New Faculty Handout

Need Help?
In the office?

In the classroom?

  • Call 9­3054 (or 9­6015 after hours) or send a student runner 

At home?

  • Call 9­7900 or email supportdesk@miamioh.edu

CEC­IT v. IT Services

CEC­IT is the IT group under the control of the Dean of the College of Engineering and Computing. IT Services reports to the Vice President of Information Technology. CEC­IT supports academic computing within the division, and IT Services supports infrastructure computing and telecommunications.

For most needs, you’ll need to see us, but we may refer you to IT Services if the request could be better met by them.

MUnet

MUnet refers to the Miami University network. Your username is referred to as your UniqueID and is guaranteed unique across all University systems. Your password for most every system is MMDD#### where MM and DD are the month and date of your birthday expressed in numbers (so June would be 06). #### is the last four digits of your social security number.

When you log into web systems, you will be encouraged to change your password and required to change it periodically.

Desktop Systems

Desktop systems are the property of Miami University and their usage must be in accordance to appropriate sections in MUPIM (including 16.5 and 16.6) as well as local, state and federal laws.

Usage is not regularly monitored, but in the course of routine or special network diagnostic work and monitoring or at the request of your department chair, the dean or higher administration, data may be accessed and inspected.

Your system will be configured to download and install anti­virus and operating system patches automatically. Do not disable these settings! Universities are a rich environment for computer viruses and worms and Miami has experienced several campus­wide problems. Protecting your computer protects both you and your neighbor.

Requests for enhancing or replacing your desktop system require the approval of your department chair. Please let him or her know of your needs, but if you would like assistance in defining a need, please let us know.

Remote Desktop

If you need to access your office desktop from home, let us know. Your Microsoft Windows system can be configured to support Microsoft Remote Desktop, which will allow you to access your desktop through a Windows terminal so that you can use software or printers that are in your office.

Software

Many software titles are available at no or reduced cost. All software purchases need to be made through CEC­IT In addition, through an agreement with Microsoft, most titles, including servers, can be downloaded at no charge for use in your office or at home.

Email

All eMail addresses for faculty, students, and staff consist of UniqueID@miamioh.edu. You can look up recipient addresses or change your settings at http://www.miamioh.edu/directory.

Accessing Files

When you login in your office, classroom or lab, multiple drives will automatically map, providing you with space for your data, access to departmental and divisional data, and access to network applications. All data should be stored on your G:\ drive. Please close all files and log out at night to ensure the integrity of your data. Files are backed up nightly, but open files cannot be backed up. The primary purpose of system backups is disaster recovery. Only the last three revisions of a file are retained, and no archives are made (in that you cannot return your data to a certain point in time such as a previous semester). Please perform any additional backups you feel are appropriate, but if you need a file restored, Please contact us as soon as possible to ensure we can recover it. You do not have an individual limit on the amount of data that you store, but if your usage overly burdens the system or if you are concerned about a need, we will work with you to find an optimum solution to your needs.

Some faculty in the past have asked if files are safer on the desktop than the network file server. Although the file server presents a single place of attack, many more safeguards are in place to protect the integrity and security on it than the desktop. Even a desktop computer powered off may be accessible via the network.

To map a drive through Windows, right­click on My Network Places and select Map Network Drive. Select a drive letter and in the location box, type the server and volume name listed below corresponding to the drive you would like (be sure to include all slashes). If you log into this computer using a username other than your UniqueID, click on Logon using a different username/password and enter your UniqueID and MUnet password.

Handouts and Turnins

Electronic distribution of course information and electronic submission of homework is provided through two methods. Handouts and Turnins is the system supported by CEC­IT, comprising a simple set of shared folders. Students can access these folders via their S:\ drive within CEC Simply drop files you wish students to access in the folder with your UniqueID. Handouts are available on the web at http://handouts.CEC.miamioh.edu.

Turnins is create­only to students, which means students can copy or drop files into the folder, but cannot open their files once they are saved. Due to the nature of the process, files cannot be submittedto Turnins by saving directly from most applications, including Microsoft Office, Microsoft Visual Studio, and AutoCAD.

Both Handouts and Turnins are also available via Netdisk. You can find this at https://mymiami.miamioh.edu/group/mymiami/home

From time to time, network disruptions occur, both intentionally and unintentionally. When we become aware of a critical problem, we attempt to notify departmental administrative support staff as soon as possible.

Printing

Each department has at at least one printer. For larger or specialized jobs, you can be configured to print to the IT Services Print Center.

The division’s Xerox can also scan jobs that you can then access from your desktop.

Wireless

Miami University is almost entirely covered by wireless networking (802.11b/g/n), as are some outdoor arCEC.

MU­WIRELESS: A WPA­based (encrypted) connection that requires you to authenticate via your operating system. This varies by operating system and may vary by network card. Please see information in the knowledge base for configuring your system.