Blue Book 2015

From ITwiki

Revision as of 16:29, 18 July 2011 by Eshaw (Talk | contribs)
Jump to: navigation, search

Contents

BLUE BOOK: CLASS OF 2015

Please note that this physical copy of the Blue Book included the most recent documentation available at the time of printing. The most updated version of this book—featuring anchors for easy navigation and full textual links for learning more about topics only touched on in the documentation—can be found at www.stevens.edu/itwiki.


Information Technology:

Information Technology provides services to the campus including the Help Desk, UniPrint printing, the PC Computer Lab, computer sales and repairs, training, myStevens, Campus Domain accounts, VPN, and the Online Card Office. Student user services are available at the Computer Center, which is accessed through the doors to the left of the main Library entrance, in the lower level of the Library building. Systems and servers are normally available twenty-four hours a day via both the campus network and remote access. Contact Information Technology (at 201.216.5500 or submit a ticket at www.stevens.edu/helpdesk) if you have any issues with your MacBook, its connectivity to the network, your email, or other related issues.

Information Technology: An Overview

Information Technology has five main functions: User Services, Networking, Systems Administration, Computer Purchases, and Repairs. User Services includes Help Desk staff available to answer questions about your access to computing services, software, and network applications. The Networking group is responsible for the campus network and internet connectivity. System Administrators/Programmers maintain the operating systems and server applications.

Information Technology Service Hours

User Services – Help Desk & PC Computer Lab

    Monday through Thursday - 8:00 AM to 10:30 PM

    Friday 8:00 AM to 7:30 PM

    Saturday - 9:30 AM to 5:00 PM

    Sunday - 12:00 PM to 7:30 PM


Administrative Offices

    Monday through Friday - 9:00 AM to 5:00 PM


Computer Service Center

    Monday through Friday - 9:00 AM to 5:00 PM


Information Technology is closed on school holidays and some Saturdays and Sundays. Check the Information Technology Events Calendar or Information Technology Home Page www.stevens.edu/it for closing. In case of inclement weather, please check the Stevens Home Page for closings and delays, or call 201.216.8200.

Help Desk [201.216.5500 | stevens.edu/helpdesk]

Consultants are available to assist you with questions related to software on your MacBook and most Stevens systems including myStevens. Consultant coverage is scheduled so that you can reach a consultant most days (including weekends and evenings). Consultants will create a Help Desk Ticket, provide you with its reference number, and help track your resolution. Whenever possible, mention your reference number when contacting the Help Desk.


Before Calling the Help Desk...

  • Attempt to restart your machine (if possible) and see if this solves your problem.
  • For a password related issue with logging into myStevens or the Campus Domain:
    • Attempt to log in again
    • Ensure that the caps lock key is not on
    • Go to the website www.stevens.edu/password
  • Check the online help within OS X and/or your applications, and the www.stevens.edu/itwiki.
  • Record any and all error messages as accurately as possible, and be ready to provide the exact application, service, or machine make/model with which you are having difficulties.
  • About a server or system being down, please verify that the issue is not unique to your machine.


The Stevens ITWiki is edited and maintained by the Information Technology Help Desk staff. The wiki contains documentation on a wide variety of issues and protocols, and is available to students. For more information, go to www.stevens.edu/itwiki.

Computer Service Center [201.216.5108 | stevens.edu/csc]

Located in the lower level of the SC Williams Library, the CSC handles sales of Stevens issued MacBook peripherals, accessories and printer supplies.

  • If your MacBook is not functional, you can take it to a certified Apple Repair Center. You can find one near your location by visiting the following website www.apple.com/buy/locator/service.


The Computer Service Center maintains a vending machine with accessories, such as printer ink cartridges, ear buds, flash drives, and Ethernet cables. Only Duck Bills are accepted by the vending machine.

Managing your MacBook

You are responsible for your MacBook, its data, and its operation on the network. It is your duty to keep your MacBook in an operational condition at all times. Replacement or repairs of most parts are covered under a manufacturer’s warranty until 30 June 2012. An extended warranty is available for purchase at: store.apple.com/us/product/MD012LL/A.

