Information Technology

This site provides information, training, and support on computer hardware, software and services at Nicholls State University. You will find answers to most of the common problems people encounter while using campus computers, as well as lots of specialized information.

ACADEMIC COMPUTING

Mission

  • Academic Computing supports the mission of the University by providing student and faculty services that assist with all technological aspects of learning in a University environment.

Functions

  • Management of the University Learning Management System (Moodle)
  • Management of the University email for students (GMail)
  • Providing highly available computer labs for students, and assistance for faculty to integrate course materials into the curriculum.
  • Ongoing procedural and educational training of students and faculty.
  • Provide accountability to University and State Auditors, the SGA, and to the?University Louisiana System board.
  • Management and technical support of the compressed video network and VBrick streaming video systems.
  • Provide computing resources to the faculty.

Implementation

  • The managed labs allow students to complete reports and research necessary for course requirements.? We have professional staff and?trained students available to assist?faculty and students in using University computing resources and multimedia classrooms.
  • The technical support of the compressed video network is accomplished by working closely with office of Distance Education.
  • Assessing Faculty and Student Computing needs.
  • Academic Computing hosts web services for the department’s interactive pages.

Building/RmCommentsDeptMacsPC
Peltier 120L&Lit Writing Comp? LabLanguages & Lit26?
Peltier 131L&Lit Writing Comp? LabLanguages & Lit26?
Peltier 165/166Student Help & Training LabDyslexia Lab5?
Peltier 206L&Lit Writing Forgien Lang.? LabLanguages & Lit26?
?????
Polk 125?Student Help & Training LabTeacher Ed Lab2?
Polk 142Student Teacher LabTeacher Ed Lab1414
Polk 137 LRCStudents Learning/Training on WhiteBdsCOE121
Polk 262 Psyc LabPSYC Lab?PSYC Lab4?
?????
Talbot 102MACO Student Use Mini LabMaco Stud Macs2?
Talbot 103MACO LabMaco Lab19?
Talbot 104MACO Radio StationMaco Lab5?
Talbot 106MACO MultiMedia Convergence LabMaco Lab17?
Talbot 107MACO TV Studio Video Editing LabMaco TV Lab19?
Talbot 204Art – Photograph LabArt Photography10?
Talbot 207-AArt – LU LabLU Lab2?
Talbot 208Art – Graphics Art LabArt Adv. Graphics14?
Talbot 211Music Lab w/ Notation & Marching Band?Music Lab18?
Talbot TBDStudent Publications Lab? (Nicholls Worth Mag)NW, Ads, LP20?

Building/RmCommentsDeptMacsPCs
Ellender LibraryStudent UseOpen Lab (Floor)1618

Grant Proposal Form

甘肃快3计划导师Guide sheet to utilizing the Technology Fee and explanation of scoring

Fee Definition and Authority

The Student Technology Fee (Tech Fee) is governed by Act no. 1450 of the regular session and is under supervision by each institution in higher education.? This fee is considered a supplement to current funds allocated by the University and by grants.? In October of 2012, the Nicholls State University Student Government Association voted unanimous approval for the assessment of a technology fee of $5.00 per credit hour, up to a maximum of $100.00 per semester, effective in the Fall 2013 semester. In a memorandum dated July 19, 1999, Mr. Bobby Jindal clarified fee expenditure guidelines that went into effect September 1, 1999.? All Tech Fee requests must follow these guidelines.

Committee Makeup

甘肃快3计划导师Complying with guidelines issued by Mr. Jindal on July 19, 1999, the Student Technology Fee Committee is composed of nine (9) students and eight (8) faculty/staff members giving the students a majority.? Student makeup is composed of the Student Government Association President (or designee) and Vice President, one (1) student from each college, for a total of five (5), and 2 students at large appointed by the SGA President.? The faculty/staff makeup is composed of 1 faculty member from each college, for a total of five (5), one (1) from the library, one (1) from Student Affairs, and (1)1 from Student Life.? The ex-officio members that do not have voting privileges include:? Director of Academic Computing, Chief Information Officer, Member of University Administration, and all Instructional Technology Specialists and Computer Specialists from Academic Computing.

Scoring of proposals

Points are given for each section and represent a weighted average.? Sections with higher point totals indicate sections that are given greater consideration.? Proposals are scored on a cumulative basis and are ranked by the total cumulative score.? Those proposals ranking highest have the highest chance of being undertaken.? The overall constraint is the amount of budget available for projects.? In the event of a tie and only one project can be undertaken, the Tech Fee Committee will determine who shall get funded.

Procedure for Funding

甘肃快3计划导师As per Mr. Jindal’s guidelines, Nicholls State University has instituted a Student Technology Fee Plan.? Line items inserted into the fee plan are composed of proposals from University Colleges, Departments, and the students.

The committee is first required to pass an overall budget that outlines the major categories of expenditures.? In lieu of a Technical Review Committee, Academic Computing serves in this capacity and ranks the technical merit of each proposal and determines whether it fits into the overall plan for technology at Nicholls State University.? If a proposal fits the description of technology, Academic Computing determines whether it is technically sound and whether human resources are available to implement and maintain all current production.

甘肃快3计划导师After the technical review is complete, the proposals are then submitted to the Student Technology Fee proposal subcommittee for consideration.? The subcommittee scoring process usually takes place during November.? The subcommittee makes their recommendations to the full committee where a vote is held to decide which proposals will get funded and for what amount.? Upon approval by the committee, the proposal is inserted as a line item into the Student Technology Fee Plan.? Normally in December, after the vote, the chairperson of the proposal will receive a letter stating the outcome of the proposal.? Minutes of these meetings are kept, which detail the discussion and debates on specific items and of the budget.

Presentation

甘肃快3计划导师The selection subcommittee may request the applicant to give a 5-minute presentation to further explain their proposal.? Applicant will be contacted by Ms. Kim Nannie if presentation is required.

Routing Sheet

Applicants must fill out a routing sheet that has the following signatures:

  • Department head
  • Dean of the College

Proposal Package

The completed proposal request should be turned into the Administrative Assistant for Information Technology, Ms. Kim Nannie, in 156 Peltier Hall, by 2:00 PM on the first Friday of November.? The completed request should be submitted in Microsoft Word format and emailed to Kim.Nannie@nicholls.edu.? Additional paperwork should be included with document including any quotes and/or sources of pricing generated while working on the proposal, especially for specialty items.

