My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2/5/1997 SCHOOL - HIGH SCHOOL BUILDING COMMITTEE Minutes
>
2/5/1997 SCHOOL - HIGH SCHOOL BUILDING COMMITTEE Minutes
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
8/20/2018 5:03:38 PM
Creation date
8/20/2018 3:01:49 PM
Metadata
Fields
Template:
Mashpee_Meeting Documents
Board
SCHOOL - HIGH SCHOOL BUILDING COMMITTEE
Meeting Document Type
Minutes
Meeting Date
02/05/1997
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
7
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Show annotations
View images
View plain text
1 <br /> 5 <br /> { <br /> responsibility that the school assumes in the meantime. <br /> John Williams explained when he met with Mike Kirwin and the technology subcommittee it <br /> was decided that there would be a student workstation-where ghat you see is what you get but it <br /> was not configured that way. So CIC has to re-visit every machine. Each machine should be <br /> configured for its particular purpose. He had a staff list of ghat rights each machine should have. <br /> If this was done originally we would not have the problems that we did. <br /> Paul said there were 2 problems; <br /> -the student computers were not configured on the correct server- CIC problem <br /> - leakage of the password, even with the best system there needs to be a strong policy from the <br /> principal's office. <br /> l ii e Pietrows i said the problem has been that 3 or 4 different vendors are doing different <br /> components of the project. If they change the password,there is no coordination between the <br /> vendors and its getting tied up. <br /> Steve said there needs to be education done, a meeting should be put together. Everyone is <br /> stepping on toes because they don't know enough of what is going on. The system is vulnerable. <br /> Paul said CIC has dropped the ball, the didn't configure the stations correctly,the software was <br /> lost for l week, the system is not finished. To come in at night and not let the staff know of the <br /> changes made is unacceptable. <br /> Joe asked if there is a technical person in charge. <br /> Jim said it is Computers without Fear -Kevin and Linda. They are here 2, 12 days per week to <br /> act as the network administrator. <br /> Janice explained that the school department is in the process of hiring someone. <br /> Paul asked Kevin from Computers without Pear for his opinion. <br /> Kevin responded that he does not know about the contract requirements of the vendors but he <br /> can discuss what:he lows about the system. He said.there have only been 4 passwords, l for <br /> students and 3 different ones for the administration,because it go out two times. Because of <br /> lack of education,teachers are typing in a name but not the right password and they couldn't get <br /> in. That is happening a lot. <br /> Peter asked hire how familiar he is with the entire system? He is very familiar with.it. <br /> Peter asked hire if he understands the end product? He does. <br /> Peter asked hire for suggestions on a course of action so students can use the system as it is <br /> supposed to be used. <br /> Kevin said usually computer people get beat up if a building construction schedule slips. There <br /> is a lot of pressure on the technology contractors to finish so the students can get full benefit. <br /> This is still a work in progress, people forget that. CIC still has work to do and they need to do <br /> it. He doesn't know what the schedule was but it doesn't help CIC to constantly get beat up <br /> while their trying to do their,job. <br /> Paul asked Mike when we can expect CIC to be finished? Mike Kirwin said February 1 . <br /> John Williams said it was originally explained to there that a teacher, when logging on, would <br /> use their name first and then create their own password. Are we not at that point fret? <br /> Kevin said we are not. <br />
The URL can be used to link to this page
Your browser does not support the video tag.