Blue Book 2014
Information Technology provides services to the campus including the Help Desk, UniPrint printing, the PC Computer Lab, computer sales and repairs, myStevens, Windows Campus Domain accounts, VPN and the Online Card Office. Student user services are available at the Computer Center, which is accessed through the doors to the left of the main Library entrance, in the lower level of the Library building. Systems and servers are normally available twenty-four hours a day via both the campus network and remote access. Contact Information Technology (at 201-216-5500 or submit a ticket at http://www.stevens.edu/helpdesk ) if you have any issues with your notebook, its connectivity to the network, your email or other related issues.
Information Technology: An Overview
Information Technology has five main functions: User Services, Networking, Systems Administration, Computer Purchases, and Repairs. User Services includes Help Desk staff available to answer questions about your access to computing services, software, and network applications. The Networking group is responsible for the campus network and internet connectivity. System Administrators/Programmers maintain the operating systems and server applications.
Information Technology Service Hours
User Services – Help Desk & PC Computer Lab
Monday through Thursday - 8:00AM to 10:30PM
Friday 8:00AM to 7:30PM
Saturday - 9:30AM to 5:00PM
Sunday - 12:00PM to 7:30PM
Monday through Friday - 9:00AM to 5:00PM
Computer Service Center
Monday through Friday - 9:00 AM to 5:00 PM
Information Technology is closed on school holidays and some Saturdays and Sundays. Check the Information Technology Events Calendar or Information Technology Home Page (http://www.stevens.edu/it) for closing. In case of inclement weather, please check the Stevens Home Page for closings and delays, or call 201-216-8200.
Help Desk [201-216-5500 | http://www.stevens.edu/helpdesk]
Consultants are available to assist you with questions related to software on your notebook and most Stevens systems including myStevens. Consultant coverage is scheduled so that you can reach a consultant most days (including weekends and evenings). Consultants will create a Help Desk request—and provide you with its reference number—and help track your resolution. Whenever possible, mention your reference number when contacting the Help Desk.
Before Calling The Help Desk...
- Attempt to restart your machine (if possible) and see if this solves your problem.
- For a password related issue with logging into MyStevens or the Campus Domain:
- Attempt to log in again
- Ensure that the caps lock key is not on
- Go to the website http://www.stevens.edu/password
- Check the online help within Windows and/or your applications, and the http://www.stevens.edu/itwiki.
- Record any and all error messages as accurately as possible, and be ready to provide the exact application, service, or machine make/model with which you are having difficulties.
- About a server or system being down, please verify that the issue is not unique to your machine.
The Stevens ITWiki is edited and maintained by the Information Technology Help Desk staff. The wiki contains documentation on a wide variety of issues and protocols, and is available to students. For more information, go to http://www.stevens.edu/itwiki.
Computer Service Center [201-216-5108 | http://stevens.edu/csc]
Located in the lower level of the SC Williams Library, the CSC handles sales and service of Stevens issued notebooks and desktop PCs, including system upgrades and the sale of peripherals, accessories and printer supplies.
- If your MacBook is not functional, you can take it to a certified Apple Repair Center. You can find one near your location by visiting the following website http://www.apple.com/buy/locator/service
The Computer Service Center maintains a vending machine with accessories, such as printer ink cartridges, ear buds, flash drives, and Ethernet cables. Only Duck Bills are accepted by the vending machine.
Managing Your MacBook
You are responsible for your MacBook , its data, and its operation on the network. It is your duty to keep your MacBook in an operational condition at all times. Replacement or repairs of most parts are covered under a manufacturer’s warranty until 30 June 2011. An extended warranty is available for purchase at: http://store.apple.com/us_edu_292480/product/MC247?mco=MTYzNjAwNjM.
Accidental damage protection can be purchased at http://www.safeware.com/Products/EducationCoverage.aspx. Please take care of your MacBook. Having it in proper working condition is an academic requirement. You should use the provided book bag or a protective case at all times when carrying your MacBook.
