Green Book 2011
Information Technology provides services to the campus including the Help Desk, network services, UniPrint printing, the PC Computer Lab, computer sales and repairs, training, Stevens Pipeline, Windows Campus Domain accounts, VPN and the Online Card Office. Student user services are available at the Computer Center, which is accessed through the doors to the left of the main Library entrance, in the basement of the Library building. Systems and servers are normally available twenty-four hours a day via both the campus network and remote access. Contact Information Technology (at x5500 or by checking the ITWiki) if you have any issues with your notebook, its connectivity to the network, your email or other related issues.
Information Technology: An Overview
Information Technology has six main functions that students will generally see: User Services, Networking, Systems Administration, Operations, Computer Purchases, and Repairs. User Services includes Help Desk staff who answer questions about your access to computing services, software, and network applications. The Networking group is responsible for the campus network throughout the campus. Operations handles all of the day-to-day computer operating issues and maintains the PC Room (computer lab). System Administrators/Programmers maintain the operating systems and server applications including the Stevens Pipeline portal.
Information Technology Service Hours
User Services - Monday through Thursday
- HelpDesk & PC Computer Lab 8:00AM to 10:30PM
- Friday 8:00AM to 7:30PM
- Saturday 9:30AM to 5:00PM
- Sunday 12:00PM to 7:30PM
Administrative Offices - Monday through Friday
- 9:00AM to 5:00PM
Computer Service Center - Monday through Friday
- 9:00 AM to 5:00 PM
Information Technology is closed on school holidays and some Saturdays and Sundays following “Friday closings” and before "Monday closings". See http://www.stevens.edu/it/about/sched.php for actual closings.
In case of inclement weather, please check the [Stevens Home Page] for closings and delays, or call 201 216 8200.
Help Desk (x5500)
Consultants are available to assist you with questions related to software on your notebook and most Stevens systems including Pipeline. Consultant coverage is scheduled so that you can reach a consultant most days (including weekends and evenings). Consultants will create a Remedy Help Desk request—and provide you with its reference number—and help track your resolution. Whenever possible, please mention your reference number when contacting the Help Desk.
Before Calling The Help Desk...
- attempt to restart your machine (if possible) and see if this solves your problem.
- for a password related issue with logging into Pipeline or the Campus Domain:
- attempt to log in again
- ensure that the caps lock key is not on
- check the on-line Help within Windows and/or your applications, and the ITWiki.
- record any and all error messages as accurately as possible, and be ready to provide the exact application, service or machine make/model with which you are having difficulties.
- about a server or system being down, please verify that your issue is not unique to your machine.
Computer Service Center (CSC) (x5108)
Located in the basement of the SC Williams Library, the CSC handles sales and service of Stevens issued notebooks and desktop PCs, including system upgrades and the sale of peripherals, accessories and printer supplies. Before bringing your notebook for repair to the CSC, remember to back up your hard drive. The CSC is not responsible for data loss or data that cannot be retrieved due to hard drive failure.
Managing your Notebook
You are responsible for your notebook, its data, and its operation on the network. It is your responsibility to keep your notebook in an operational condition at all times. Replacement or repairs of most parts are covered under warranty. Limited accidental damage coverage is provided on Class of 2011 notebooks until May 31, 2011. The cost of repairs or damages outside of the warranty or the accidental damage coverage is your responsibility. Please take care of your notebook. Having it in proper working condition is an academic requirement.
You must back up your data, be responsible as an “Administrator” of Windows Vista on your notebook, install new software releases, and apply software patches/updates. While doing all of this, you must make sure your computer does not become infected with computer viruses and spyware, that your other applications do not conflict with what you are about to install, and that network configuration settings and Windows registry data are not corrupted or changed adversely. Be aware of and document all configuration and software changes made to your notebook, especially if you are not the one making them.
Virus protection is mostly about being aware of your computing environment and how you are using the internet.