Rewarding of Winning Proposals

The money to purchase items awarded is from the current fiscal year’s budget; all attempts will be made to purchase prior to the June 30th purchasing deadline.? However, projects funded should not anticipate delivery or completion prior to the start of the next semester.? Academic Computing will set up a priority and distribution schedule. Completing all projects prior to the beginning of the Spring semester is impossible, as this does not give the staff of Academic Computing the necessary time to order, set-up, and test the equipment along with other time sensitive jobs already scheduled during that time.? If these items are needed in a sensitive timeframe, please discuss with Academic Computing before the end of the semester to determine if it would be possible to be added to the schedule.

Inventory of Awarded Items

Items purchased for funded proposals will become the responsibility of the Department or College of the proposal.? These items will be transferred to the appropriate inventory and any repairs after the end of the warranty period will be the responsibility of the Department or College.? However, these items funded with Student Technology Fees must continue to adhere to the State’s Technology Fee guidelines, as they must be accessible for student use and must not be placed in faculty or staff offices.

How to Print to a Kiosk

Register with WEPA

Nicholls Students: WEPA accounts are automatically created and associated with your myNicholls ID and password. You will login with your same credentials as myNicholls and Moodle .

Other Users: Before printing to a WEPA kiosk, register at . You can also register directly at a kiosk by touching the Register Here button.
*A WEPA account is not required if using a USB drive to print directly from an kiosk.

Print to the WEPA Cloud

Printing from your personal computer: Download the WEPA print drivers from the . Then, click the Print button in your application, select the WEPA printer (WEPA B/W or WEPA Color), and go to a WEPA Kiosk to pick up and pay. All WEPA printing on your computer goes to your WEPA account – keep this in mind if a friend uses your computer.

Printing from a Nicholls computer lab: Most Nicholls computer labs have WEPA print drivers installed, which allows you to select WEPA as the printer. In these labs, click the Print button in your application, select the WEPA printer (WEPA B/W or WEPA Color), enter your WEPA username and password, and go to a WEPA Kiosk to pick up and pay.

Printing using a USB drive at a WEPA kiosk: Press the “Print from a USB” option and insert a USB drive containing your files into the WEPA print kiosk and follow the on-screen instructions.

Printing from anywhere else: You can still print by uploading documents into your . This option works with a limited number of file types including Word, Excel, PowerPoint, and PDF. File size cannot exceed 20 MB.

Release a Print Job

Release Code: After you print from your computer, WEPA will give you a 6 digit release code. You can press the “Release Code” on the screen and you will be directed to that single print job. Select the print job and then select your payment option

Userid Login:甘肃快3计划导师 After you have printed several jobs, you can print all of them at once by logging into your account at the Kiosk and hitting the “Select All” option, and then by selecting your payment option WEPA will print all of the selected jobs.

Here are a few instructional videos about using the WEPA printing kiosks found around campus to print documents. More information about WEPA can be found at .

How to print from a USB thumb drive

How to register for a WEPA Account at a kiosk

How to log in to your WEPA Account at a kiosk

How to login on to download computer print drivers

Direct Print Option

How to use a WEPA release code at a kiosk

甘肃快3计划导师Nicholls State University is now using WEPA as your campus printing solution. WEPA is a flexible solution for printing and offers a much higher quality output. WEPA offers the following advantages:

Accessibility

You can now print from the following locations:

  • Brady Clubhouse – Lobby area, 1st floor
  • Donald G. Bollinger Memorial Student Union
  • Ellender Hall Dorm – Study Lab, 1st Floor
  • Ellender Memorial Library – Room 125
  • Ellendar Memorial Library – Room 244
  • Peltier Hall – Room 136 – Student Engagement Center
  • Polk Hall – 1st floor, LRC lab/Room 131
  • Powell Hall – Room 109

Quality

The WEPA system uses a high quality paper and produces outstanding print quality.

Mobile Printing

You can now send email and attachments to any WēPA? kiosk. Whether you are using the iPhone, Android, or Blackberry you can download the WēPA? “app” from app member’s page and send documents to any WēPA? kiosk.

Coupons and More

Nicholls?will be able to solicit vendor coupons and have them printed on the Kiosks at no charge to the students.

Convenience

Use your Colonel Card or Credit/Debit card.

Have a comment, suggestion, or question about the Nicholls App??Click Here甘肃快3计划导师?to email us, we welcome all feedback !

Mobile App Feedback

TELECOMM & NETWORKING

Nicholls Voicemail Users Guide

甘肃快3计划导师The Nicholls Wireless Network, NSUnwired, is available to all Nicholls students, faculty, and staff. Our wireless network provides all the conveniences of a regular wired connection without the need for cables. As a shared resource, wireless networking is intended primarily to supplement the campus wired infrastructure, not to replace it.

甘肃快3计划导师This site is designed to help wireless users get connected and find up-to-date information on the wireless network. Wireless networking at Nicholls is growing and it is continually evolving.

甘肃快3计划导师If you are having difficulty connecting to the wireless network review the instructions on these pages first, and if you need further help, please call extension 4419.


To connect to the wireless network you will need to have the following items and settings:

  • 802.11b/g/n/ac compliant wireless card
  • Network type: Infrastructure
  • SSID: NSUnwired
  • Encryption: off
  • TCP/IP settings: DHCP

Please note:
甘肃快3计划导师NSUnwired is for student, faculty, staff, and guest access.

802.11a/b/g/n/ac compliant wireless card

You will need an 802.11a/b/g/n/ac compliant card. When purchasing a wireless card, make sure the card is compliant or certified. Some wireless cards are 802.11a only, 802.11b only, 802.11g only, 802.11n only, or 802.11ac only, and some cards are a combination of the standards. If at all possible, choose a card that supports a combination of the three latest standards of 80.11b/g/n/ac. A wireless card that supports all standards will work in all wireless locations on campus. In addition, make sure that you install the latest drivers for compatibility
甘肃快3计划导师and to resolve any issues. Visit the manufacturer’s web site for information about obtaining the latest drivers.

甘肃快3计划导师The Wi-Fi Alliance is a nonprofit international association that certifies wireless products based on the IEEE 802.11 standard. Visit their web site at www.wi-fi.org to find out if your wireless adapter has been certified.