Virus protection is mostly about being aware of your computing environment, how you are using the internet, and keeping the operating system and virus protection software current. Always be cautious!
Some general rules of thumb:
- Do not open email attachments from unknown senders or run any .exe or .bat file included in an e-mail
- Inspect all links (and ask their "sender" if they intended to send a link) sent via Instant Messaging Clients such as AOL Instant Messenger, Windows Live Messenger and Yahoo! Messenger. These may be the result of a rapidly spreading bug which will instant message itself to your entire buddy list.
- Do not click on (Pop-up or Pop-Under) Ads indicating you have a virus, spyware or malware or which indicate that you could win a prize.
- Read all dialog boxes before clicking 'Yes' as some of these may be asking you for permission to install unwanted software.
- Information Technology will never send attached files via email. If use of a file is required, users would be redirected to either myStevens, the ITWiki (http://www.stevens.edu/itwiki), or the Information Technology Webpage (http://www.stevens.edu/it).
- Before entering credentials into a website, be sure to check the web address (URL) to prevent Phishing, which is an attempt to gain your password to a popular site (such as eBay, Amazon, Paypal, Myspace or Facebook). Only authenticate yourself on sites with addresses you know are genuine. Using myStevens as a gateway to Stevens Authenticated web Resources is a good way to ensure a Stevens link is genuine.
- Always check the web address (URL) of a website accessed via a link before typing in any sensitive information. Just because a link in an email looks like a given site does not mean that you will be going to that site. A shield with a red 'X' on it in your system tray (lower right hand corner of the screen to the immediate left of the clock) means you are currently in what Windows believes is a lesser than desired state of security. Click this and investigate your machine to ensure that all Windows Updates have been installed, that all Antivirus and Antispyware Definitions are up to date, and daily scans of each are running on your machine. If McAfee claims you have a virus or spyware infection, attempt to clean or repair these files. It is a safe practice to always follow up a routine scan in which any form of infection is found with a follow-up, non-scheduled scan to be sure that any repaired or cleaned files are safe from these infections. Getting a virus means you may lose some or all of your data, so if repeated scans and attempts to clean and/or quarantine these files are not successful, contact the helpdesk immediately.
Connecting to the Campus Network
- Every dorm room is wired with one computer network outlet per resident.
- Laptops distributed to incoming students are both 802.1x compliant and have their MAC Addresses registered to work on the campus network.
- In order to connect, simply plug the network cable provided with the Ethernet connectors in your room.
- If you bring a computer to campus which is not compliant with the 802.1x standard, you will have to register its MAC Address, if you intend to use it on a non-802.1x enabled network port. Non-802.1x enabled ports are generally located within offices and research labs.
- Should you wish to connect multiple machines to the Campus Network via your wired port in the residence halls, you may use a switch as long as your devices support either 802.1x or has a web browser that you can use to authenticate. You can optionally use a NAT router, one device behind the NAT router will have to use a web browser to authenticate. Bear in mind if you choose to connect multiple machines to the network neither a switch nor NAT router is supported by the Help Desk and for trouble shooting purposes you will asked to remove the intermediate device and plug directly into the wall. For more information on these policies, contact the Help Desk or refer to http://www.stevens.edu/itwiki/routers.
- In addition, all machines must be DHCP enabled. A machine that is not DHCP enabled will not be allowed on the network and may result in traffic on the port being suspended.
- You may connect up to five (5) machines concurrently to one network port in campus residences.
- Treat the network cable with care. Pinching it, bending it tightly, continually walking on it or rolling over it with a chair will permanently damage the cable.
If you do not get a network connection, first unplug and re-plug your network cable, both from the wall and your PC. If you still do not get a network connection try swapping ports with your roommate if he or she is properly connected to the network. If you are having issues with multiple machines connected to a switch or router, remove the intermediate device and try connecting just one computer to the port. If this does not help, call the Help Desk at 201-216-5500. You may be asked to bring your notebook and the Ethernet cable to the Help Desk to test both in a properly functioning network outlet.
