ºÝºÝߣshows by User: gwilhelmunc / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: gwilhelmunc / Fri, 21 Oct 2011 15:12:54 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: gwilhelmunc Transitions and Extensions – What Schools Have Learned from Sakai Migrations /slideshow/transitions-and-extensions-what-schools-have-learned-from-sakai-migrations/9818084 ctcsakaipresentationsphrevised-111021151255-phpapp01
]]>

]]>
Fri, 21 Oct 2011 15:12:54 GMT /slideshow/transitions-and-extensions-what-schools-have-learned-from-sakai-migrations/9818084 gwilhelmunc@slideshare.net(gwilhelmunc) Transitions and Extensions – What Schools Have Learned from Sakai Migrations gwilhelmunc <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctcsakaipresentationsphrevised-111021151255-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Transitions and Extensions – What Schools Have Learned from Sakai Migrations from Gary Wilhelm
]]>
363 4 https://cdn.slidesharecdn.com/ss_thumbnails/ctcsakaipresentationsphrevised-111021151255-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Go go gadgets! Implementing a technology collection for staff use /slideshow/go-go-gadgets-implementing-a-technology-collection-for-staff-use/9802092 gogogadgets-111020192730-phpapp01
This summer the UNC Libraries purchased a collection of "gadgets". The iPads, iPod Touches, Xooms, Kindles, bluetooth keyboards and more circulate to library staff members to take to conferences, use in their everyday work, or just to try out. Behind the scenes we had to make these devices (designed for single-consumer-ownership) work in an institutional, multi-user setting. In this session we'll share lessons learned from the project so far, including best practices for managing these devices (and their content) for multiple users in an institutional setting. We'll also share some survey results from lendees about what they used the gadgets for. ]]>

This summer the UNC Libraries purchased a collection of "gadgets". The iPads, iPod Touches, Xooms, Kindles, bluetooth keyboards and more circulate to library staff members to take to conferences, use in their everyday work, or just to try out. Behind the scenes we had to make these devices (designed for single-consumer-ownership) work in an institutional, multi-user setting. In this session we'll share lessons learned from the project so far, including best practices for managing these devices (and their content) for multiple users in an institutional setting. We'll also share some survey results from lendees about what they used the gadgets for. ]]>
Thu, 20 Oct 2011 19:27:26 GMT /slideshow/go-go-gadgets-implementing-a-technology-collection-for-staff-use/9802092 gwilhelmunc@slideshare.net(gwilhelmunc) Go go gadgets! Implementing a technology collection for staff use gwilhelmunc This summer the UNC Libraries purchased a collection of "gadgets". The iPads, iPod Touches, Xooms, Kindles, bluetooth keyboards and more circulate to library staff members to take to conferences, use in their everyday work, or just to try out. Behind the scenes we had to make these devices (designed for single-consumer-ownership) work in an institutional, multi-user setting. In this session we'll share lessons learned from the project so far, including best practices for managing these devices (and their content) for multiple users in an institutional setting. We'll also share some survey results from lendees about what they used the gadgets for. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gogogadgets-111020192730-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This summer the UNC Libraries purchased a collection of &quot;gadgets&quot;. The iPads, iPod Touches, Xooms, Kindles, bluetooth keyboards and more circulate to library staff members to take to conferences, use in their everyday work, or just to try out. Behind the scenes we had to make these devices (designed for single-consumer-ownership) work in an institutional, multi-user setting. In this session we&#39;ll share lessons learned from the project so far, including best practices for managing these devices (and their content) for multiple users in an institutional setting. We&#39;ll also share some survey results from lendees about what they used the gadgets for.
Go go gadgets! Implementing a technology collection for staff use from Gary Wilhelm
]]>
267 5 https://cdn.slidesharecdn.com/ss_thumbnails/gogogadgets-111020192730-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Policy-based Data Management /slideshow/ctc-carolna2011/9802051 ctc-carolna2011-111020192114-phpapp01
Data grids are an emerging technology that enables the formation of sharable collections from data distributed across multiple storage resources. The integrated Rule Oriented Data System (iRODS) is a data grid developed by the DICE Center at UNC-CH. The iRODS data grid enforces management policies that control properties of the collection. Examples of policies include retention, disposition, distribution, replication, metadata extraction, time-dependent access controls, data processing, data redaction, and integrity checking. Policies can be defined that automate administrative functions (file migration and replication) and that validate assessment criteria (authenticity, integrity, chain of custody). iRODS is used to build data sharing environments, digital libraries, and preservation environments. The iRODS data grid is used at UNC-CH to support the Carolina Digital Repository, the LifeTime Library for the School of Information and Library Science, data grids for the Renaissance Computing Institute (RENCI), collaborations within North Carolina, and both national and international data sharing. At RENCI, the TUCASI data grid supports shared collections between UNC-CH, Duke, and NCSU. The RENCI data grid is federated with ten other data grids including the National Climatic Data Center, the Texas Advanced Computing Center data grid, and the Ocean Observatories Initiative data grid. International applications include the CyberSKA Square Kilometer Array for radio astronomy and the French National Institute for Nuclear Physics and Particle Physics. The collections that are assembled may contain hundreds of millions of files, and petabytes of data. A specific goal is the integration of institutional repositories with the national data infrastructure that is being assembled under the NSF DataNet program. The software is available as an open source distribution from http://irods.diceresearch.org. ]]>