Network Type: Infrastructure

甘肃快3计划导师802.11 defines two types of network: infrastructure and ad hoc. An infrastructure type indicates that your wireless client will connect to the wired network via an access point. Ad Hoc, on the other hand, indicates a type of network where only wireless clients get to communicate among each other. You must use infrastructure in order to connect to the Nicholls wireless network.

SSID: NSUnwired

甘肃快3计划导师SSID stands for Service Set IDentifier, sometimes referred to as Network Name. This is simply a name used to identify a wireless network. An SSID can either be broadcast or hidden. When the SSID is hidden, the user must know what the SSID of the wireless network is in order to gain access. When the SSID is broadcast, the wireless network is available to anybody. The access points on the Nicholls wireless network are configured to broadcast their SSID. While on campus, if your wireless device says that it has found a “New Wireless Network NSUnwired, Would You Like to Connect?”, go ahead and connect. Some wireless adapters will allow you to leave the SSID field blank or enter the word “ANY”. This instructs the wireless clients to obtain whatever SSID is being broadcast by the access point. You can also set the SSID explicitly. If your wireless device fails to auto-detect “NSUnwired” and connect to the Nicholls wireless network, you can enter NSUnwired into the SSID field.

Encryption: off

The 802.11 standard makes use of optional security mechanisms called WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access). Make sure encryption is turned off.

TCP/IP settings: DHCP

There are two ways of assigning an IP address to a network adapter: static or DHCP. Static assignment requires the use of a unique IP address that will only work on a particular subnet and must be entered manually. DHCP (Dynamic Host Configuration Protocol) on the other hand, refers to the automatic assignment of an IP address. No user intervention is required. The only thing the user is responsible for is to set the TCP/IP settings on the network adapter to DHCP.

甘肃快3计划导师Check the list below to see which specific indoor and outdoor areas have wireless coverage.

Wireless Coverage By Building

BuildingLocation within BuildingStandard
Ayo HallFull Coverage802.11 A/G/N
BeauregardFull Coverage802.11 A/G/N
CandiesFull Coverage802.11 A/G/N
CalecasFull Coverage802.11 A/G/N/AC
Century ClubFull Coverage802.11 A/G/N/AC
CulinaryFull Coverage802.11 A/G/N
Elkins HallFull Coverage802.11 A/G/N
Gouaux HallFull Coverage802.11 A/G/N
LedetFull Coverage802.11 A/G/N/AC
Library 1st FloorFull Coverage802.11 A/G/N/AC
Library 2nd FloorFull Coverage802.11 A/G/N/AC
Library 3rd FloorFull Coverage802.11 A/G/N/AC
MilletFull Coverage802.11 A/G/N
Peltier HallFull Coverage802.11 A/G/N/AC
Picciola HallFull Coverage802.11 A/G/N
Polk HallFull Coverage802.11 A/G/N/AC
Powell HallFull Coverage802.11 A/G/N
ScholarsFull Coverage802.11 A/G/N/AC
Shaver GymFull Coverage802.11 A/G/N
Student UnionFull Coverage802.11 A/G/N/AC
Student Union BallroomFull Coverage802.11 A/G/N/AC
TalbotFull Coverage802.11 A/G/N/AC
White HallFull Coverage802.11 A/G/N
ZeringueFull Coverage802.11 A/G/N

Outdoor Coverage

OutdoorStandard
Quadrangle802.11 A/G/N
Student Union Outdoor Seating Area802.11 A/G/N
Library Entrance Area802.11 A/G/N
Talbot Hall Entrance Area802.11 A/G/N
Powel/White Hall Courtyard Area802.11 A/G/N
Baseball Field802.11 A/G/N
Football Stadium802.11 A/G/N

甘肃快3计划导师Nicholls State University provides wireless internet connectivity for Academic and Residential computing. While not flawless, this service is reaching maturity and is seeing few failures due to service provisions.

甘肃快3计划导师Most often, wireless connectivity issues are not due to failed wireless services, but rather the user’s computers. This write-up will discuss several aspects of problematic wireless connectivity; after all, knowledge is power. This article is written for the end-user with MS-Windows based computers in mind; however, other operating system utilities may also be listed.

Low signal strength is often a reason for failed connectivity. Signal strength is often measured in “bars” for simplicity. Five (5) bars is an excellent signal strength and one (1) bar is a poor signal strength. You should be aware that you can still connect with 1 and 2 bars, however you may suffer from slow speeds and possible disconnects. 2 bars although low, will generally not have significant problems. Some computers allow boosting of the internal antenna’s power level. Doing so may allow for more bars. For instructions on this, please see .

When regarding wireless connectivity, terms like “Line-of-Sight”, “Barrier Interference”, and “Electrical Noise” have significant meaning.  Line-of-Sight references a straight line between your computing device and the Access Point.  It is always best to minimize the number of barriers between you and the Access Point.  Barriers include walls and large objects especially metal objects, that may block or deflect wireless signal.  Also, the electrical interference of other electronics such as blue tooth devices, phones, refrigerators, microwaves, and other computing devices can easily interfere with wireless connectivity quality.

Not all hardware providers use the best quality components. It is a simple fact that some built-in wireless adapters are inadequate. Purchasing and using a USB wireless adapter may in fact give you a much better connection than the built-in wireless adapter. Often changing from completely unable to connect situation to a 4 bar connection.

There are also tools available that can assist you with finding better signals. These are often called Wireless (or WiFi) Stumblers and Scanners. If you are an advanced user or are open to experiment, please Google this advanced topic. Stumblers written for Apple OSX often allow you to connect to specific signals found by the utility. OSX based stumblers include , ,, and . Windows based stumblers tend to only display information, albeit very detailed information. Windows based stumblers include, , and . For Linux there is and .

甘肃快3计划导师One last wireless specific issue worth mentioning is regarding Ad-Hoc networks, which is basically other computers advertising wireless signals which are not internet Access Points. A big issue found recently is called Viral SSID’s. This is a host of computers pretending to be Access Points in lure of unsuspecting users to connect to them. Once connected, the user’s computer becomes one of the culprits, thus the term “Viral”, providing persistent advertisements of fake internet services. A very good article can be found . Users should follow to delete or disable Ad-Hoc connections. Do not connect to “HP Setup” nor “Free Public WiFi”.