Some general rules of thumb:
- Do not open email attachments from unknown senders or run any .exe or .bat file included in an e-mail
- Inspect all links (and ask their "sender" if they intended to send a link) sent via Instant Messaging Clients such as AOL Instant Messenger, Windows Live Messenger and Yahoo! Messenger. These may be the result of a rapidly spreading bug which will instant message itself to your entire buddy list.
- Do not click on (Pop-up or Pop-Under) Ads indicating you have a virus, spyware or malware or which indicate that you could win a prize.
- Read all dialog boxes before clicking 'Yes' as some of these may be asking you for permission to install unwanted software.
- Information Technology will never send attached files via email. If use of a file is required, users would be redirected to either Pipeline or the IT Webpage
- Before entering credentials into a website, be sure to check the web address (URL) to prevent Phishing, which is an attempt to gain your password to a popular site (such as eBay, Amazon, Paypal, Myspace or Facebook). Only authenticate yourself on sites with addresses you know are genuine. Using Pipeline as a gateway to Stevens Authenticated web Resources is a good way to ensure a link is genuine.
- Always check the web address (URL) of a website accessed via a link before typing in any sensitive information. Just because a link in an email looks like a given site does not mean that you will be going to that site.
- A shield with a red 'X' on it in your system tray (lower right hand corner of the screen to the immediate left of the clock) means you are currently in what Windows believes is a lesser than desired state of security. Click this and investigate your machine to ensure that all Windows Updates have been installed, that all Antivirus and Antispyware Definitions are up to date and that daily checks of each are running on your machine.
If McAfee claims you have a virus or spyware infection, attempt to clean or repair these files. It is a safe practice to always follow up a routine scan in which any form of infection is found with a follow-up non-scheduled scan to be sure that any repaired or cleaned files are safe from these infections. Getting a virus means you may lose some or all of your data, so if repeated scans and attempts to clean and/or quarantine these files are not successful, contact the helpdesk immediately.
Connecting to the Campus Network
- Every dorm room is wired with one computer network outlet per resident.
- Laptops distributed to incoming students are both 802.1x compliant and have their MAC Addresses registered to work on the campus network.
- In order to connect, simply plug the network cable provided with the Ethernet connectors in your room.
- If you bring a computer to campus which is not compliant with the 802.1x standard, you will have to register its MAC Address.
- Should you wish to connect multiple machines to the Campus Network via your wired port, you may use a switch or router, which may require MAC Address registration.
- In addition, all machines must be DHCP enabled. A machine that is not DHCP enabled will not be allowed on the network and may result in your port becoming deactivated.
- You may not connect more than five (5) machines concurrently to one network port in campus residences.
- Treat the network cable with care. Pinching it, bending it tightly, continually walking on it or rolling over it with a chair will permanently damage the cable.
If you do not get a network connection, first unplug and re-plug all network cables, both into the wall and into your PC. If you still do not get a network connection, try swapping ports with your roommate, if he or she has a working connection. If this does not help, call the Help Desk at x5500. You may be asked to bring your notebook and the Ethernet cable to the Help Desk to try it in a working network outlet.
Wireless access is provided in the dorms, however, connectivity is not guaranteed due to interference from other appliances such as microwaves, cordless phones and Bluetooth as well as other devices using that unregulated frequency spectrum. Use the campus connectivity map to determine the wireless signal strength from the location where you wish to connect.
The wireless network names all begin with Stevens followed by the residence hall name, “Stevens Davis”, “Stevens Hayden”, and “Stevens Humphreys”. These wireless networks are 802.11b/g where the maximum speed is 54Mb/s (for users close to the access point;) these wireless networks require the 802.1x authentication protocol in order to connect.
Your Stevens notebook is configured to use the "Stevens" Network in most campus locations where another network is not being broadcast, such as outside of buildings. If you are in a building, however, it is always advisable to use that building's network, as you will receive stronger signal strength. Your notebook is configured to use the 802.1x Wireless Network. Should you need to configure an additional device, instructions for configuring 802.1x are available on the ITWiki at http://www.stevens.edu/itwiki.