Data grids are an emerging technology that enables the formation of sharable collections from data distributed across multiple storage resources. The integrated Rule Oriented Data System (iRODS) is a data grid developed by the DICE Center at UNC-CH. The iRODS data grid enforces management policies that control properties of the collection. Examples of policies include retention, disposition, distribution, replication, metadata extraction, time-dependent access controls, data processing, data redaction, and integrity checking. Policies can be defined that automate administrative functions (file migration and replication) and that validate assessment criteria (authenticity, integrity, chain of custody). iRODS is used to build data sharing environments, digital libraries, and preservation environments. The iRODS data grid is used at UNC-CH to support the Carolina Digital Repository, the LifeTime Library for the School of Information and Library Science, data grids for the Renaissance Computing Institute (RENCI), collaborations within North Carolina, and both national and international data sharing. At RENCI, the TUCASI data grid supports shared collections between UNC-CH, Duke, and NCSU. The RENCI data grid is federated with ten other data grids including the National Climatic Data Center, the Texas Advanced Computing Center data grid, and the Ocean Observatories Initiative data grid. International applications include the CyberSKA Square Kilometer Array for radio astronomy and the French National Institute for Nuclear Physics and Particle Physics. The collections that are assembled may contain hundreds of millions of files, and petabytes of data. A specific goal is the integration of institutional repositories with the national data infrastructure that is being assembled under the NSF DataNet program. The software is available as an open source distribution from http://irods.diceresearch.org. ]]>
Thu, 20 Oct 2011 19:21:11 GMT /slideshow/ctc-carolna2011/9802051 gwilhelmunc@slideshare.net(gwilhelmunc) Policy-based Data Management gwilhelmunc Data grids are an emerging technology that enables the formation of sharable collections from data distributed across multiple storage resources. The integrated Rule Oriented Data System (iRODS) is a data grid developed by the DICE Center at UNC-CH. The iRODS data grid enforces management policies that control properties of the collection. Examples of policies include retention, disposition, distribution, replication, metadata extraction, time-dependent access controls, data processing, data redaction, and integrity checking. Policies can be defined that automate administrative functions (file migration and replication) and that validate assessment criteria (authenticity, integrity, chain of custody). iRODS is used to build data sharing environments, digital libraries, and preservation environments. The iRODS data grid is used at UNC-CH to support the Carolina Digital Repository, the LifeTime Library for the School of Information and Library Science, data grids for the Renaissance Computing Institute (RENCI), collaborations within North Carolina, and both national and international data sharing. At RENCI, the TUCASI data grid supports shared collections between UNC-CH, Duke, and NCSU. The RENCI data grid is federated with ten other data grids including the National Climatic Data Center, the Texas Advanced Computing Center data grid, and the Ocean Observatories Initiative data grid. International applications include the CyberSKA Square Kilometer Array for radio astronomy and the French National Institute for Nuclear Physics and Particle Physics. The collections that are assembled may contain hundreds of millions of files, and petabytes of data. A specific goal is the integration of institutional repositories with the national data infrastructure that is being assembled under the NSF DataNet program. The software is available as an open source distribution from http://irods.diceresearch.org. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctc-carolna2011-111020192114-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data grids are an emerging technology that enables the formation of sharable collections from data distributed across multiple storage resources. The integrated Rule Oriented Data System (iRODS) is a data grid developed by the DICE Center at UNC-CH. The iRODS data grid enforces management policies that control properties of the collection. Examples of policies include retention, disposition, distribution, replication, metadata extraction, time-dependent access controls, data processing, data redaction, and integrity checking. Policies can be defined that automate administrative functions (file migration and replication) and that validate assessment criteria (authenticity, integrity, chain of custody). iRODS is used to build data sharing environments, digital libraries, and preservation environments. The iRODS data grid is used at UNC-CH to support the Carolina Digital Repository, the LifeTime Library for the School of Information and Library Science, data grids for the Renaissance Computing Institute (RENCI), collaborations within North Carolina, and both national and international data sharing. At RENCI, the TUCASI data grid supports shared collections between UNC-CH, Duke, and NCSU. The RENCI data grid is federated with ten other data grids including the National Climatic Data Center, the Texas Advanced Computing Center data grid, and the Ocean Observatories Initiative data grid. International applications include the CyberSKA Square Kilometer Array for radio astronomy and the French National Institute for Nuclear Physics and Particle Physics. The collections that are assembled may contain hundreds of millions of files, and petabytes of data. A specific goal is the integration of institutional repositories with the national data infrastructure that is being assembled under the NSF DataNet program. The software is available as an open source distribution from http://irods.diceresearch.org.
Policy-based Data Management from Gary Wilhelm
]]>
466 4 https://cdn.slidesharecdn.com/ss_thumbnails/ctc-carolna2011-111020192114-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Using Dataverse Virtual Archive Technology for Research Data Management /slideshow/using-dataverse-virtual-archive-technology-for-research-data-management/9799825 odumdvnctcdraft2jonc-111020151300-phpapp02
One of the most important components of research is access to quality data. Digital data archives must work to increase submission rates to insure that quality data exist for future researchers. This is a challenge given that recent studies show that vast amounts of data collected during publicly funded projects are not being archived. Even the best-planned methodology will not succeed when researchers use tainted data or fail to find adequate data. Social science data archivists play a key role in the effort to maintain quality sources of data for social science investigators to repurpose and reuse. The dynamic, circular movement of data between the producers and archives is critical to the future of social science research. Data archives have historically provided for this data interchange using considerable human capital. Dedicated archivists and investigators have worked together to ensure that data were processed and placed into an archive best designed for their preservation, a manual process that has become increasingly expensive and unwieldy due to the volume of data being produced and the advanced metadata required to provide future researchers enough details to reuse the study. Typical methods have the researchers working with the archives to deposit the data long after the project has been complete and the papers published. The manual creation of metadata at this point takes far long than if it were collected earlier in the research life cycle. Recent advances in archival repository software may be the key to streamlining this increasingly inefficient archival process by allowing archivist and researchers the ability to create detailed metadata earlier in the research lifecycle at a point where it will take far less time. Software allows researchers greater personal control over archival ingest processes, bridging the gap between researchers and archives and possibly increasing submission rates of valuable data to archives. Archival technology provides tools that manage automated ingest, data cataloging, advanced search and indexing, and rights and access issues. Archival tools also provide proper citation, creation of persistent identifiers, automatic creation of preservation formats, format migration, and statistical analysis of data. Customized branding and citation management can provide investigators collecting these data with a tool that will ensure that they get the credit they deserve. The Dataverse Network Technology has the potential to aid many research groups at UNC in the data management processes and has the potential for use in many disciplines. This presentation will explain the technology and its applicability for managing research data.]]>