Another big issue with computers is due to malicious software. , as it is called, can be the culprit of a wide range of computer problems including slowness, crashes, information theft and even network connectivity problems. Often, especially with windows based computers, failing connectivity is due to Malware and excessive background processes.

甘肃快3计划导师In regards to Malware, there are quite a few cleaning utilities available. One of the most-recommended and free for personal use, is a utility called . The free utility will not keep your computer protected in real-time, but it is among the best on-demand cleaners available. It will scan for and clean a vast number of malicious software.

It is also recommended that your Anti-Virus be fully functional and updated for real-time protection. No single anti-virus is 100% effective; however, they do provide a high level of protection. There are several free Antivirus and software suites available. Among the most popular providers are , , , , , and . When installing one of these products, it is prerequisite to uninstall the existing antivirus.

If your computer is known to be infected, may resolve some persistently odd infection issues.

Peer to Peer (P2P) applications, for example, Torrent Clients, etc. are known to diminish both the user’s internet connection and neighbors’ internet connections.  Using these software applications for downloading and sharing files will significantly slow your connection and also slow the connections of others connected to the same access point.  Please refrain from using P2P applications.

I. PURPOSE

The effective management of information technology resources is crucially important to the success of the mission of Nicholls State University. Because of the inherent insecure nature of wireless communication, wireless networks require increased cooperation and coordination between campus entities to maximize the technology’s benefits to the students, faculty, and staff of the University, to allow connection to wireless networks in different campus buildings, and eventually, to facilitate the ability to roam from building to building without losing network connectivity. This document sets forth the policies for using wireless technologies and assigns responsibilities for the deployment of wireless services and the administration of the wireless radio frequency spectrum in a distributed campus network environment. This policy expands the University Computer Use Policy and the Student Computer Use Policy by including specific direction regarding wireless communications and the resolution of issues that may arise. This policy is subject to change as new technologies and processes emerge.

?II. REFERENCES

Student User Agreement Form
Student Wireless Access Form
Student Computer Use Policy
Electronic Email Policy
Lab and Network Usage Policy
甘肃快3计划导师University Computer Use Policy

?III. DEFINITIONS

甘肃快3计划导师Wireless Network means local area network technology that uses radio frequency spectrum to connect computing devices to college, department, or division wired networks and may connect to the Campus Network Backbone and the Internet.

甘肃快3计划导师Access Point means electronic hardware that serves as a common connection point for devices in a wireless network. An access point acts as a network hub that is used to connect segments of a LAN, using transmit and receive antennas instead of ports for access by multiple users of the wireless network. Access points are shared bandwidth devices and can be connected to the wired network, allowing access to the campus network backbone.

Wireless Infrastructure means wireless access points, antennas, cabling, power, and network hardware associated with the deployment of a wireless communications network.

Coverage means the geographical area where a baseline level of wireless connection service quality is attainable.

Interference means the degradation of a wireless communication signal caused by electromagnetic radiation from another source. Interference can slow down or eliminate a wireless transmission depending on the strength of the interfering signal.

甘肃快3计划导师Privacy means the condition that provides for the confidentiality of personal, student, faculty and staff communications, and institutional data transmitted over a wireless network.

Client hardware/software means the electronic equipment and software that is installed in a desktop, laptop, handheld, portable, or other computing device to provide a LAN interface to a wireless network.

?IV. SCOPE

This policy applies to all wireless network devices utilizing Nicholls State University IP space (including private IP space within University networks) and all users of such devices, and governs all wireless connections to the campus network backbone, frequency allocation, network assignment, registration in the Domain Name System, and services provided over wireless connections to the campus network backbone to colleges, departments, or divisions of Nicholls State University.

?V. AUTHORITY

This policy is under the authority and oversight of The Division of Information Technology including the Department of Academic Computing under the direction of the Executive Vice President.? Technical review of this document is under the direction and authority of The Division of Information Technology including the Department of Academic Computing under the direction of the Executive Vice President.

?VI. POLICY

Wireless equipment and users must follow all network connection policies as set forth in the University Computer Use Policy and the Student Computer Use policy. All provisions of the ISO Minimal Security Requirements and Practices apply to this policy.

Interference or disruption of other authorized communications that result from the intentional or incidental misuse or misapplication of wireless network radio frequency spectrum is prohibited.

甘肃快3计划导师Wireless access points must abide by all federal, state, and local laws, rules or regulations pertaining to wireless networks.

Deployment and management of wireless access points is the responsibility of The Division of Information Technology as under the direction of Executive Vice President.

甘肃快3计划导师University colleges, departments, or divisions must register for the use of radio frequency spectrum with The Division of Information Technology including the Department of Academic Computing , prior to implementation of wireless networks.

The location of all wireless access points must be registered with the The Division of Information Technology.

Wireless access points shall require user authentication at the access point before granting access to campus or Internet services. Wireless network interfaces and end-user devices shall support authentication to access wireless networks that allow connectivity to the Campus Network Backbone.

甘肃快3计划导师Physical security should be considered when planning the location of wireless access point and other wireless network components.

Wireless networks must be designed and deployed to avoid physical and logical interference between components of different network segments and other equipment. In the event that a wireless device interferes with other equipment, The Division of Information Technology shall resolve the interference as determined by use priority.

甘肃快3计划导师The Division of Information Technology including the Department of Academic Computing will attempt to resolve any interference or security incidents by coordinating with the registered Point of Contact (POC) for the wireless network. If a POC is not available, the incident is resolved through administration of the network connection to the backbone.

The Division of Information Technology including the Department of Academic Computing is authorized to take whatever reasonable steps are necessary to ensure compliance with this, and other network related policies that are designed to protect the integrity and security of the campus network backbone.

甘肃快3计划导师Disconnect Authorization – Any wireless network on campus, which poses a security threat, may be disconnected from the campus backbone network. If a serious security breach is in process,?The Division of Information Technology including the Department of Academic Computing may disconnect the LAN immediately. Every reasonable attempt will be made to reach the registered “Point of Contact” to resolve security problems. The Division of Information Technology has the authority to disconnect any wireless network from the campus network backbone whose traffic violates practices set forth in this policy, or any network related policy. It is the responsibility of the college, department, or division to be knowledgeable regarding the provision such policies.