MAC (Media Access Control) Address Registration
The wired and wireless adapter (MAC) addresses for Stevens-provided notebooks are registered as they are distributed to new undergraduate students. Your notebook
- Will obtain a network address in your dorm
- Will get a "roaming" network address in other campus wired locations
- Will connect to the network wirelessly when near an access point, and
- Will be able to use a wireless (e.g. “Stevens Hayden”, “Stevens Humphreys” or “Stevens Davis”) address in these residence halls.
In addition, you may register one desktop computer’s MAC address to obtain an IP address in your dorm room, and one additional wireless adapter.
Unauthorized use of the network and systems is not allowed; connection logging and network sniffing by authorized personnel may be in effect when system security or integrity is in question. By using the network, you expressly consent to such logging and monitoring and any resulting legal actions should your activities violate Stevens Policies or State or Federal Law. Use of the network implies consent with all Stevens network policies.
Acceptable Use Policy
Stevens Institute of Technology expects that all persons who make any use of computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:
Information Technology resources are provided in the hope that the community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.
All hardware, software, and related services supplied by Stevens are for the sole purpose of supplementing and reinforcing the institution’s goals as set forth in the student and faculty handbooks and mission statement. We expect that no one will use hardware, software or services without authorization to do so. There has also been increasing concern over legal issues when using electronic communications. There are already laws that prohibit the following:
- Electronic libeling or defaming another person
- Sending/Posting messages that incites hate or discontent
- Transmitting repeated unwanted sexual advances
- Falsifying information via impersonation
- Unauthorized use, providing, or copying protected intellectual property.
While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must in accordance with Stevens' rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:
- Posting or transmission of confidential or classified information.
- Use of offensive or discriminatory language.
- Transmission of any graphic image, sound or text that is sexual in nature.
- Giving account passwords to individuals who are not the owners of such accounts.
- Obtain passwords to or use of accounts other than one's own.
- Use of resources for personal profit or gain.
- Harass, threaten, or otherwise invade the privacy of others.
- Initiate or forward e-mail chain letters.
- Cause breaches of computer, network or telecommunications security systems.
- Initiate activities which unduly consume computing or network resources.
The following actions are required:
- The MAC (physical address) of network devices must be registered online via Web For Students, in person with the CSC or the user must authenticate with a valid username and password.
- Members of the campus community must maintain their computers with virus-protection software, spyware protection, and operating system updates.
To ensure the lawful and ethical use of electronic communications, rights to privacy when using electronic communications at Stevens Institute of Technology are limited. Stevens reserves the right to monitor electronic messages and information stored on computers owned by Stevens. For example; email, web pages, conference contents, voice mail, are subject to archiving, monitoring or review and/or disclosure by others than intended recipients.
Failure to comply with the terms of this policy will be met with disciplinary and/or legal action.
Pipeline and Email
Pipeline is a portal through which you can access Information Technology resources including email, Web for Students, course communication tools or access any course which your instructors support with a WebCT Virtual Classroom. The URL for Stevens Pipeline is http://www.stevens.edu/pipeline. If you forget your password, you may call or e-mail the Help Desk and upon verification of your identity, a new password will be given to you. You may also go to the Help Desk at the Information Technology department to request a new password.
You can check your Stevens e-mail via Pipeline or any of a number of Desktop Mail Clients such as Microsoft Outlook and Thunderbird. You are given 100MB of storage space and may send emails of up to 25 MB (text and attachments) with an attachment limit of either 20MB or 10 files, whichever comes first. This email address will be terminated within months of your graduation from Stevens. After graduation but before termination, you may contact the Alumni On-Line Community, who may establish Email forwarding for life.