One of the most important components of research is access to quality data. Digital data archives must work to increase submission rates to insure that quality data exist for future researchers. This is a challenge given that recent studies show that vast amounts of data collected during publicly funded projects are not being archived. Even the best-planned methodology will not succeed when researchers use tainted data or fail to find adequate data. Social science data archivists play a key role in the effort to maintain quality sources of data for social science investigators to repurpose and reuse. The dynamic, circular movement of data between the producers and archives is critical to the future of social science research. Data archives have historically provided for this data interchange using considerable human capital. Dedicated archivists and investigators have worked together to ensure that data were processed and placed into an archive best designed for their preservation, a manual process that has become increasingly expensive and unwieldy due to the volume of data being produced and the advanced metadata required to provide future researchers enough details to reuse the study. Typical methods have the researchers working with the archives to deposit the data long after the project has been complete and the papers published. The manual creation of metadata at this point takes far long than if it were collected earlier in the research life cycle. Recent advances in archival repository software may be the key to streamlining this increasingly inefficient archival process by allowing archivist and researchers the ability to create detailed metadata earlier in the research lifecycle at a point where it will take far less time. Software allows researchers greater personal control over archival ingest processes, bridging the gap between researchers and archives and possibly increasing submission rates of valuable data to archives. Archival technology provides tools that manage automated ingest, data cataloging, advanced search and indexing, and rights and access issues. Archival tools also provide proper citation, creation of persistent identifiers, automatic creation of preservation formats, format migration, and statistical analysis of data. Customized branding and citation management can provide investigators collecting these data with a tool that will ensure that they get the credit they deserve. The Dataverse Network Technology has the potential to aid many research groups at UNC in the data management processes and has the potential for use in many disciplines. This presentation will explain the technology and its applicability for managing research data.]]>
Thu, 20 Oct 2011 15:12:58 GMT /slideshow/using-dataverse-virtual-archive-technology-for-research-data-management/9799825 gwilhelmunc@slideshare.net(gwilhelmunc) Using Dataverse Virtual Archive Technology for Research Data Management gwilhelmunc One of the most important components of research is access to quality data. Digital data archives must work to increase submission rates to insure that quality data exist for future researchers. This is a challenge given that recent studies show that vast amounts of data collected during publicly funded projects are not being archived. Even the best-planned methodology will not succeed when researchers use tainted data or fail to find adequate data. Social science data archivists play a key role in the effort to maintain quality sources of data for social science investigators to repurpose and reuse. The dynamic, circular movement of data between the producers and archives is critical to the future of social science research. Data archives have historically provided for this data interchange using considerable human capital. Dedicated archivists and investigators have worked together to ensure that data were processed and placed into an archive best designed for their preservation, a manual process that has become increasingly expensive and unwieldy due to the volume of data being produced and the advanced metadata required to provide future researchers enough details to reuse the study. Typical methods have the researchers working with the archives to deposit the data long after the project has been complete and the papers published. The manual creation of metadata at this point takes far long than if it were collected earlier in the research life cycle. Recent advances in archival repository software may be the key to streamlining this increasingly inefficient archival process by allowing archivist and researchers the ability to create detailed metadata earlier in the research lifecycle at a point where it will take far less time. Software allows researchers greater personal control over archival ingest processes, bridging the gap between researchers and archives and possibly increasing submission rates of valuable data to archives. Archival technology provides tools that manage automated ingest, data cataloging, advanced search and indexing, and rights and access issues. Archival tools also provide proper citation, creation of persistent identifiers, automatic creation of preservation formats, format migration, and statistical analysis of data. Customized branding and citation management can provide investigators collecting these data with a tool that will ensure that they get the credit they deserve. The Dataverse Network Technology has the potential to aid many research groups at UNC in the data management processes and has the potential for use in many disciplines. This presentation will explain the technology and its applicability for managing research data. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/odumdvnctcdraft2jonc-111020151300-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> One of the most important components of research is access to quality data. Digital data archives must work to increase submission rates to insure that quality data exist for future researchers. This is a challenge given that recent studies show that vast amounts of data collected during publicly funded projects are not being archived. Even the best-planned methodology will not succeed when researchers use tainted data or fail to find adequate data. Social science data archivists play a key role in the effort to maintain quality sources of data for social science investigators to repurpose and reuse. The dynamic, circular movement of data between the producers and archives is critical to the future of social science research. Data archives have historically provided for this data interchange using considerable human capital. Dedicated archivists and investigators have worked together to ensure that data were processed and placed into an archive best designed for their preservation, a manual process that has become increasingly expensive and unwieldy due to the volume of data being produced and the advanced metadata required to provide future researchers enough details to reuse the study. Typical methods have the researchers working with the archives to deposit the data long after the project has been complete and the papers published. The manual creation of metadata at this point takes far long than if it were collected earlier in the research life cycle. Recent advances in archival repository software may be the key to streamlining this increasingly inefficient archival process by allowing archivist and researchers the ability to create detailed metadata earlier in the research lifecycle at a point where it will take far less time. Software allows researchers greater personal control over archival ingest processes, bridging the gap between researchers and archives and possibly increasing submission rates of valuable data to archives. Archival technology provides tools that manage automated ingest, data cataloging, advanced search and indexing, and rights and access issues. Archival tools also provide proper citation, creation of persistent identifiers, automatic creation of preservation formats, format migration, and statistical analysis of data. Customized branding and citation management can provide investigators collecting these data with a tool that will ensure that they get the credit they deserve. The Dataverse Network Technology has the potential to aid many research groups at UNC in the data management processes and has the potential for use in many disciplines. This presentation will explain the technology and its applicability for managing research data.
Using Dataverse Virtual Archive Technology for Research Data Management from Gary Wilhelm
]]>
512 5 https://cdn.slidesharecdn.com/ss_thumbnails/odumdvnctcdraft2jonc-111020151300-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network Attached Storage (NAS) Initiative /gwilhelmunc/network-attached-storage-nas-initiative itec-nasctc2011-111020135755-phpapp01
Consolidation of departmental file services is one of the initiatives defined by Carolina Counts. The project has been researched and funded and is now in the implementation phase. We will cover the specifics of the solution and the details of the business and support models. ]]>

