your staff's leader and they're comfortable with you. You might even be able to leave for the duration of a lunch break with things under control. Almost all is right with the world, except...why do your staff members keep leaving?. The issues that lead staff members to leave a position are numerous. You yourself don't want to be one of the problems simply because you aren't sure how to properly care for your help desk. The question of how and why to show your staff appreciation is one of the most difficult to answer, because it will be different for each institution and may vary based on the type of staff you employ. However, to have a successful help desk, this issue needs to be addressed. Morale, work ethic, and motivation all can be severely impacted when a manager overlooks the importance of training, incentive programs and appreciation of the contributions of his or her workers. In this paper we will discuss ways to acknowledge and appreciate your employees to keep your turnover rate low, how to use turnover to your advantage, and how to forecast trends in your staff in order to make the proper management adjustments. We will also explore how to make training a part of your incentive program and how proper training affects morale and productivity.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 35th annual ACM SIGUCCS fall conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1