Accidental damage protection can be purchased at www.safeware.com/Products/EducationCoverage.aspx. Please take care of your MacBook. Having it in proper working condition is an academic requirement. You should use the provided book bag or a protective case at all times when carrying your MacBook.

Virus Protection

Virus protection is mostly about being aware of your computing environment, how you are using the internet, and keeping the operating system and virus protection software current. Always be cautious!

Some general rules of thumb:

  • Do not open email attachments from unknown senders or run any application files (.pkg, .app, .exe, .bat, etc.) included in an email.
  • Inspect all links (and ask their "sender" if they intended to send a link) sent via Instant Messaging Clients such as AOL Instant Messenger and Yahoo! Messenger. These may be the result of a rapidly spreading bug which will instant message itself to your entire buddy list.
  • Do not click on (Pop-Up or Pop-Under) Ads indicating that you have a virus, spyware, or malware, or that you could win a prize.
  • Read all dialog boxes before clicking “Yes” as some of these may be asking you for permission to install unwanted software.
  • Information Technology will never send attached files via email. If use of a file is required, users would be redirected to either myStevens, the ITWiki (www.stevens.edu/itwiki), or the Information Technology Webpage (www.stevens.edu/it).
  • Before entering credentials into a website, be sure to check the web address (URL) to prevent Phishing, which is an attempt to gain your password to a popular site (such as eBay, Amazon, PayPal, MySpace, or Facebook). Only authenticate yourself on sites with addresses you know are genuine. Using myStevens as a gateway to Stevens Authenticated web resources is a good way to ensure a Stevens link is genuine.

Always check the web address (URL) of a website accessed via a link before typing in any sensitive information. Just because a link in an email looks like a given site does not mean that you will be going to that site.

Connecting to the Campus Network

Wired Connections

  • Every dorm room is wired with one computer network outlet per resident.
  • Laptops distributed to incoming students are both 802.1x compliant and have their MAC addresses registered to work on the campus network.
  • In order to connect, simply plug the network cable provided with the Ethernet connectors in your room.
  • If you bring to campus a computer or other device that is not compliant with the 802.1x standard (game consoles, older operating systems, etc.), you will have to register its MAC address . When using non-802.1x enabled ports, generally located within offices and research labs, any device must have its MAC address registered regardless of its 802.1x compliance.
  • Should you wish to connect multiple machines to the Campus Network via your wired port in the residence halls, you may use a switch as long as all your devices either support 802.1x or have their MAC addresses registered. You can optionally use a consumer (NAT) router, and one device behind the NAT router will have to authenticate. Bear in mind if you choose to connect multiple machines to the network, neither a switch nor NAT router is officially supported by the Help Desk and for troubleshooting purposes you will be asked to remove the intermediate device and plug directly into the wall. For more information on these policies, contact the Help Desk or refer to www.stevens.edu/itwiki/routers.
  • In addition, all machines must be DHCP enabled. A machine that is not DHCP enabled will not be allowed on the network and may result in traffic on the port being suspended.
  • You may connect up to five (5) machines concurrently to one network port in campus residences.
  • Treat the network cable with care. Pinching it, bending it tightly, continually walking on it or rolling over it with a chair will permanently damage the cable.

If you do not get a network connection, first unplug and re-plug your network cable, both from the wall and your PC. If you still do not get a network connection try swapping ports with your roommate if he or she is properly connected to the network. If you are having issues with multiple machines connected to a switch or router, remove the intermediate device and try connecting just one computer to the port. If this does not help, call the Help Desk at 201.216.5500. You may be asked to bring your notebook and the Ethernet cable to the Help Desk to test both in a properly functioning network outlet.