Consolidation of departmental file services is one of the initiatives defined by Carolina Counts. The project has been researched and funded and is now in the implementation phase. We will cover the specifics of the solution and the details of the business and support models. ]]>
Thu, 20 Oct 2011 13:57:53 GMT /gwilhelmunc/network-attached-storage-nas-initiative gwilhelmunc@slideshare.net(gwilhelmunc) Network Attached Storage (NAS) Initiative gwilhelmunc Consolidation of departmental file services is one of the initiatives defined by Carolina Counts. The project has been researched and funded and is now in the implementation phase. We will cover the specifics of the solution and the details of the business and support models. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itec-nasctc2011-111020135755-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Consolidation of departmental file services is one of the initiatives defined by Carolina Counts. The project has been researched and funded and is now in the implementation phase. We will cover the specifics of the solution and the details of the business and support models.
Network Attached Storage (NAS) Initiative from Gary Wilhelm
]]>
800 4 https://cdn.slidesharecdn.com/ss_thumbnails/itec-nasctc2011-111020135755-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IPv6: We Care So You Don't Have To /slideshow/ipv6-we-care-so-you-dont-have-to/9798931 ctc-ipv6-111020133329-phpapp01
Is it time to panic? Are we completely out of IP addresses? Do I have to learn to speak hexadecimal? What is IPv6 and should you care? In this session, we'll attempt to answer these questions and more and we're likely to have more questions than answers. IPv6 is the newest version of the IP/Internet Protocol (currently referred to as IPv4) and was created primarily to address the shortage of IP addresses across the world. However, there's a lot more going on with IPv6 than just addressing changes. This session will address just what the campus has done and still needs to do and what you need to worry about as IPv6 comes closer to your front door.]]>

