Adobe CS6 Master Collection:
Photoshop Extended CS6
Acrobat X Pro for Creative Suite
Flash Professional CS6
Adobe Premier Pro CS6
After Effects CS6
Adobe Audition CS6
Adobe Prelude CS6
Media Encoder CS6
Cisco Jabber C 10.6
Cisco VPN Client (enables secure access to remote resources)
Endnote X7 (research/bibliography software)
Respondus (Exam creation and management)
Sanako Student Recorder
GC has implemented the use of Infocus LiteShow4 branded as Technology Enhanced Collaboration (TEC) on the wall control in the classroom. TEC allows several devices to connect.
TEC is available in the following classrooms:
A&S 115,138, 140, 165, 167, 236, 238, 240, 242, 251, 270, 272, 274, 275, 336, 338, 342, 348, 364, 366, 368 and 370
Atkinson 106, 107, 108 and 109
Ennis Hall 20, 105 and 217
Health Sciences 202,207 and 300
Herty Hall 249, 250, 252, 304 and 308
Kilpatrick 125, 224, 226 and 227
West Campus 101
How to Encrypt a File:
Encryption is "the real deal". When encrypted the file is converted into undecipherable bits and bytes and cannot be used or re-assembled without the proper password. If you forget the password or consistently put a typographical error in the password and cannot replicate it later, the file is forever rendered useless unless and all contents are lost. There is no "administrator over-ride" to recapture the file. Please use it carefully and cautiously.
When trying encryption for the first time it is suggested that you try this with a temporary/example file. Any type of document will suffice and can be encrypted; text, word, spreadsheet, pdf, etc.
- When in Windows (not in Word, etc.): Right click on the file. It should bring up a drop-down menu.
- Towards the top, perhaps 1/3 of the way down the list you should find AxCrypt. If it's not there (most PC's on campus have it, but there are a few that don't) please contact Serve (email@example.com or x7378) to have it installed.
- Click on AxCrypt; it'll give you your options. The main 3 are up top:
- Encrypt: This will encrypt the file you're working with. Type the password twice and press the OK button. Depending on the size of the file it should take no more than a few seconds to encrypt. Your file will be renamed with a .axx extension. You will need the AxCrypt software to decrypt this file.
- Encrypt a copy: This will make a copy of your file and encrypt the copy (leaving the original unencrypted). Type the password twice and press OK. The new file with the .axx extension will show up. It's the encrypted file. The recipient of the file will need AxCrypt to decrypt this file.
- Encrypt a copy to .EXE: This should be used when the recipient doesn't have AxCrypt. This will make a copy of your file, encrypt the copy, and imbed self-extractable code in the file so that when the proper password is entered it will decrypt automatically.
To Decrypt a File:
There are two main ways to decrypt a file. If you prefer to auto-launch your application software by double clicking on the file, it will know that the file is encrypted. You'll be prompted for the password, and once successful the file will be decrypted in memory (while the original is still left encrypted) and your application will be launched. If it's a word document, when you double click on the file you will be prompted for the password and then afterwards Word will load with your document. Look carefully, the encrypted version is still there.
The second and main way to decrypt the file is to simply right click, choose AxCrypt from the drop-down menu, and now the first option up top is to Decrypt rather than Encrypt. Choose Decrypt, type the password and press OK. The file will be decrypted.
The Higher Education Opportunity Act (HEOA) includes provisions to reduce illegal sharing of copyrighted material through peer-to-peer (P2P) file sharing. HEOA requires institutions to:
- Make an annual disclosure to students that the illegal distribution of copyrighted material may subject them to criminal and civil penalties and describes the steps the institution will take to detect and punish illegal distribution of copyrighted materials
- Certify that the university has developed plans to effectively combat the unauthorized distribution of copyrighted material including the use of one or more technology-based deterrents
- Offer legal alternatives to illegal file sharing to the extent practical
- Identify procedures for periodically reviewing the effectiveness of the plans to combat the unauthorized distribution of copyrighted materials.
Georgia College uses a wide variety of methods to inform students about copyright laws, including:
- Each year the Office of Information Security at Georgia College sends out an email to all student email accounts regarding copyright laws and campus policies related to violating copyright laws.
- All students are required to adhere to practices stated in the “General Acceptable Use of Technology Policy”. All residential students must also adhere to the practices stated in the “RESNET Acceptable Use Policy”. Both policies are published in the GC Policy Manual and posted on the University’s website.
Plan to Combat Unauthorized Distribute of Copyrighted Material
Georgia College uses several technology-based deterrents to combat the unauthorized distribution of copyrighted materials, including:
- GC utilizes Packet Shaping that allows the campus to ensure smooth flow of content to and from the internet with the ability to prioritize traffic based upon need or policy. This technology also allows for Dynamic Partitioning which gives the network administrator the ability to isolate large bandwidth users and abusers. When a high-bandwidth consumption is observed, the user is contacted to ensure that the purpose of usage is legitimate.
