Bret Madsen Managing Windows 7 Purdue University |
John DeTroye Senior Consulting Engineer Apple Education |
Summary:
Using new group policy and configuration options to manage Windows 7 in a lab environment. How to allow users to install devices. Determine what is happening durning boot and shutdown. Configuring user accounts with roaming profiles and folder redirections. How to limit user rights on the local computer while providing options to store information and setup devices on demand. |
Summary: Session 2: Client Management Best Practices.
|
David Fortin Fortres Grand Corporation Clean Slate |
Lauren Nicholas The Casper Suite JAMF Software Moravian College |
Summary: lab security needs. Students can have full computer access knowing all unwanted user changes are cleared at log off providing a clean and consistent computer for every user. Learn also to restrict programs running from a flash drive while still allowing saves. Achieve 24/7 security. Never again leave computers vulnerable. Keep security consisently on, even when running Windows Updates, antivirus updates, or to use thrid party administration tools like Altiris or LANDesk. Clean Slate by Fortres Grand Corporation Provides secure, clean, consistent, and virus free lab computers. |
Summary: |
Joseph Williams Are Computer Labs Still Necessary? Temple University |
Jeremy Hamman Managing a Mac Dual Deployment Wright State University |
Summary: "Are computer labs still necessary?" is a question asked today by many college and universtiy administrators. With student computer ownership nearing 100%, this seems like a vaild question to ask. We will discuss our findings after four years of operations at the Temple University TECH Center. With over 700 workstation, the TECH CENTER is among the nation's largest student computer labs, and is still filled to capacity each day during the school year. We have found five major trends that make computer labs still very relevant. This presentation will review these five trends, and how schools and lab managers can take advantage of them in planning for the future |
Summary: At Wright State, we have been challenged with creating a dual boot environment for our Laptop check out program and one of our computer labs. After a successful streamline and user friendly deployment, we decided to further our deployment this summer to our teaching classrooms to provide a multiple boot environment and cost savings using Mac mini's. We will share our experiences andd the process we take to deploy images and various tools to improve the user experience in a dual boot environment. |
Daryl T. Burgwyn Virtual Computing Environment University of North Carolina at Pembroke |
Michael Fudge Deliver your Technology-Based Labs with Virtualization VMWare Lab Manager Syracuse University iSchool |
Summary: Faculty staff and students can now access specific software programs needed for their coursework or work product from any Internet-accessible computer without having to worry that a program will not run properly on their personal computer or having to come on campus to use a specific computer. Users can log into the Virtual Computing Lab from on or off campus and choose software from an "image" designed for accessibility 24/7 |
Summary: This presentation will cover how the iSchool plans to use VMware lab manager to conduct systems and network based labs. These labs are designed to teach concepts such as network routing, firewall, Oracle database administration, Microsoft Active Directory, and web architecture. Through the use of virtualization students can conduct these labs using a web browser from just about anywhere - making it an ideal scenario for distance learing or recource-constrained lab facilities. Emphasis will be placed on the requirements, design decisions, and best practices for conducting these types of labs. Live demos of the current environment will be given |
Omar Tirado Evolution of Public Lab Stations at a Mac College Franklin & Marshall College |
Ronald Ardron Tales from the Overnight Shift - Providing Scalable 24/7 Support Temple University |
Summary: Franklin & Marshall College has been a Mac campus since the early days of Macintosh. Our early labs used Macintosh SE's with dual floppies. Management has evolved from manaul touches on each station using Zip Disks circa 1997 to currently deploying LDAP Dual Boot images using Deploy Studio, we have seen many form of lab management technologies for the Mac platform come and go. Take this journey through time and technology to learn from past mistakes and victories, as we examine the history of Mac lab management on a Mac campus. |
Summary: Managing a midnight lab shift can be extremely challenging. System support staff is non-existent, student focus changes from an academic to social, security becomes an even greater concern. Four years ago, Temple University stepped up its 24 hour lab presence from student manning the lab to having 24-hour help desk operations and a full-time presence. Providing this service has meant considerations in staffing levels, and further focus on security. It has also added benfits with system alerts, support of internation campuses, and leveraging system downtime. |
Keith Hartranft Your IT Department: Client or Server??? Northampton Community College |
Shayne Cardwell Trash to Treasure Northampton Community College Computer Club |
Summary: As a service organization at your college or university, you MUST be answering "Server!" ...but how good a server are you? Do you focus primarily on operational needs? How "involved is your department in other areas of service that include technology education, teaching and learning (often "mislabeled" Instructional Technology), student involvement, curricual and applied projects, faculty professional development, IT infrasture and security, and new media (blogging, Twitter, Facebook, YouTube, etc.)utilization. Professor Harttranft will lead a discussion that focuses on the IT organization department "reach" into these areas and how you and your organization might become a "better server". |
Summary: Every summer, old PC's get retired as part of lab upgrades. What happens to those old, tired computers? NCC's Computer Club will show some intresting projects that these computers can be used for. Render and Storage Farms, Security Auditing, Routing, and Clustering to name a few. |
Bim Parmar Layered Security - A New Approach to Protect Your One-To-One Assets Faronics Corporation |
Christian Hayes Managing your Labs with LabStats Computer Lab Solutions LabStats |
Summary: The growth of malware has lead to huge security headaches for IT administrators everywhere. IT administrators need to achieve a fine balance that keeps not only student laptops and the school networks secure yet provide students with the freedom to learn and take advantage of the intrenet. Making this even more challenging is the fact that malware evolves and neutralizes security, somtimes several times a day. Layered security is a new approach that not only removes the security headache but also reduces IT support costs and keeps students highly productive. |
Summary: How do you keep track of your computers? Do you know how many students log in per day, for how long, and at what labs? How about your applications? Or the amount of energy your computers are consuming? Tracking your lab statistics doesn't have to be a mystery. LabStats is a tool for lab managers to access every little detail their labs has to offer. Track your users, logins, applications, engery consumption, and much more. With LabStats Suite, all ofthis information can be at your fingertips. Come for a presentation and learn how LabStats can get you one-on-one with your computers. Ask questions, win some prizes, and check out the latest features of LabStats 5.0! Track your stats, know your labs-with LabStats. |
Daniel Hughes The 2010 "Must See" Touch and Feel Security Demo at LabMan 2010 Computer Security Products |
![]() |
Summary: Computer security products will be providing hands on demstrations of some of the most creative and effective products used to solve security challenges for computers, laptops, projectors, and more. We will include tools to allow you to lock down USB ports, laptop tracking, and theft protection. We won't just talk about it....you will use it at LABMAN 2010. |
![]() |