甘肃快3计划导师Grievance matters with this policy or conflicts between The Division of Information Technology including the Department of Academic Computing and any University college, department, or student are directed to the Executive Vice President for resolution.

甘肃快3计划导师There are no guarantees that all brands of wireless networking equipment will work on the Nicholls State University network. Currently the only accepted standard is 802.11a, b, and g. These standards are subject to change as new technologies and standards evolve. Please check with The Division of Information Technology including the Department of Academic Computing as to the current recommendations.

甘肃快3计划导师Coverage is limited on campus and there are no guarantees to the amount of coverage on the campus.

INFORMATION TECHNOLOGY

Information Technology

Sam Cagle
Chief Information Officer
985-448-4408
Chris Usey
Security and Identity Management Engineer
985-448-4409
Kim Nannie
Administrative Program Specialist A
985-448-4419

Academic Computing

Perry Lawless
Director, Academic Computing
985-448-4417
?
Nik Dronet
IT Systems Architect
985-448-4439
Ryan Dubina
Instructional Technology Specialist
985-448-4978
Karla Harrison
Instructional Technology Specialist
985-448-4200
Cathy Keehn
Computer Specialist
985-448-4202
Glenn Verdun
Computer Specialist
985-449-7126
?

Enterprise Information Systems

Stacey Latka
Director, Enterprise Information Systems
985-448-4414
?
Claire Shaw
Information Equipment Operator 3
985-448-4410
Darren Adams
Systems Programmer
985-448-4412
Tim Authement
IT Programmer Analyst
985-448-4940
Adam Lamartina
IT Systems Administrator
985-449-7138
Reagan Daigle
IT Client Support Specialist
985-449-7032
?

Network/Telecommunications Support

Slade Besson
Director, Telecom & Networking
985-449-7010
?
Jared Domangue
Network Administrator
985-449-7011
Louis Caro
Telecom Coordinator
985-448-4999
Lucas LeCompte
Network Specialist
985-449-7173

POLICY & PROCEDURE

甘肃快3计划导师Nicholls State University IT policies exist to maintain, secure, and ensure legal and appropriate use of the university’s information technology infrastructure. Security and privacy policies work together to provide the campus community with a high quality, trusted, and secure campus computing environment. They also help protect and secure property interests, data, and intellectual property.

Password Reset Procedure

Various options are available to assist users with changing a forgotten or expired password.? To make the process of resetting your password as smooth as possible, please make sure your personal information and security questions are always up to date in the Banner Self Service system.

myNicholls ID Password Reset Options:

甘肃快3计划导师Changing your myNicholls ID requires access to your Nicholls Google Email Account.? If you are unable to login to your Google Account please see the Google Account Password Reset Options below.

To initiate a myNicholls ID password reset, navigate to the ?and follow the directions.? You will need to provide your:

  • myNicholls ID (ex: ctillou1)
  • Your? Nicholls Email Address
    • Student Example: ctillou1@nicholls.edu
    • Faculty Staff Example: colonel.tillou@nicholls.edu

Once the information is submitted, check your email and follow the instructions in the password reset email to reset your password.

Google Account Password Reset Options:

In the event you forget your Google Account Password you will need to contact IT support using one of the following methods below.? Please be aware you will be asked to provide personal information in order to verify your identity.

In Person

If you are local to the Thibodaux, LA area, please visit the IT Department, located in Peltier Hall room 156 on the Nicholls’ campus.? Present a valid identification card (must contain a photo), such as a driver’s license, state ID, Colonel Card, etc to verify your identity and a member of the staff will assist you with resetting your password.

Phone

甘肃快3计划导师If you are unable to visit in person you may request a password reset via phone at 1-985-448-4419.? A staff member may ask you a number of personal questions to verify your identity. If you are able to successfully validate your identity the staff member will assist you with resetting your identity over the initial phone call.? If you are unable to successfully answer all the validation questions the staff member may provide you with a temporary password to one of the email addresses or phone numbers on file.

Email/Fax

You may send a password reset request via email at itsupport@nicholls.edu?or?via FAX at +1 (985) 448-4421. Your request must contain:

  1. a copy of a valid photo identification card
  2. a signed note requesting your password reset, and?
  3. an alternate email address or phone number where you can be contacted.?

甘肃快3计划导师Once submitted, contact IT Support at +1 (985) 448-4419 to verify receipt of the fax and to reset your password.?

This is a Nicholls State University computer system. This computer system, including all related
甘肃快3计划导师equipment, networks and network devices are provided only for authorized University use.

Computer and Network Policy

This document sets forth the University’s policy with regard to access to and use of computing
and network resources by faculty and staff. It is intended to apply to any computing or network
resource owned, operated, or otherwise provided to users by Nicholls Sate University.

Computer and network users at Nicholls State University are responsible for knowing this
information on the proper, ethical, and legal use of computing and network resources provided
by the University.

This policy does not preclude enforcement under the laws and regulations of federal, state and
local authorities.

The University reserves the right to change this policy in response to altered or unanticipated
甘肃快3计划导师circumstances.

Any questions concerning computing or network policies at Nicholls State University which are
not resolved by this document should be directed to the Associate Provost or the Director of
甘肃快3计划导师Information Technology.

Only persons properly authorized may access the Nicholls State University network or computer
facilities. Proper authorization is provided by authorized staff in the form of an account issued in
the name of the authorized person. Accounts are only issued to individual, not to organizations,
departments or other groups of people.

All faculty and staff are eligible for e-mail accounts; however their data must be correctly entered
into the Human Resources system before their account can be issued, as computer support
staff depend upon the Human Resources system to verify initial eligibility for an account, to
obtain a unique, permanent ID for a user, and to learn of any change of status which signals that
an account should be removed.

A change in active status from the Human Resources system will result in termination of the
account. User accounts for academic and staff personnel will be terminated when the employee
no longer has an active assignment within the University community. Typically such removals
result from employees who resign or are terminated. All dormant accounts, not logged in to the
system for more than six (6) months will be deleted.

Administrative, faculty, and staff user accounts are governed by the department/nit to which the
employee is assigned. This includes access to secure screens within the SCT modules. When
an association with the department ends, that account will no longer be valid and will be
甘肃快3计划导师terminated.