Wireless Connections

Wireless access is provided in the dorms. However, connectivity is not guaranteed due to interference from other appliances such as microwaves, cordless phones and Bluetooth as well as other devices using that unregulated frequency spectrum. Use the campus connectivity map (found on www.stevens.edu/it/wireless) to determine the wireless signal strength from the location where you wish to connect. The wireless network technology supported by all access points on campus is 802.11g, newer access points support 802.11a and 802.11g and the newest access points support 802.11n on both 2.4 GHz and 5 GHz frequencies, 802.11a, and 802.11g.

Network Names:

  • Stevens Student: a wireless networks that requires the 802.1x authentication protocol in order to connect.
  • Stevens Guest: a wireless networks that uses web page authentication, instead of 802.1x.
  • Stevens: a wireless network for non-student users; students will not be authenticated on this network.

Your notebook is configured to use the 802.1x Wireless Network. Should you need to configure an additional device, instructions for configuring 802.1x are available on the ITWiki at www.stevens.edu/itwiki.

MAC (Media Access Control) Address Registration

The wired and wireless adapters’ physical (MAC) addresses for Stevens provided notebooks are registered as they are distributed to entering undergraduate students.

VPN (Virtual Private Networking) Connections

A VPN connection is used to encrypt all or part of your Internet traffic or to access services that are only available via the Stevens campus network when you are not on campus. Instructions for configuring VPN are available at www.stevens.edu/itwiki/w/index.php/VPN.

Unauthorized use of the network and systems is not allowed. Connection logging and network sniffing by authorized personnel may be in effect when system security or integrity is in question. By using the network, you expressly consent to such logging and monitoring and any resulting legal actions should your activities violate Stevens Policies or State or Federal Law. Use of the network implies consent with all Stevens Acceptable Use Policy.

Acceptable Use Policy

Stevens Institute of Technology expects that all persons who make any use of computing hardware, software, networking services, or any property related or ancillary to the use of these facilities will abide by the following policy statement:

Information Technology resources are provided in the hope that the community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.

All hardware, software, and related services supplied by Stevens are for the sole purpose of supplementing and reinforcing the institution’s goals as set forth in the student and faculty handbooks and mission statement. We expect that no one will use hardware, software or services without authorization to do so. There has also been increasing concern over legal issues when using electronic communications. There are already laws that prohibit the following:

  • Electronic libeling or defaming another person
  • Sending/Posting messages that incites hate or discontent
  • Transmitting repeated unwanted sexual advances
  • Falsifying information via impersonation
  • Unauthorized use, providing, or copying protected intellectual property.


While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must in accordance with Stevens’ rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:

  • Posting or transmission of confidential or classified information.
  • Using offensive or discriminatory language.
  • Transmission of any graphic image, sound or text that is sexual in nature.
  • Giving account passwords to individuals who are not the owners of such accounts.
  • Obtaining passwords to or using accounts other than one’s own.
  • Using resources for personal profit or gain.
  • Harassing, threatening, or otherwise invading the privacy of others.
  • Initiating or forwarding email chain letters.
  • Causing breaches of computer, network or telecommunications security systems.
  • Initiating activities which unduly consume computing or network resources.


The following actions are required:

  • The MAC (physical address) of network devices must be registered online via Web for Students, in person with the CSC, or the user must authenticate with a valid username and password.
  • Members of the campus community must maintain their computers with virus protection, spyware protection, and operating system updates.


To ensure the lawful and ethical use of electronic communications, rights to privacy when using electronic communications at Stevens Institute of Technology are limited. Stevens reserves the right to monitor electronic messages and information stored on computers owned by Stevens. For example: email, web pages, conference contents, and voice mail, are subject to archiving, monitoring or review, and/or disclosure by others than intended recipients.

Failure to comply with the terms of this policy will be met with disciplinary and/or legal action.

General Information

myStevens and Email [[[stevens.edu/myStevens]]]

myStevens is a portal through which you can access Information Technology resources including email, Student Web Self Service (Web for Students), course communication tools, or access any courses which your instructors support with a virtual classroom. The myStevens URL is www.stevens.edu/myStevens. If you have forgotten your myStevens password, you may be able to reset it at www.stevens.edu/password, or if not call or email the Help Desk and a new password will be given to you upon verification of your identity. You may also go to the Help Desk in the Computer Center at the Lower Level of the Library to request a new password.