Is it time to panic? Are we completely out of IP addresses? Do I have to learn to speak hexadecimal? What is IPv6 and should you care? In this session, we'll attempt to answer these questions and more and we're likely to have more questions than answers. IPv6 is the newest version of the IP/Internet Protocol (currently referred to as IPv4) and was created primarily to address the shortage of IP addresses across the world. However, there's a lot more going on with IPv6 than just addressing changes. This session will address just what the campus has done and still needs to do and what you need to worry about as IPv6 comes closer to your front door.]]>
Thu, 20 Oct 2011 13:33:27 GMT /slideshow/ipv6-we-care-so-you-dont-have-to/9798931 gwilhelmunc@slideshare.net(gwilhelmunc) IPv6: We Care So You Don't Have To gwilhelmunc Is it time to panic? Are we completely out of IP addresses? Do I have to learn to speak hexadecimal? What is IPv6 and should you care? In this session, we'll attempt to answer these questions and more and we're likely to have more questions than answers. IPv6 is the newest version of the IP/Internet Protocol (currently referred to as IPv4) and was created primarily to address the shortage of IP addresses across the world. However, there's a lot more going on with IPv6 than just addressing changes. This session will address just what the campus has done and still needs to do and what you need to worry about as IPv6 comes closer to your front door. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctc-ipv6-111020133329-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Is it time to panic? Are we completely out of IP addresses? Do I have to learn to speak hexadecimal? What is IPv6 and should you care? In this session, we&#39;ll attempt to answer these questions and more and we&#39;re likely to have more questions than answers. IPv6 is the newest version of the IP/Internet Protocol (currently referred to as IPv4) and was created primarily to address the shortage of IP addresses across the world. However, there&#39;s a lot more going on with IPv6 than just addressing changes. This session will address just what the campus has done and still needs to do and what you need to worry about as IPv6 comes closer to your front door.
IPv6: We Care So You Don't Have To from Gary Wilhelm
]]>
701 2 https://cdn.slidesharecdn.com/ss_thumbnails/ctc-ipv6-111020133329-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Supporting your remote clients with bomgar /slideshow/supporting-your-remote-clients-with-bomgar/9798478 supportingyourremoteclientswithbomgar-111020125548-phpapp02
Remote support is one of the most cost effective ways to manage your incident management process. Learn what features within Bomgar led the School of Medicine’s Office of Information Systems, and the Carolina Institute for Developmental Disabilities to choose Bomgar as their remote support tool of choice. We will demo both typical and not-so-typical support sessions to give you an idea of the scope of the product which allows technician to remotely connect to Windows, Unix, Mac, Windows Mobile, Blackberry, and limited remote support for Android and iPhone devices. ]]>