Human Resources is responsible for notifying Information Technology when an employee
terminates employment or moves to another job assignment outside the department/unit.
甘肃快3计划导师All Nicholls State University employees are eligible for computer accounts.

Employee accounts provide access to network and computer system resources.

A password will be assigned with every username. This password must be changed the first
time a user completes a successful log on. The system requires that passwords are changed
every six months. It is the responsibility of the user to change his password when requested by
the computer system. If an employee loses or forgets their password, he/she must contact
Information Technology to have their password reset.

Nicholls State University provides e-mail software to all employees. This is the only sanctioned
software that will be supported by Information Technology.

Email limits are 75mb. Any user account consistently over this limit (over 200mb) will be
flagged; the user notified and advised to reduce their account size to acceptable levels. If the
account is not at acceptable levels within a five day period, the account will be deleted.

Penalties may include loss of access, either temporary or permanent, to Nicholls State
University computing systems and networks. This does not preclude enforcement under any
甘肃快3计划导师applicable local, state, and federal laws.

1.0 Purpose

Nicholls State University email services support the educational and administrative activities of the University and serve as a means of official communication by and between users and Nicholls State University. The purpose of this policy is to ensure that this critical service remains available and reliable, and is used for purposes appropriate to the University’s mission.

2.0 Scope

This policy applies to anyone granted access to a Nicholls State University email account, including, but not limited to, employees, students, student employees, affiliates, contractors, emeriti, and retirees, and includes access to an individual or departmental account in the University email system.

3.0 Policy

Nicholls State University provides? electronic mail (email) services to faculty, staff and students, and to other affiliated classes of individuals, including alumni and official visitors. Use of Nicholls State University email services must be consistent with Nicholls State University’s educational goals and comply with local, state and federal laws and university policies.

3.1 University Email Addresses and Accounts

Faculty and Staff

Email services are available for faculty and staff to conduct and communicate University business. Incidental personal use of email is allowed with the understanding that the primary use be job-related, and that occasional use does not adversely impact work responsibilities or the performance of the network.

With the exception of Retirees, Email services are provided only while a user is employed by the University and once a user’s electronic services are terminated employees may no longer access the contents of their mailboxes, nor should they export their mailbox to a personal account before departure.? Retirees of Nicholls State University are granted lifetime access to Email Services at the discretion of University administration.

Faculty and staff email users are advised that electronic data (and communications using the University network for transmission or storage) may be reviewed and/or accessed by authorized University officials for purposes related to University business. Nicholls State University has the authority to access and inspect the contents of any equipment, files or email on its electronic systems.

Students

Email services are available for students to support learning and for communication by and between the University and themselves. The services are provided only while a student is enrolled in the University and once a student’s electronic services are terminated, students may no longer access the contents of their mailboxes.

Student email users are advised that electronic data (and communications using the University network for transmission or storage) may be reviewed and/or accessed by authorized University officials. Nicholls State University has the authority to access and inspect the contents of any equipment, files or email on its electronic systems.

Alumni and Others

Individuals with special relationships with Nicholls State University, such as alumni or official visitors, who are neither employed nor enrolled at Nicholls State University, are granted limited email privileges, including an email address, commensurate with the nature of their special relationship. Nicholls State University is free to discontinue these privileges at any time.

3.2 Prohibited Use

The Nicholls State University email system shall not to be used for the creation or distribution of any disruptive or offensive messages, including offensive comments about race, gender, hair color, disabilities, age, sexual orientation, pornography, religious beliefs and practice, political beliefs, or national origin. Employees who receive any emails with this content from any Nicholls State University employee should report the matter to their supervisor immediately. Violation of Nicholls State University policies (including this one) may result in disciplinary action, up to and including termination. Examples of prohibited uses of email include:

  • Intentional and unauthorized access to other people’s email, including sharing of account passwords.
  • Sending “spam”, chain letters, or any other type of unauthorized widespread distribution of unsolicited mail;
  • Use of email for commercial activities or personal gain (except as specifically authorized by University policy and in accord with University procedures);
  • Use of email for partisan political or lobbying activities;
  • Sending of messages that constitute violations of Nicholls Code of Conduct.
  • Creation and use of a false or alias email address in order to impersonate another or send fraudulent communications.
  • Use of email to transmit materials in a manner which violates copyright laws.
  • Users are strictly required to delete spam, chain, and other junk email without forwarding.

3.3 Security and Privacy of Email

Nicholls State University attempts to provide secure, private and reliable email services by following sound information technology practices. However, Nicholls State University cannot guarantee the security, privacy or reliability of its email service. All email users, therefore, should exercise extreme caution in using Nicholls State University email to communicate confidential or sensitive matters.

4.0 Monitoring

Nicholls State University students and employees shall have no expectation of privacy in anything they store, send or receive on the company’s email system. Nicholls State University may monitor messages without prior notice. Nicholls State University is not obliged to monitor email messages.

5.0 Enforcement

Anyone found to have violated this policy may be subject to disciplinary action, up to and including suspension of access to technology resources or termination of employment. Students may be referred to Student Affairs for discipline. A violation of this policy by a temporary worker, contractor or vendor may result in action up to and including the termination of their contract or assignment with Nicholls State University.

Revised: 09.2019

General Policies

Lab Environment.? It is expected that all computer labs will maintain a quiet, library-like atmosphere so the patrons can use their time productively and with few distractions.? Although students are sometimes required to work in groups for some class projects and need to talk among themselves, this must be done in a controlled manner.? If there are groups in the lab doing projects, enforcing the quiet policy may be more difficult, but still needs to be done.? In addition, groups of students are not allowed to remove chairs from operational workstations in order to gather around one computer.

Academic vs. Personal Use.? Patrons may use the computers to check e-mail and to browse the Internet for personal use as long as computers are available for academic use.? If computers are needed for academic use, patrons doing personal work will be asked to leave.

Student Accounts.? All students are required to use their own student account in order to use any academic computer lab. All students are expected to safeguard their accounts and not divulge their passwords.

Entrance Policy.? A Nicholls Faculty/Staff/Student ID is required for entrance into all open labs (Cenac, WAC, and Ayo). No exceptions will be made.

Lab Assist WorkStation甘肃快3计划导师.? The lab assist workstation is to be used only by the lab assistant on duty. Only lab assistants are allowed behind the lab assist desk.? Visitors or Computer Lab patrons are not allowed.