It is recommended that you use Pipeline to check your email from home, as some Internet Service Providers (ISPs) may not support your Outlook settings. If you still wish to use Outlook configured with authenticated SMTP with another home computer, documentation for Microsoft Outlook is on the ITWiki website at http://www.stevens.edu/itwiki. While this is necessary to connect to your Stevens mailbox, not all ISPs allow authenticated SMTP. In the instance an SMTP connection is not permissible by your ISP, an alternative would be to connect using a VPN connection.
- The PC Room at the Computer Center (Hours with Holiday Schedule)
- The Schacht Lab (in the Kidde Building 3rd floor, Room 350)
- The Humanities Resource Center, (2nd floor Morton Building, Room 210) (Hours)
Each department sets hours of operation for its own lab. Check with the department running each lab if you have any questions.
In order to view and download available software, you need to map a network drive. Please be aware that these programs are licensed to Stevens for academic, educational use only and generally may not be installed on machines not distributed by the CSC.
The Copying of licensed software, also known as “pirating”, is prohibited both by the terms of the License Agreement(s) and federal copyright law(s). Use of all software on campus must be in accordance with the Acceptable Use Policy.
Practices to Avoid
- Chain mail of any kind is not tolerated on the Stevens network. If someone sends chain mail to you, please Report this by forwarding the message exactly as it was sent to you to Information Technology at email@example.com and no other addresses. DO NOT pass these emails across our network.
- Mass mail is also unacceptable on the Stevens network. If you have an announcement you need to communicate with the entire Stevens community, please inform Student Life and they will issue an announcement through Pipeline. You can also use groups through Pipeline.
- All national and international copyright laws must be observed while on (and off) campus. Sharing and downloading music, photos, video, programs or any other data in an unauthorized fashion and without the consent of their owners with peer2peer programs such as Limewire, eDonkey or others, or via torrents and/or servers is illegal and could result in legal or disciplinary action, disconnection of your computer from the Stevens Network, or all of the above.
- Do not register domains and have them point at Stevens Servers. All Stevens-owned domains must be obtained with Information Technology assistance. Contact the Information Technology Help Desk staff for more details.
- You may not use Stevens servers to develop commercial web content or for any commercial use. Personal web pages are permitted as long as they abide by the Acceptable Use Policy.
- You may not relocate your own notebook or desktop machines to other locations on campus. Student machines are to remain in dorms, except when being used in areas with public notebook ports such as classrooms, The Library, Café on the Hudson, Hayden Lounge and near wireless access points. Your machines may not be permanently moved to any academic or administrative building.
- The internet is an electronic method of communication and therefore every piece of information sent and received could potentially be logged somewhere. Your actions reflect not only on the Stevens community, but ultimately on you; keep all actions online in accordance with our Acceptable Use Policy and any and all applicable laws.
- Don't assume that your e-mail is entirely private. Like a postcard mailed via "snail mail", every person--or in this case, system--could potentially read it. Stevens reserves the right to inspect your email, as well.
- The best place to keep personal files is not on the network in your personal space. All files in the public_html directory are visible to anyone who uses the internet, and access is not restricted to the Stevens Network. Create a secure password and don't tell anyone!
- Users not running DHCP (for any reason), will not be allowed on the network. It is the user's responsibility to understand these conditions and be aware of any network authorization changes. Users must maintain their systems accordingly. Users whose authorized addresses have changed, but whose systems are not running DHCP, and therefore have not reflected the change will be considered to be in violation of the network policy.
HP Compaq 8510w Information and Policies
The following section covers questions and policy answers to Frequently Asked Questions about Stevens Institute of Technology’s Mobile Computing (Notebook Computer) Program, which includes details on personal printers for this year’s incoming undergraduates.