Remote support is one of the most cost effective ways to manage your incident management process. Learn what features within Bomgar led the School of Medicine’s Office of Information Systems, and the Carolina Institute for Developmental Disabilities to choose Bomgar as their remote support tool of choice. We will demo both typical and not-so-typical support sessions to give you an idea of the scope of the product which allows technician to remotely connect to Windows, Unix, Mac, Windows Mobile, Blackberry, and limited remote support for Android and iPhone devices. ]]>
Thu, 20 Oct 2011 12:55:44 GMT /slideshow/supporting-your-remote-clients-with-bomgar/9798478 gwilhelmunc@slideshare.net(gwilhelmunc) Supporting your remote clients with bomgar gwilhelmunc Remote support is one of the most cost effective ways to manage your incident management process. Learn what features within Bomgar led the School of Medicine’s Office of Information Systems, and the Carolina Institute for Developmental Disabilities to choose Bomgar as their remote support tool of choice. We will demo both typical and not-so-typical support sessions to give you an idea of the scope of the product which allows technician to remotely connect to Windows, Unix, Mac, Windows Mobile, Blackberry, and limited remote support for Android and iPhone devices. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/supportingyourremoteclientswithbomgar-111020125548-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Remote support is one of the most cost effective ways to manage your incident management process. Learn what features within Bomgar led the School of Medicine’s Office of Information Systems, and the Carolina Institute for Developmental Disabilities to choose Bomgar as their remote support tool of choice. We will demo both typical and not-so-typical support sessions to give you an idea of the scope of the product which allows technician to remotely connect to Windows, Unix, Mac, Windows Mobile, Blackberry, and limited remote support for Android and iPhone devices.
Supporting your remote clients with bomgar from Gary Wilhelm
]]>
826 5 https://cdn.slidesharecdn.com/ss_thumbnails/supportingyourremoteclientswithbomgar-111020125548-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
After the Breach /slideshow/after-the-breach-october-2010/5595301 afterthebreachoctober2010-101028081412-phpapp01
The UNC School of Medicine suffered a security breach last summer that required notification of over 100,000 patients that their information had been exposed. This presentation will talk about the scope of damage that is caused by a breach of this magnitude and the many steps that are necessary for damage control and recovery.]]>

The UNC School of Medicine suffered a security breach last summer that required notification of over 100,000 patients that their information had been exposed. This presentation will talk about the scope of damage that is caused by a breach of this magnitude and the many steps that are necessary for damage control and recovery.]]>
Thu, 28 Oct 2010 08:14:10 GMT /slideshow/after-the-breach-october-2010/5595301 gwilhelmunc@slideshare.net(gwilhelmunc) After the Breach gwilhelmunc The UNC School of Medicine suffered a security breach last summer that required notification of over 100,000 patients that their information had been exposed. This presentation will talk about the scope of damage that is caused by a breach of this magnitude and the many steps that are necessary for damage control and recovery. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/afterthebreachoctober2010-101028081412-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The UNC School of Medicine suffered a security breach last summer that required notification of over 100,000 patients that their information had been exposed. This presentation will talk about the scope of damage that is caused by a breach of this magnitude and the many steps that are necessary for damage control and recovery.
After the Breach from Gary Wilhelm
]]>
432 3 https://cdn.slidesharecdn.com/ss_thumbnails/afterthebreachoctober2010-101028081412-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Virtualization and you: where are we? /slideshow/virtualization-and-you-where-are-we/5567307 ctc-retreat-fall2010-virtualization-101026113147-phpapp02
Virtualization technologies have grown very popular in recent years and have proven to be both cost-effective and flexible alternatives to many physical hardware use-cases. ITS is endeavoring to make a compelling virtualization service available to the campus community, and has established a working group to get this initiative off the ground. This presentation will provide a general overview of the technology and its applicability and advantages, a presentation about the service as it exists today, and a précis of the working group’s progress to date. As the main goal of this session is to get feedback from the CTC on the working group’s efforts and any other data that would help inform discussions going forward, a significant amount of time will be devoted to exchanging ideas with attendees.]]>

Virtualization technologies have grown very popular in recent years and have proven to be both cost-effective and flexible alternatives to many physical hardware use-cases. ITS is endeavoring to make a compelling virtualization service available to the campus community, and has established a working group to get this initiative off the ground. This presentation will provide a general overview of the technology and its applicability and advantages, a presentation about the service as it exists today, and a précis of the working group’s progress to date. As the main goal of this session is to get feedback from the CTC on the working group’s efforts and any other data that would help inform discussions going forward, a significant amount of time will be devoted to exchanging ideas with attendees.]]>
Tue, 26 Oct 2010 11:31:41 GMT /slideshow/virtualization-and-you-where-are-we/5567307 gwilhelmunc@slideshare.net(gwilhelmunc) Virtualization and you: where are we? gwilhelmunc Virtualization technologies have grown very popular in recent years and have proven to be both cost-effective and flexible alternatives to many physical hardware use-cases. ITS is endeavoring to make a compelling virtualization service available to the campus community, and has established a working group to get this initiative off the ground. This presentation will provide a general overview of the technology and its applicability and advantages, a presentation about the service as it exists today, and a précis of the working group’s progress to date. As the main goal of this session is to get feedback from the CTC on the working group’s efforts and any other data that would help inform discussions going forward, a significant amount of time will be devoted to exchanging ideas with attendees. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctc-retreat-fall2010-virtualization-101026113147-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Virtualization technologies have grown very popular in recent years and have proven to be both cost-effective and flexible alternatives to many physical hardware use-cases. ITS is endeavoring to make a compelling virtualization service available to the campus community, and has established a working group to get this initiative off the ground. This presentation will provide a general overview of the technology and its applicability and advantages, a presentation about the service as it exists today, and a précis of the working group’s progress to date. As the main goal of this session is to get feedback from the CTC on the working group’s efforts and any other data that would help inform discussions going forward, a significant amount of time will be devoted to exchanging ideas with attendees.
Virtualization and you: where are we? from Gary Wilhelm
]]>
227 2 https://cdn.slidesharecdn.com/ss_thumbnails/ctc-retreat-fall2010-virtualization-101026113147-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Online Copyright Education /gwilhelmunc/online-copyright-education ctconlinecopyrighteducation-101025082017-phpapp01
Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing. In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course.]]>

Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing. In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course.]]>
Mon, 25 Oct 2010 08:19:36 GMT /gwilhelmunc/online-copyright-education gwilhelmunc@slideshare.net(gwilhelmunc) Online Copyright Education gwilhelmunc Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing. In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctconlinecopyrighteducation-101025082017-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing. In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course.
Online Copyright Education from Gary Wilhelm
]]>
271 3 https://cdn.slidesharecdn.com/ss_thumbnails/ctconlinecopyrighteducation-101025082017-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Increasing Utilization of Software Site Licenses /slideshow/ctc-software-acquisition-presentation/5554291 ctcsoftwareacquisitionpresentation-101025081135-phpapp02
The objective of this Carolina Counts initiative is to increase utilization of University software licenses by improving campus awareness of available software and by providing an easier process for acquiring software. This will not only provide substantial cost savings, but will also improve service to the University community.]]>

The objective of this Carolina Counts initiative is to increase utilization of University software licenses by improving campus awareness of available software and by providing an easier process for acquiring software. This will not only provide substantial cost savings, but will also improve service to the University community.]]>
Mon, 25 Oct 2010 08:11:25 GMT /slideshow/ctc-software-acquisition-presentation/5554291 gwilhelmunc@slideshare.net(gwilhelmunc) Increasing Utilization of Software Site Licenses gwilhelmunc The objective of this Carolina Counts initiative is to increase utilization of University software licenses by improving campus awareness of available software and by providing an easier process for acquiring software. This will not only provide substantial cost savings, but will also improve service to the University community. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctcsoftwareacquisitionpresentation-101025081135-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The objective of this Carolina Counts initiative is to increase utilization of University software licenses by improving campus awareness of available software and by providing an easier process for acquiring software. This will not only provide substantial cost savings, but will also improve service to the University community.
Increasing Utilization of Software Site Licenses from Gary Wilhelm
]]>
400 2 https://cdn.slidesharecdn.com/ss_thumbnails/ctcsoftwareacquisitionpresentation-101025081135-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Leveraging Centralized IT Support Services as a First Point of Contact /slideshow/ctc-helpdesk-presentation/5554290 ctchelpdeskpresentation-101025081129-phpapp01
The objective of this initiative is to outline opportunities related to adopting a centralized first point of contact for campus-wide IT support that will provide UNC IT customers with a single point of contact for responsive, courteous, professional and accurate IT support.]]>

The objective of this initiative is to outline opportunities related to adopting a centralized first point of contact for campus-wide IT support that will provide UNC IT customers with a single point of contact for responsive, courteous, professional and accurate IT support.]]>
Mon, 25 Oct 2010 08:11:25 GMT /slideshow/ctc-helpdesk-presentation/5554290 gwilhelmunc@slideshare.net(gwilhelmunc) Leveraging Centralized IT Support Services as a First Point of Contact gwilhelmunc The objective of this initiative is to outline opportunities related to adopting a centralized first point of contact for campus-wide IT support that will provide UNC IT customers with a single point of contact for responsive, courteous, professional and accurate IT support. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctchelpdeskpresentation-101025081129-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The objective of this initiative is to outline opportunities related to adopting a centralized first point of contact for campus-wide IT support that will provide UNC IT customers with a single point of contact for responsive, courteous, professional and accurate IT support.
Leveraging Centralized IT Support Services as a First Point of Contact from Gary Wilhelm
]]>
711 3 https://cdn.slidesharecdn.com/ss_thumbnails/ctchelpdeskpresentation-101025081129-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Building Cyber-infrastructure at UNC-CH /slideshow/ctc-irods/5552412 ctc-irods-101025060749-phpapp02
Learn how UNC’s DICE cyber-infrastructure supports data grids for sharing data, digital libraries for publishing data, archives for preserving data, and data processing pipelines for analyzing data using the integrated Rule-Oriented Data.]]>