You can check your Stevens email via myStevens or any of a number of Desktop Mail Clients such as Mac Mail and Thunderbird. You are given 100MB of storage space and may send emails of up to 25 MB (text and attachments) with an attachment limit of either 20MB or 10 files, whichever comes first. This email address will be terminated within months after your graduation from Stevens. After graduation, but before termination, you may contact the Alumni On-Line Community, where you may establish email forwarding for life (username@alumni.stevens.edu).

It is recommended that you use myStevens Webmail to check your email from off-campus. If you choose to use an application such as Mac Mail or Thunderbird, be aware that some Internet Service Providers (ISPs) may not support SMTP protocols, although you may use a VPN connection if that is the case. Documentation for Mac Mail is on the ITWiki website at www.stevens.edu/itwiki/w/index.php/Mac_Mail and VPN documentation is at www.stevens.edu/itwiki/w/index.php/VPN.

Computer Labs

• The PC Room at the Computer Center (Basement of SC Williams Library) • The Schacht Lab (3rd floor Kidde Building, Room 350) • The Media Arts Center (MAC Lab) (2nd floor Morton Building, Room 201) • The Unix Lab, (1st floor Burchard Building, Room 127) Each department sets hours of operation for its own lab and determines who has access. Check with the department running each lab if you have any questions. Links to these labs websites and hours are online in the ITWiki version of this document.

Available Software

In order to view and download available software, you need to map a network drive. Instructions on “How to map a network drive” can be found on the ITWiki. Please be aware that these programs are licensed to Stevens for academic and educational use only and generally may not be installed on machines not distributed by Information Technology.

The Copying of licensed software, also known as “pirating”, is prohibited both by the terms of the License Agreement(s) and federal copyright law(s). Use of all software on campus must be in accordance with the Acceptable Use Policy.

Practices to Avoid

• Chain mail of any kind is not tolerated on the Stevens network. If someone sends chain mail to you, please report this by forwarding the message exactly as it was sent to you to Information Technology [abuse@stevens.edu] and no other addresses. DO NOT pass these emails across the Stevens network. • Mass mail is also unacceptable on the Stevens network. If you have an announcement you need to communicate with the entire Stevens community, please inform Student Life [studentlife@stevens.edu] and they will issue an announcement through myStevens. • All national and international copyright laws must be observed while on (and off) campus. Sharing and downloading music, photos, video, programs or any other data in an unauthorized fashion and without the consent of their owners with peer2peer programs such as LimeWire, eDonkey or others, or via torrents and/or servers is illegal and could result in legal disciplinary action and/or disconnection of your computer from the Stevens Network. You are not prohibited from obtaining legally distributed music and video; please visit www.stevens.edu/legalcontent for a list of legal and safe sites. • Do not register domains and have them point at Stevens Servers. All Stevens-owned domains must be obtained with Information Technology assistance. Contact the Information Technology Help Desk staff for more details. • You may not use Stevens servers to develop commercial web content or for any commercial use. Personal web pages are permitted as long as they abide by the Acceptable Use Policy. • You may not relocate your own notebook or desktop machines to other locations on campus. Student machines are to remain in residences, except when being used in areas with public notebook ports such as classrooms, The S.C. Williams Library, Hayden Lounge and wireless access points. Your machines may not be permanently moved to any academic or administrative building. • The internet is an electronic method of communication and therefore every piece of information sent and received could potentially be logged somewhere. Your actions reflect not only on the Stevens community, but ultimately on you; keep all actions online in accordance with our Acceptable Use Policy and any and all applicable laws. • Don’t assume that your email is entirely private. Like a postcard mailed via “snail mail,” every person--or in this case, system--could potentially read it. Stevens reserves the right to inspect your email, as well. • The best place to keep personal files on the network is in your personal space. All files in the public_html directory are visible to anyone who uses the internet, and access is not restricted to the Stevens Network. Create a secure password and don’t tell anyone! • Users not running DHCP (for any reason), will not be allowed on the network. It is the user’s responsibility to understand these conditions and be aware of any network authorization changes. Users must maintain their systems accordingly. Users whose authorized addresses have changed, but whose systems are not running DHCP, and therefore have not reflected the change will be considered to be in violation of the network policy.