During Orientation, the school provided you with a Mobile Workstation notebook computer. This notebook is yours to use as long as you progress towards your Stevens degree, but must be returned if you withdraw at any time prior. This package should have contained:
- HP Compaq 8510w Mobile Workstation
- HP Deskjet D2460 Printer
- 2m USB 2.0 Cable
- 15' Ethernet cable
- Scientific Notebook CD v5.5 and Starting Manual
- Power Pack and AC Cord
- Class of 2011 Green Book
- Pink Sheet (Notebook Setup Wizard; Tech Specs and Useful Links)
- White Sheet (802.1x; HP Backup and Recovery)
If any of these were for some reason not included in your package, please contact the Helpdesk immediately so that we can correct this error.
Things To Know
- Your notebook will not be upgraded during your tenure at Stevens. You will not be provided another notebook before graduation, however you will be able to keep your notebook after your graduation from Stevens.
- Keep your notebook battery charged and in your notebook. It takes about four hours to initially charge your notebook’s battery. DO NOT COMPLETELY DISCHARGE YOUR BATTERY.
- Carrying cases for your new notebook may be purchased from the CSC and the Campus Book Store. Additional peripherals like monitors and keyboards may be purchased through the CSC, as well.
- If your notebook is not functional, the CSC is an authorized repair center, and will fix your notebook on site—if possible—once it has been checked in.
- If your notebook is broken and has been checked into the CSC for over 24 hours, you may request a loaner notebook.
- Your battery and hard drive will be placed into another machine for you to use.
- Loaners will be as close to the student’s own model as possible.
- The student will be expected to pick up their repaired unit and return the loaner within one business day of being sent notice of repair completion.
- If the loaner is not returned within one business day, a penalty of $25.00/day will be assessed and charged to the student’s bill, since there are a limited number of loaner notebooks available.
- Repairs will be free of charge unless there is evidence of neglect, abuse or non-warranty expendable parts are required as determined by the Computer Service Center based on HP’s warranty policies. Limited accidental damage coverage is provided on Class of 2011 notebooks until July 31, 2011.
- The CSC will not repair printers. The phone number for printer repair is 1-800-HP-INVENT (1-800-474-6836). For the quickest service, have the serial and model (D2460) numbers ready when calling HP. If you are for any reason unable to print, you may print to one of the other printers listed as installed on your machine via Uniprint.
- Stevens has insured your student notebook, with the exception of the $500 deductible. There are limitations—for example, any associated peripherals are not covered—so contact the CSC if you have any questions.
- Stevens-provided notebooks have registered wired and wireless network cards and are authorized for two network addresses. In addition, you may register one additional desktop network card for use in your dorm room and one additional wireless MAC address.
Loss, Theft and Return
Loss or Theft
You must immediately report the loss or theft to the Stevens police, if the loss or theft is on the Stevens Campus. If not, you should file the report with the local Police. There is a $500 deductible which is your responsibility. The Computer Service Center will instruct you on the payment procedures. Upon arranging for the deductible payment and providing the Computer Service Center with the Police Report from the jurisdiction where the loss occurs, the student will receive a replacement notebook unit that is the same, or as close to the same as possible, as the missing unit. Replacement terms and conditions are subject to change and based on the insurance requirements in effect at the time of the loss or theft.
If the computer is lost or stolen more than once, the student is required to purchase a unit that is the same as the missing unit at a price to be determined by the Computer Service Center. Insurance only applies to the first unit distributed to a student.
Withdrawal From Stevens
You have the option of returning the notebook and accessories or purchasing them. If you decide not to purchase the notebook and peripherals devices, they must be returned during the semester of separation from Stevens in good condition as defined by the Computer Service Center. Should you decide to purchase the equipment, the price will be based on the number of semesters you attended Stevens Institute of Technology as a full-time undergraduate. Before the end of the first year, the purchase price is $2,000. After one-full year, the purchase price is $1,500; after the second full year, it is $1,000, $500 after the third full year. There is no charge after the fourth full year. This charge does not reflect the market value of the notebook and peripheral devices but rather a portion of the cost of this program. The Dean of Undergraduate Academics will make the determination of the number of years as a full-time student at the time of separation from Stevens Institute of Technology.
Send comments to firstname.lastname@example.org