Audio Distractions.? Listening to the radio, cassettes, or audio from CDs, with or without headphones, in any lab is strictly prohibited.? The only exception is with regard to multimedia software on multimedia computers directly assigned by a Faculty member.

Food, Drinks, Tobacco Products甘肃快3计划导师.? No food, drinks, or tobacco products are permitted in the labs at any time.

Telephones甘肃快3计划导师.? The phones are not for the use of the general public or patrons except in emergencies or to call for a ride (especially after dark). All cellphone are to be turned to quiet mode while in the labs.

Game Playing甘肃快3计划导师.? Game playing is not an appropriate academic usage of university resources and is prohibited in the academic computer labs.? Anyone playing computer games in an academic lab will be required to discontinue the activity or vacate the lab. Further disciplinary action will be taken as deemed appropriate.

Excessive Network Usage.? Playing real-time video or audio that is not directly assigned by a Faculty member is not an appropriate academic usage of university resources and is prohibited in the academic computer labs.? Anyone playing real-time video or audio not directly assigned by a Faculty member in an academic lab will be required to discontinue the activity.? Further disciplinary action will be taken as deemed appropriate.

Patron composition.? No children shall be allowed in any of the academic computer labs, as these labs are considered an “extension of the classroom.”

Lab Printing Policies

All student printing is now done through the WEPA (Wireless Everywhere Print Anywhere) system. ?Instructions for using the WEPA system can be found here :

Computer Supplies.? Under no circumstances will any Patron be allowed to leave with supplies.? Supplies are to be handled only by ITS employees.

Safety Policies

General Policy. Patrons are to help maintain a safe environment in the computer labs by not placing their book bags in the aisles.

Accidents.? In the case of accidents that result in injury, regardless of how insignificant the injury may appear, patrons should contact the lab assistant immediately.

Unsafe Actions.? Patrons shall not engage in any unsafe actions like horseplay or fighting. Patrons engaging in such unsafe activities will be asked to leave, or University Police will be called.

Alarms甘肃快3计划导师.? Patrons should be able to recognize and evaluate the situation in relation to all alarms.? If a fire alarm goes off or a bomb threat is reported, patrons will be asked to immediately stop working, to gather belongings, and to evacuate the lab immediately. Everyone must remain outside until told by someone in charge that it is safe to re-enter the building.

General

Nicholls State University has a specific policy that governs the use and abuse of the university’s resources.? Students granted access to the university’s computing facilities are required to abide by the established policy for computer use.

甘肃快3计划导师The Computer Use Policy is a comprehensive policy dealing with aspects of computer abuse, whether physical or logical.? It applies to all university computing facilities mainframes, minicomputers, microcomputers, and associated equipment and links, as well as software, whether developed by Nicholls or purchased.? If abuse, actual or threatened, is suspected or detected, the matter will be referred to the appropriate law enforcement agency or university or authority for disciplinary action.? Confirmed abuse can result in criminal prosecution, dismissal, loss of computer use privilege and other such remedies as provided by established laws and policies of the university.

In general, abuse is defined as any improper use or treatment of computing facilities including, but not limited to, acts which, by mischief or gross negligence, result in physical damage, defacement, or destruction of computing equipment; theft; unauthorized access or use; unauthorized alteration, substitution, or deletion of programs, command files, data files, documentation, or other material; wiretapping or any form of unauthorized signal interception; divulgence of confidential information or computer access methods to unauthorized persons; copyright or patent infringement; transmitting statements which are obscene or libelous according to law through or with computer systems; failure to safeguard computer systems in both their physical and logical aspects; and failure to notify management or security personnel of instances of abuse, either actual or threatened, or conspiracy to commit any of the above.

Terminology

  • User — Any employee, student, or other individual to whom computer access is granted.
  • Computer equipment — Computer processors, memory, peripheral devices, communication links, communication equipment, supply lines, storage media, or any terminals, printers, modems, or any other ancillary equipment or devices connected to or in any way used in conjunction with the mainframes, minicomputers, microcomputers and word processing units owned, leased and/or operated by Nicholls State University.? This is extended to include analog as well as digital devices.
  • Software — Computer source and binary programs or modules, including intermediate or universal code, whether for system or applications use, command files, menu formats, and on-line manuals used with “help” facilities.? This is extended to include firmware.
  • Computer Facilities — Computer equipment and software, as defined above, considered as an entity.

Physical Damage

甘肃快3计划导师Acts which, by mischief or negligence, result in damage to, defacement of, or destruction to computer equipment maintained by Nicholls State University.

Theft

The unauthorized use or taking for one’s own personal use of computer equipment or software.

Software Copyright Restrictions

  • The use of computing equipment or communication facilities to make unauthorized or illegal copies of proprietary software or in any way to infringe upon copyrighted or patented material of any nature.
  • NOTICE: WARNING OF COPYRIGHT RESTRICTIONS.? The Copyright Law of the United States (Title 17, US Code) governs the reproduction, distribution, adaptation, public performance, and public display of copyrighted material.
  • Under certain conditions specified by the law, nonprofit libraries are authorized to lend, lease, or rent copies of computer programs to students on a nonprofit basis and for nonprofit purposes.? Any person who makes an unauthorized copy or adaptation of the computer program, of redistributes the loan copy, or uses the loan copy for monetary gain, or publicly performs or displays the computer program, except as permitted by Title 17 of the US Code, may be liable for copyright infringement.

Software Tampering

Unauthorized alteration, substitution, or deletion of programs, command files, data files, documentation, or other material is illegal.? This shall include the use of Trojan horses, spoofs, computer viruses (as defined in the common literature), or any other device, material, logical or physical, to obtain these ends. This also includes the use of computer facilities to gain unauthorized access to systems external to Nicholls and use of command files to add to, delete or modify any education record as defined by the FERPA.

Negligence

By design or neglect allowing computer logos, passwords, encryption keys, or any other access methods to be obtained by unauthorized entities is illegal. This includes failure to safeguard computer equipment in both their physical and logical aspects from abuse. Further, this includes the failure to notify management or security personnel of instances of abuse either actual or threatened.

Unauthorized Use of Data

Using sensitive or confidential information with which one is entrusted for personal gain or interest; dissemination of such information, or by design or neglect allowing unauthorized access to or use of such information.