MacBook Pro i7 Information & Policies

The following section covers questions and policy answers to Frequently Asked Questions about Stevens Institute of Technology’s Mobile Computing (Notebook Computer) Program.

Distribution Contents

During Orientation, the school provided you with a MacBook Pro i7. This MacBook is yours to use as long as you progress towards your Stevens degree, but must be returned or purchased if you withdraw or are withdrawn at any time prior. This package contains:

• MacBook Pro i7 15” • HP Deskjet 6940 Printer • 14’ Ethernet (network) cable • Power Pack and AC Cord • Backpack • Optical Mouse • 2 m USB Cable • Documentation o Class of 2015 Blue Book o Yellow Sheet (Notebook Setup Wizard; Tech Specs and Useful Links) o Purple Sheet (802.1x) If any of these were for some reason not included in your package, please contact the Helpdesk immediately so that we can correct this error.

Things To Know

• Your MacBook will not be upgraded during your tenure at Stevens. You will not be provided another MacBook before graduation. However, you will be able to keep your MacBook upon graduation from Stevens. • Keep your MacBook battery charged and in your MacBook. It takes about four hours to initially charge your MacBook’s battery. DO NOT COMPLETELY DISCHARGE YOUR BATTERY. • If your MacBook is not functional, you can take it to a certified Apple Repair Center. You can find one near your location by visiting the following website www.apple.com/buy/locator/service. • Stevens-provided MacBook’s have registered wired and wireless network cards and are authorized for two network addresses. In addition, you may register one additional desktop network card for use in your dorm room and one additional wireless MAC address.

Loss, Theft, and Return

Loss or Theft

You must immediately report the loss or theft to the Stevens police, if the loss or theft is on the Stevens Campus. If not, you should file the report with the local Police. There is a $500 deductible which is your responsibility. The Computer Service Center will instruct you on the payment procedures. Upon arranging for the deductible payment and providing the Computer Service Center with the Police Report from the jurisdiction where the loss occurs, the student will receive a replacement notebook unit that is the same, or as close to the same as possible, as the missing unit. Replacement terms and conditions are subject to change and based on the Stevens policies in effect at the time of the loss or theft.

If the computer is lost or stolen more than once, the student is required to purchase a unit that is the same as the missing unit at a price to be determined by the Computer Service Center. Insurance only applies to the first unit distributed.

Withdrawal or Leave of Absence From Stevens

You have the option of returning the MacBook and accessories or purchasing them. If you decide not to purchase the MacBook and peripherals devices, they must be returned during the semester of separation from Stevens in good condition as defined by the Computer Service Center. Should you decide to purchase the equipment, the price will be based on the number of semesters you attended Stevens Institute of Technology as a full-time undergraduate.

Before the end of the first year, the purchase price is $2,700. After one-full year, the purchase price is $2,200; after the second full year, it is $1,700; after the third full year, $1,200. There is no charge after the fourth full year. This charge does not reflect the market value of the MacBook and peripheral devices but rather a portion of the cost of this program. The Dean of Undergraduate Academics will make the determination of the number of years as a full-time student at the time of separation from Stevens Institute of Technology.

Students granted a Leave of Absence by the Dean of Undergraduate Academics may be permitted, upon approval by the Dean to retain the MacBook for a maximum of one year. Students who do not re-enroll at Stevens to complete their studies prior to the expiration of the one year Leave of Absence period will be required to immediately return the MacBook, or purchase it at the purchase price in effect at the time the Leave of Absence was granted. Students who fail to return or pay for the MacBook computer by the end of the Leave will be charged $425/semester for each semester, or part thereof, they keep the MacBook, even if it is returned after the initial one-year period.


Send comments to helpdesk@stevens.edu

Personal tools