- GC limits identifiable P2P traffic to only a very small percentage of the overall network capacity making it slow enough to be a deterrent.
- GC blocks all known illegal P2P traffic.
- GC’s policies and procedures concerning HEOA and copyrighted material are published on the University’s web site. If the University receives a complaint that a user is redistributing copyrighted material, the user’s Internet access will be blocked until the complaint is resolved. If the University receives continued complaints about a single user, the user’s Internet access will be blocked and they’ll be referred to the University disciplinary system for appropriate action.
Alternative Sources for Material
There are many legal sources to obtain copyrighted material such as music and movies. They have a wide range of business models; some are free and some charge a nominal fee. The Motion Picture Association of America (www.mpaa.org) maintains an up-to-date list of legal sources for this material.
Beginning in 2012-2013 and periodically thereafter GC staff will survey faculty, staff, and students to assess the extent to which our anti-piracy messages are reaching them.
iPad & iPhone E-mail Settings
Use the Exchange option:
Domain: gcsu.local (optional)
Password: your email password
Description: user preference
Click Next and allow time for the system to update.
NOTE: There are several options in the account settings about the number of days for mail sync. Please select the best one to fit your needs.
For technical assistance, please contact the Serve Help Desk at 478-445-7378
OneDrive Secure Storage
Microsoft's OneDrive secure storage will be a new feature available to our faculty and staff. OneDrive will provide 25 GB of secure storage for your documents. IT staff are currently working with Microsoft to provide this feature.
Here's a couple of points to keep in mind.
Number of items that can be synced
You can sync up to 20,000 items in your OneDrive for Business library. This includes folders and files.
You can sync up to 5,000 items in other SharePoint libraries. This includes folders and files. These are the libraries that you find on various SharePoint sites, such as team sites and community sites.
Size limit for syncing files
In any SharePoint library, you can sync files of up to 2 gigabytes (GB).
Character limit for files and folders
These limits apply to files and folders that you add to a synced library folder for uploading to SharePoint.
File names can have up to 128 characters.
Folder names can have up to 250 characters.
Folder name and file name combinations can have up to 250 characters.
The following characters in file names aren't supported when you sync OneDrive for Business with SharePoint Online:
Additionally, a file name that begins with a period (.) or a tilde (~) isn't supported.
This page is dedicated to "going green." Most of these suggestions will assist with less waste in the environment, but many will reduce toner use and paper, which will provide cost savings too. Some tips, like Green Print, will require a little more time up front but will result in a more efficient retrieval of the information since you eliminate unnecessary pages.
We are interested in receiving any comments, suggestions or tips you would be willing to share. Please send these to IT Feedback.
Paper and ink saving suggestions:
Using the "Print Selection" option is an easy way to print only what you need. Highlight the text you want to print and use the selection option. If you need to save a resource but don't require a paper copy, select Adobe PDF as your printer. This will provide a PDF file you can save for future use.
Ideas for saving power
Information Technology recommends that computers not in a lab environment should be shut down and monitors turned off at night, over the weekend or when on leave. Employees who remote into their computers should turn off their monitors. Remote access applications require the computers to be on.
IT recommends turning printers off at night, over the weekend and when on leave.
IT reminds users to help save power and prolong the life of the projectors to turn projectors off when not in use. On units with a remote, press the power button on the remote and confirm "power off" when prompted and on wall control units, simple press "display off." For assistance with any of these suggestions, please call our Serve Help Desk at 478-445-7378.
Technology Support Services will provide technology quotes for faculty and staff wishing to purchase technology for university business. As required by Board of Regents policy, the CIO must review all technology purchase request prior to processing. To receive the a current quote for desktop, laptop (Dell or Apple) or to have quote created for other technology components, please send your request to firstname.lastname@example.org with the details of the what you wish to purchase. You will receive a response within one business day Monday - Friday.
If you need to speak with someone concerning a technology quote, please contact Serve at 478-445-7378.
Voice over Internet Protocol (VoIP) telephones provide quicker resolution for technical issues in the classroom and provide immediate access to Public Safety. The phone features two buttons: Serve and Public Safety. This initiative was funded by the
Student Technology Fee.
Press either the Serve or Public Safety button respectively for a speaker phone call. If you lift the handset, you will automatically be connected to the Serve. To privately contact Public Safety you will need to press the button first and then lift the handset. The dial pad is disabled as the classroom phones are in a closed system using the Georgia College network. Contact Serve for more information at Serve@gcsu.edu or call 7378.