Wireless access is provided in the dorms. However, connectivity is not guaranteed due to interference from other appliances such as microwaves, cordless phones and Bluetooth as well as other devices using that unregulated frequency spectrum. Use the campus connectivity map (found on http://www.stevens.edu/it/wireless) to determine the wireless signal strength from the location where you wish to connect.
The wireless network technology supported by all access points on campus is 802.11g, newer access points support 802.11a and 802.11g and the newest access points support 802.11n on both 2.4Ghz and 5Ghz frequencies, 802.11a and 802.11g
Network Names: “Stevens Student”: a wireless networks that requires the 802.1x authentication protocol in order to connect. “Stevens Guest”: a wireless networks that uses web page authentication, instead of 802.1x. “Stevens”: a wireless network for non-student users, students will not be authenticated on this network.
Your notebook is configured to use the 802.1x Wireless Network. Should you need to configure an additional device, instructions for configuring 802.1x are available on the ITWiki at http://www.stevens.edu/itwiki.
MAC (Media Access Control) Address Registration
The wired and wireless adapter (MAC) addresses for Stevens provided notebooks are registered as they are distributed to entering undergraduate students. Unauthorized use of the network and systems is not allowed; connection logging and network sniffing by authorized personnel may be in effect when system security or integrity is in question. By using the network, you expressly consent to such logging and monitoring and any resulting legal actions should your activities violate Stevens Policies or State or Federal Law. Use of the network implies consent with all Stevens Acceptable Use Policy.
Acceptable Use Policy
Stevens Institute of Technology expects that all persons who make any use of computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:
Information Technology resources are provided in the hope that the community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.
All hardware, software, and related services supplied by Stevens are for the sole purpose of supplementing and reinforcing the institution’s goals as set forth in the student and faculty handbooks and mission statement. We expect that no one will use hardware, software or services without authorization to do so. There has also been increasing concern over legal issues when using electronic communications. There are already laws that prohibit the following:
- Electronic libeling or defaming another person
- Sending/Posting messages that incites hate or discontent
- Transmitting repeated unwanted sexual advances
- Falsifying information via impersonation
- Unauthorized use, providing, or copying protected intellectual property.
While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must in accordance with Stevens' rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:
- Posting or transmission of confidential or classified information.
- Using offensive or discriminatory language.
- Transmission of any graphic image, sound or text that is sexual in nature.
- Giving account passwords to individuals who are not the owners of such accounts.
- Obtaining passwords to or using accounts other than one's own.
- Using resources for personal profit or gain.
- Harassing, threatening, or otherwise invading the privacy of others.
- Initiating or forwarding e-mail chain letters.
- Causing breaches of computer, network or telecommunications security systems.
- Initiating activities which unduly consume computing or network resources.
The following actions are required:
The MAC (physical address) of network devices must be registered online via Web For Students, in person with the CSC or the user must authenticate with a valid username and password. Members of the campus community must maintain their computers with virus-protection software, spyware protection, and operating system updates.
To ensure the lawful and ethical use of electronic communications, rights to privacy when using electronic communications at Stevens Institute of Technology are limited. Stevens reserves the right to monitor electronic messages and information stored on computers owned by Stevens. For example; email, web pages, conference contents, voice mail, are subject to archiving, monitoring or review and/or disclosure by others than intended recipients.
Failure to comply with the terms of this policy will be met with disciplinary and/or legal action.
myStevensPipeline and Email
myStevens is a portal through which you can access Information Technology resources including email, Student Web Self Service (Web for Students), course communication tools or access any course which your instructors support with a WebCT Virtual Classroom. The myStevens URL is www.stevens.edu/myStevens. If you have forgotten your myStevens password, you may be able to reset it at www.stevens.edu/password, or if not call or e-mail the Help Desk and upon verification of your identity, a new password will be given to you. You may also go to the Help Desk in the Computer Center at the Lower Level of the Library to request a new password.