Improper Use

Using the electronic mail or other communication facilities to transmit statements of an obscene, libelous, or threatening nature as defined under current judicial definitions.

Use, Rights, Privileges

The University’s computing facilities are provided for the use of students in pursuing the ends of academic endeavors.? By keeping in good standing with the University, a student will be allowed computing privileges.? These privileges entail certain rights to privacy and security.

Responsibilities

甘肃快3计划导师It is the student’s responsibility to ensure that his/her account password is kept confidential. If abuse or threatening messages occur due to allowing other students to access the account, the student who owns the account will be held accountable. Students are charged with special responsibilities for safeguarding the facilities with which they are entrusted. Failure to adequately and conscientiously safeguard these facilities from misuse will subject a student to being denied access to and use of the facilities. Furthermore, any damage to or infringement of copyrighted material or confidential data resulting from negligence may additionally subject the student to disciplinary action commensurate with the loss including dismissal or legal prosecution in accordance with University policies and local, state and federal laws.

Physical Damage, Abuse, Theft, and Logical Abuse

甘肃快3计划导师Acts of physical damage, abuse, and threats of such abuse will be handled in accordance with previously established procedures including criminal or civil prosecution and discipline under the University Code of Student Conduct, where applicable. Logical abuse, such as copyright infringement, software piracy, alteration of accounting, academic, and other databases for personal gain or mischief, plagiarizing, gaining or permitting unauthorized access, and the like will be handled in accordance with applicable criminal, civil, or university procedures.

甘肃快3计划导师Acts of abuse which constitute a violation of local, state, or federal criminal or civil statutes will be referred to the appropriate law enforcement agencies. Nicholls State University, at its discretion, will pursue whatever legal and University avenues it deems necessary for achieving reparations.

Academic Dishonesty

Using the computer to gain unauthorized access to instructional material for personal gain or profit, or to gain unauthorized access to another student’s assignments, or for the purpose of sharing work in an unauthorized manner will be considered a violation of the University’s Code of Student Conduct. In addition to the sanctions provided under that policy, a student may also be denied access to computing facilities and be subject to other legal or academic discipline as appropriate.

Copyright Infringements

甘肃快3计划导师All students should recognize that information obtained through electronic methods may be protected by copyright laws of the United States (Title 17 U.S. Code), the Digital Millennium Copyright Act (H.R. 2281), and the World Intellectual Property Organization (WIPO).? As such, any student in violation may be prosecuted under the terms of the law.? It is the student’s responsibility to understand the laws pertaining to copyright infringement.? A guide of how the law affects a student will be made available in the Library and in the Office of Academic Affairs.

BANNER 9

甘肃快3计划导师Oracle will soon be ending support for Oracle Forms 11gR2, which is utilized by our Banner 8 system. The upgrade delivers a number of important enhancements, including a modern user interface, enhanced navigation and process management tools, and new functionality across the student platform. It will also allow us to run Banner on any browser and on mobile devices. There is no need to learn a new application, ?just the new interface.

?Benefits of Banner 9

  • Banner has a new look and feel that is similar to a webpage.
  • Forms will be referred to as pages.
  • Ability to find pages by description.
  • Form names are not changing.
  • Mobile and tablet friendly.
  • Improved filtering options on a page.
  • Expand and collapse sections in a page.

CLICK HERE TO DOWNLOAD PRINTABLE PDF

The following keyboard shortcuts have changed from Banner 8 to Banner 9:

ActionBanner 8Banner 9
More InformationALT+HCTRL+SHIFT+U
Next Block or SectionCTRL+Page DownALT+Page Down
Previous Block or SectionCTRL+Page UpALT+Page Up
Open Menu DirectlyF5CTRL+M
Select on a Called PageSHIFT+F3ALT+S
Rollback or Clear PageSHIFT+F7F5
PrintSHIFT+F8CTRL+P

The following keyboard shortcuts are new to Banner 9:

ActionBanner 9
Submit WorkflowALT+W
Release WorkflowALT+Q
Expand/Collapse a Drop-down FieldALT+DOWN ARROW
Change MEP ContextALT+SHIFT+C
Open Related MenuALT+SHIFT+R
Open Tools MenuALT+SHIFT+T
Last PageCTRL+END
First PageCTRL+HOME
Page Tab 1
Page Tab 2
and so on…
CTRL+SHIFT+1
CTRL+SHIFT+2
and so on…
Sign Out (Application Navigator)CTRL+SHIFT+F
Display Recently Opened Pages (Application Navigator)CTRL+SHIFT+L
Open Search (Application Navigator)CTRL+SHIFT+Y
Toggle??for current sessionCTRL+B
Toggle Multi/Single Records ViewCTRL+G
Open Help (Application Navigator)CTRL+M
Open Menu (Application Navigator)CTRL+Y
ExportSHIFT+F1

The following keyboard shortcuts?remain the same?from Banner 8 to Banner 9:

ActionBanner 8 and 9
EditCTRL+E
Cancel Page, Close Current Page, Cancel Search/Query, or ExitCTRL+Q
Down/Next RecordDOWN ARROW
Choose/SubmitENTER
Duplicate ItemF3
Duplicate Selected RecordF4
Insert/Create RecordF6
Search/Open Filter QueryF7
Execute QueryF8
List ValuesF9
SaveF10
Next Page DownPAGE DOWN
Previous Page UpPAGE UP
Count QuerySHIFT+F2
Clear One RecordSHIFT+F4
Clear All in SectionSHIFT+F5
Delete RecordSHIFT+F6
Previous Field/ItemSHIFT+TAB
Next Field/ItemTAB
Up/Previous RecordUP ARROW

Bookmarks and Favorites?
For quick access to Banner 9, please bookmark the website. The website is the central location for all Nicholls State University single sign-on compatible applications.

Query Mode Sticking

If you see a “query mode only” message in a Banner page you should be able to make entries to, try exiting to the menu. ?Accessing a page from?another page often results in the restrictions or permissions from the initial page “following” you.

甘肃快3计划导师NOTE: You must be logged in to your @nicholls.edu Google account to view this video. You can login through YouTube.

ONLINE SUPPORT

?甘肃快3计划导师– Submit tickets for various technological issues. You may also request new user accounts and eQuotes. The Helpdesk website is only accessible on-campus by faculty and staff users.

?– Manage and change your myNicholls ID password.