Learn how UNC’s DICE cyber-infrastructure supports data grids for sharing data, digital libraries for publishing data, archives for preserving data, and data processing pipelines for analyzing data using the integrated Rule-Oriented Data.]]>
Mon, 25 Oct 2010 06:07:44 GMT /slideshow/ctc-irods/5552412 gwilhelmunc@slideshare.net(gwilhelmunc) Building Cyber-infrastructure at UNC-CH gwilhelmunc Learn how UNC’s DICE cyber-infrastructure supports data grids for sharing data, digital libraries for publishing data, archives for preserving data, and data processing pipelines for analyzing data using the integrated Rule-Oriented Data. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctc-irods-101025060749-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn how UNC’s DICE cyber-infrastructure supports data grids for sharing data, digital libraries for publishing data, archives for preserving data, and data processing pipelines for analyzing data using the integrated Rule-Oriented Data.
Building Cyber-infrastructure at UNC-CH from Gary Wilhelm
]]>
574 4 https://cdn.slidesharecdn.com/ss_thumbnails/ctc-irods-101025060749-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network Attached Storage Initiative /slideshow/network-attached-storage-initiative/5532600 itec-nasrev3-101022132806-phpapp01
Network Attached Storage (NAS) has been identified as a candidate for a campus-wide service. A working committee has been researching requirements and possible solutions. The panel will present the status of the initiative and will discuss requirements and possible service offerings.]]>

Network Attached Storage (NAS) has been identified as a candidate for a campus-wide service. A working committee has been researching requirements and possible solutions. The panel will present the status of the initiative and will discuss requirements and possible service offerings.]]>
Fri, 22 Oct 2010 13:28:02 GMT /slideshow/network-attached-storage-initiative/5532600 gwilhelmunc@slideshare.net(gwilhelmunc) Network Attached Storage Initiative gwilhelmunc Network Attached Storage (NAS) has been identified as a candidate for a campus-wide service. A working committee has been researching requirements and possible solutions. The panel will present the status of the initiative and will discuss requirements and possible service offerings. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itec-nasrev3-101022132806-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Network Attached Storage (NAS) has been identified as a candidate for a campus-wide service. A working committee has been researching requirements and possible solutions. The panel will present the status of the initiative and will discuss requirements and possible service offerings.
Network Attached Storage Initiative from Gary Wilhelm
]]>
296 4 https://cdn.slidesharecdn.com/ss_thumbnails/itec-nasrev3-101022132806-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
S#$% My Network Says (CTC Retreat 2010) /slideshow/s-my-network-says-ctc-retreat-2010/5531123 ctc-networkstatus-2010-101022102553-phpapp01
In the spirit of the well-known Twitter feed about a dad's view of the world, the campus network actually provides both insightful and perverse findings to the ITS Comm Tech Director of Networking, Jim Gogan. As part of the annual campus network status update, Jim will share many of these findings, all in a G-rated format, as well as what he thinks the network will be telling him over the next year.]]>

In the spirit of the well-known Twitter feed about a dad's view of the world, the campus network actually provides both insightful and perverse findings to the ITS Comm Tech Director of Networking, Jim Gogan. As part of the annual campus network status update, Jim will share many of these findings, all in a G-rated format, as well as what he thinks the network will be telling him over the next year.]]>
Fri, 22 Oct 2010 10:25:46 GMT /slideshow/s-my-network-says-ctc-retreat-2010/5531123 gwilhelmunc@slideshare.net(gwilhelmunc) S#$% My Network Says (CTC Retreat 2010) gwilhelmunc In the spirit of the well-known Twitter feed about a dad's view of the world, the campus network actually provides both insightful and perverse findings to the ITS Comm Tech Director of Networking, Jim Gogan. As part of the annual campus network status update, Jim will share many of these findings, all in a G-rated format, as well as what he thinks the network will be telling him over the next year. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ctc-networkstatus-2010-101022102553-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the spirit of the well-known Twitter feed about a dad&#39;s view of the world, the campus network actually provides both insightful and perverse findings to the ITS Comm Tech Director of Networking, Jim Gogan. As part of the annual campus network status update, Jim will share many of these findings, all in a G-rated format, as well as what he thinks the network will be telling him over the next year.
S#$% My Network Says (CTC Retreat 2010) from Gary Wilhelm
]]>
332 3 https://cdn.slidesharecdn.com/ss_thumbnails/ctc-networkstatus-2010-101022102553-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png Web Developer and Database Programmer at the UNC-Chapel Hill School of Law www.law.unc.edu/ https://cdn.slidesharecdn.com/ss_thumbnails/ctcsakaipresentationsphrevised-111021151255-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/transitions-and-extensions-what-schools-have-learned-from-sakai-migrations/9818084 Transitions and Extens... https://cdn.slidesharecdn.com/ss_thumbnails/gogogadgets-111020192730-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/go-go-gadgets-implementing-a-technology-collection-for-staff-use/9802092 Go go gadgets! Impleme... https://cdn.slidesharecdn.com/ss_thumbnails/ctc-carolna2011-111020192114-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ctc-carolna2011/9802051 Policy-based Data Mana...