You can check your Stevens e-mail via myStevens or any of a number of Desktop Mail Clients such as Mac Mail and Thunderbird. You are given 100MB of storage space and may send emails of up to 25 MB (text and attachments) with an attachment limit of either 20MB or 10 files, whichever comes first. This email address will be terminated within months after your graduation from Stevens. After graduation, but before termination, you may contact the Alumni On-Line Community, where you may establish Email forwarding for life.
It is recommended that you use myStevens, or Webmail to check your email from home, as some Internet Service Providers (ISPs) may not support your Mac Mail settings. If you still wish to use Mac Mail configured with authenticated SMTP with another home computer, documentation for Mac Mail is on the ITWiki website at http://www.stevens.edu/itwiki/w/index.php/Mac_Mail. While this is not necessary to connect to your Stevens mailbox, not all ISPs allow authenticated SMTP for sending messages. In the instance an SMTP connection is not permissible by your ISP, an alternative would be to connect to Stevens using a VPN connection.
- The PC Room at the Computer Center (SC Williams Library Basement)
- The Schacht Lab (in the Kidde Building 3rd floor, Room 350)
- The Art & Music Tech. Mac Lab (2nd floor Morton Building, Room 201)
- The Unix Lab, (1st floor of Burchard Building, Room 127)
Each department sets hours of operation for its own lab and determines who has access. Check with the department running each lab if you have any questions. Links to these labs websites and hours are online in the ITWiki version of this document.
In order to view and download available software, you need to map a network drive. Instructions on “How to map a network drive” can be found on the ITWiki. Please be aware that these programs are licensed to Stevens for academic, educational use only and generally may not be installed on machines not distributed by Information Technology.
The Copying of licensed software, also known as “pirating”, is prohibited both by the terms of the License Agreement(s) and federal copyright law(s). Use of all software on campus must be in accordance with the Acceptable Use Policy.
Practices to Avoid
- Chain mail of any kind is not tolerated on the Stevens network. If someone sends chain mail to you, please report this by forwarding the message exactly as it was sent to you to Information Technology [email@example.com] and no other addresses. DO NOT pass these emails across the Stevens network.
- Mass mail is also unacceptable on the Stevens network. If you have an announcement you need to communicate with the entire Stevens community, please inform Student Life [firstname.lastname@example.org] and they will issue an announcement through myStevens.
- All national and international copyright laws must be observed while on (and off) campus. Sharing and downloading music, photos, video, programs or any other data in an unauthorized fashion and without the consent of their owners with peer2peer programs such as Limewire, eDonkey or others, or via torrents and/or servers is illegal and could result in legal, disciplinary action, and/or disconnection of your computer from the Stevens Network. You are not prohibited from obtaining legally distributed music and video; please visit http://www.stevens.edu/legalcontent for a list of legal and safe sites.
- Do not register domains and have them point at Stevens Servers. All Stevens-owned domains must be obtained with Information Technology assistance. Contact the Information Technology Help Desk staff for more details.
- You may not use Stevens servers to develop commercial web content or for any commercial use. Personal web pages are permitted as long as they abide by the Acceptable Use Policy.
- You may not relocate your own notebook or desktop machines to other locations on campus. Student machines are to remain in residences, except when being used in areas with public notebook ports such as classrooms, The S.C. Williams Library, America’s Cup, Hayden Lounge and wireless access points. Your machines may not be permanently moved to any academic or administrative building.
- The internet is an electronic method of communication and therefore every piece of information sent and received could potentially be logged somewhere. Your actions reflect not only on the Stevens community, but ultimately on you; keep all actions online in accordance with our Acceptable Use Policy and any and all applicable laws.
- Don't assume that your e-mail is entirely private. Like a postcard mailed via "snail mail", every person--or in this case, system--could potentially read it. Stevens reserves the right to inspect your email, as well.
- The best place to keep personal files on the network is in your personal space. All files in the public_html directory are visible to anyone who uses the internet, and access is not restricted to the Stevens Network. Create a secure password and don't tell anyone!
- Users not running DHCP (for any reason), will not be allowed on the network. It is the user's responsibility to understand these conditions and be aware of any network authorization changes. Users must maintain their systems accordingly. Users whose authorized addresses have changed, but whose systems are not running DHCP, and therefore have not reflected the change will be considered to be in violation of the network policy.
