Task 2: Technical Support Resources
OIT Support Center
At the OIT Support Center the majority of our work is with local accounts, so most of the tools and resources we use are local or internal admin interfaces.
A tool we do use that is publicly available is Citrix GoToAssist. GoToAssist allows us to provide remote assistance to anyone with an internet connection, regardless of their operating system. A video demonstration is available on their website.
Sometimes we need to assist a user in determining their web browser capabilities. A few sites for determining Browser settings while troubleshooting an issue are:
- http://www.whatbrowser.org – Displays the name of the web browser and version number.
- http://www.isjavascriptenabled.com/ – Checks to see if the web browser has Javascript is enabled.
- http://www.pageout.net/page.dyn/cookie_tester – Checks to see if Browser Cookies are enabled.
- http://www.java.com/en/download/installed.jsp – Checks to see if Java is installed, enabled, and up to date.
A more specialized browser check is used for evaluating software prerequisites for using Elluminate Live. The site checks for Java, and the version, to ensure compatibility with Elluminate Live. A configuration room is also available for users to evaluate their Elluminate Live settings.
Development Resources
Reference websites I use regularly are W3Schools, and W3C Validation Service.
Apple Support
As an avid Mac user, I have developed a lot of personal knowledge, but I also use the shared knowledge of others. Apple’s Support site is a good starting point for basic information, but Apple’s Support Community usually gives good troubleshooting information for real world errors.
Specific Errors
A Google search of an error message will usually provide a very good starting point for a variety of errors. Chances are very good that you are not the first person to run into an error. A Google search will usually result in a variety of results, ranging from people complaining about the error, to people troubleshooting the error through discussion posts, to the vendor’s documentation about what the error means.
Task 3: End-User Support Documentation
UA Office of Information Technology Documentation Examples
Adjusting Display Name in Google
Editing Your Reply-to Address in Google Apps at UA
Task 4: System Recommendations and Support Plans
Task 4.1: Research and Recommendations
I chose to look into a computer for a UAF student. I researched an Apple MacBook Pro and a Dell Inspiron 14R-2nd Gen laptop. The two laptops are similar in size and specification. The three main specification differences were with the processor, the battery, and the case body construction. The Apple has an Intel Core i5, over the Dell’s Intel Core i3. The Apple also has a 61% larger capacity battery than the Dell. Finally, the Apple MacBook Pro body is milled from a single block of aluminum, making the body very rigid and compact. In addition to the slightly better specifications, the Apple will boot both Mac OS X and Windows (XP, Vista, and 7). However, for all these bonuses, the Apple’s price tag of $1356 makes it $383 more expensive than the Dell. Even though the Apple is more expensive, I think the added battery capacity, build quality, and multiple operating system support is worth it.
Task 4.2: Technical Support Plans
Security Plan
For security Mac OS X is pretty decent without much adjustment, however, there is always a little more one can do to improve security. The website macgeekery.com has some good Mac OS X security tips; some of the tips are also applicable to Windows (see Rules 1, 3, 5, 7, and 0).
In addition to the changes a user can make with how they use their computer, there are some security software utilities that care very useful as well. The built in Firewall is great for most people, but if you plan to turn on a number of services on your Mac upgrading the Firewall it worth looking into. I personally use Doorstop X. Doorstop is very robust and configurable, allowing me to limit access to services by Subnet, and/or specific IP. This level of sophistication isn’t really needed by the average user. I would only recommend this tool for computers in public IP address space, and with constantly shared services. The full Doorstop Firewall suite has a one time cost of $79.
While Mac OS X isn’t targeted very often by viruses, that doesn’t mean no viruses exist. A free, but powerful anti-virus tool is Sophos Anti-Virus for Mac Home Edition. While I haven’t used the software, it comes well reviewed by MacWorld, CNet, and About.com, among others.
Backup & Disaster Recovery Plan
For backups, and disaster recovery, we can choose from local or remote options. A local option is to purchase an external hard drive, like the Western Digital My Book Essentials drive, and use the built in TimeMachine backup software. A couple remote options are Backblaze or CrashPlan. Both offer unlimited backup storage for $50 a year, and will allow you to backup external drives along with the internal hard drives. CrashPlan is a little better because their service does not delete backed up files when the local file has been deleted unless explicitly told to; Backblaze keeps a backup copy of a locally deleted file for 30 days, and then they delete it from the backup.
Maintenance Plan
The AppleCare warranty covers all manufacture flaws, but will not cover Accidental Damage. Because of the lack of accidental coverage, you will want to take good, physical care of the computer. If you know you are prone to accidents, you may want to consider additional insurance, either through your auto insurance company, or through a third party company. One such company, Safeware, provides insurance for laptops, covering accidental damage, drops, spilled coffee, and theft, among other things. A quote for three years of coverage came to $349.
In addition to caring for the computer hardware, you also need to maintain the software. The Dummies, MacWorld, and MacAttorney sites all have suggestions for maintaining the Mac operating system; in contrast, I only run about one third the utilities those sites suggest, and no where near as frequently as they suggest.
Task 4.3: Cost Analysis
For the average user, the only additional costs over the computer would be for a backup plan. Using an external hard drive for a local backup option would cost about $120. The remote backup option is more robust, expandable, and initially less expensive, however, the initial cost of $50 turns into an annual, recurring $50 cost. Even though the remote option comes with a recurring cost, the backup service would be very well utilized on the University network, where nearly every building has wireless internet access, allowing near constant backups.
Total initial cost of computer and remote backup would be $1406, with a $50 annual cost. If well taken care of, the MacBook Pro laptop will last all 4 years of college, and then some. After 2 years, the student should consider spending no more than $150 to double the installed RAM. If hard drive space is an issue, upgrading the internal hard drive is reasonably easy to upgrade, and external hard drives are readily available.
Task 5: IT Trends
Human interface with computers has evolved from punchcards, to keyboards with text based visual feedback, to keyboards and mice with graphical feedback. With the Nintendo Wii game console, human interface with electronics completely changed. Suddenly your movement and gestures, through Wiimote controllers with accelerometers, gyroscopes, and inferred cameras, could be replicated by a game character. A few years later Microsoft upped the ante with Kinect, a camera based system that makes your entire body the controller.
Innovative computer programmers have connected these new controllers to computers to challenge how we think about interacting with computers. One such programmer, Johnny Lee, connected a Wiimote to his computer and reversed the way a Wimmote is typically used to create a head tracking virtual reality interface. This modification creates the illusion of greater immersion in a game. Applying some of the same tracking concepts, Johnny Lee also used the Wiimote technology to create a low cost multi-touch display.
The Microsoft Kinect uses of the same concepts around capturing movement, but uses multiple cameras to track the human body, rather than inferred LEDs. This technology elliminates the need for controllers as the body is the controller. MIT students, and software companies have applied the new technology to existing computers, allowing users to interact with their computers without a keyboard or mouse.
Such gesture based interfaces make science fiction computer interfaces, like those seen in Minority Report, closer to science fact.
As these technologies evolve, becoming more intuitive, responsive, and efficient, we will see them creep into everyday computing, much like the multi-touch and swipe interface did with smartphones and tablet computers. If these technologies become as polished as touch technologies have, the learning curve should be fairly small.
Task 6: Quality Control Check List
The following list is focused on providing support and maintenance for a Mac.
|
Task 8: Human Relations
To be evaluated during the presentation of this portfolio.
Task 9: Project Management & Implementation
Submit Portfolio to Bill Barnes when everything is complete