MacBook Pro i5 Information & Policies
The following section covers questions and policy answers to Frequently Asked Questions about Stevens Institute of Technology’s Mobile Computing (Notebook Computer) Program, which includes details on personal printers for this year’s incoming undergraduates.
During Orientation, the school provided you with a Mobile Workstation notebook computer. This notebook is yours to use as long as you progress towards your Stevens degree, but must be returned or purchased if you withdraw or are withdrawn at any time prior. This package contains:
- MacBook Pro i5
- HP Deskjet D2660 Printer
- 2m USB Cable
- 14' Ethernet (network) cable
- Power Pack and AC Cord
- HP Backpack
- Optical Mouse
- Class of 2014 Blue Book
- Yellow Sheet (Notebook Setup Wizard; Tech Specs and Useful Links)
- Purple Sheet (802.1x)
If any of these were for some reason not included in your package, please contact the Helpdesk immediately so that we can correct this error.
Things to Know
- Your MacBook will not be upgraded during your tenure at Stevens. You will not be provided another MacBook before graduation. However, you will be able to keep your MacBook upon graduation from Stevens.
- Keep your MacBook battery charged and in your notebook. It takes about four hours to initially charge your MacBook’s battery. DO NOT LET THE BATTERY COMPLETELY DISCHARGE.
- Peripherals like monitors and keyboards may be purchased through the Computer Service Center (http://www.stevens.edu/csc)
- If your MacBook is not functional, you can take it to a certified Apple Repair Center. You can find one near your location by visiting the following website http://www.apple.com/buy/locator/service
- Stevens-provided MacBooks have registered wired and wireless network cards and are authorized for two network addresses. In addition, you may register one additional desktop network card for use in your dorm room and one additional wireless MAC address.
Loss, Theft, and Returns
Loss and Theft
You must immediately report the loss or theft to the Stevens police, if the loss or theft is on the Stevens Campus. If not, you should file the report with the local Police. There is a $500 deductible which is your responsibility. The Computer Service Center will instruct you on the payment procedures. Upon arranging for the deductible payment and providing the Computer Service Center with the Police Report from the jurisdiction where the loss occurs, the student will receive a replacement notebook unit that is the same, or as close to the same as possible, as the missing unit. Replacement terms and conditions are subject to change and based on the Stevens policies in effect at the time of the loss or theft.
If the computer is lost or stolen more than once, the student is required to purchase a unit that is the same as the missing unit at a price to be determined by the Computer Service Center. Insurance only applies to the first unit distributed.
Withdrawal or Leave of Absence From Stevens
You have the option of returning the MacBook and accessories or purchasing them. If you decide not to purchase the MacBook and peripherals devices, they must be returned during the semester of separation from Stevens in good condition as defined by the Computer Service Center. Should you decide to purchase the equipment, the price will be based on the number of semesters you attended Stevens Institute of Technology as a full-time undergraduate.
Before the end of the first year, the purchase price is $2,700. After one-full year, the purchase price is $2,200; after the second full year, it is $1,700, $1,200 after the third full year. There is no charge after the fourth full year. This charge does not reflect the market value of the MacBook and peripheral devices but rather a portion of the cost of this program. The Dean of Undergraduate Academics will make the determination of the number of years as a full-time student at the time of separation from Stevens Institute of Technology.
Students granted a Leave of Absence by the Dean of Undergraduate Academics may be permitted, upon approval by the Dean to retain the MacBook for a maximum of one year. Students who do not re-enroll at Stevens to complete their studies prior to the expiration of the one year Leave of Absence period will be required to immediately return the MacBook, or purchase it at the purchase price in effect at the time the Leave of Absence was granted. Students who fail to return or pay for the MacBook computer by the end of the Leave will be charged $425/semester for each semester, or part thereof, they keep the MacBook, even if it is returned after the initial one-year period.
Send comments to email@example.com