Skip Navigation
Text:
Increase font size
Decrease font size

    Working with Computer Services

    — filed under: ,

    Policies and guidelines for part time staff working with Computer Services

    Reviewed by Bil Hays 08/25/2012

    General Requirements

    • Be prompt for your shift. If you can't be on time, or can't come in for whatever reason, send email to facil-fulltime@cs.unc.edu to let us know that you are running late or are unable to make your shift.
    • We have a magnetic white board we will be using to keep track of who's here and who's not. You are required to mark yourself in when you come it to work, and mark yourself out when you leave. If you need to leave SN130/SN122 to run an errand or complete a task that will take more than about 15 minutes, you need to put where you're going and the time you left on that board.
    • Conduct yourself in a professional manner when dealing with any user. This means being polite, prompt and thorough. It is perfectly ok to tell someone you don't have an answer to their question, but make sure to tell them you'll get someone to follow up on their issue.
    • We use remedy to track the work we do. Be sure to check your Remedy tickets and email during every work shift since these are primary forms of communication. Keep your Remedy tickets up-to-date, if you need to leave before completing a ticket you've started to work on, make sure you update the work log with information on what you've done so far.
    • If you don't have any work to do, ask one of the other staff for something to do. Playing games or hanging out on social media sites during work hours is not appropriate. If no one can come up with something for you to do, straighten up the shop or SN130, or read through the computer services web pages to learn something new or correct typos/errors.
    • Do not leave a machine logged in with the superuser password.
    • If you have completed all your assigned tasks, please speak to your supervisor to receive additional assignments.
    • Be thorough and attentive to all tasks, no matter how simple they may appear.
    • If you have questions about how things are to be done, ask!

    Training

    At some point, you'll be working with student data protected under FERPA. Please go to ITS' training page and take the FERPA online training course.

    You also need to go take the EHS workplace safety training and successfully complete that course.

    When you're done with each of these, email bil to let him know that you completed a course.

    Scheduling

    Bil schedules the student staff, so please make sure to keep him apprised of your class schedule.  Also, we keep the student schedule in the departmental Google calendar, that calendar is Comp. Svcs. Student Schedule.  Logging into the department's google space is a bit non-intuitive, as the ID you use to log in is your CS email address (eg. userid@cs.unc.edu).  Once you are logged into Google, you can add this calendar to your list.  Please keep your schedule current--if you are going to be out or late, please indicate that in the calendar.

    Reading Help Mail

    Part of your duties will be to read the help email.  The help mail calendar is online at Google, please add this to your departmental Google account by using the button at the bottom right of that page.  You will likely have multiple shifts, and it is important to know when you are scheduled so we do not take too long to respond.  Our goal is to get back to clients in less than thirty minutes.

    Please read through the procedure for reading help mail, it is very important to follow this so we can present a consistent interface to clients and not get in each other's way.

    If you can't get to help mail during your shift because of conflicting duties, please let Wayne, Bil or Brian know.

    Attire

    We're very casual about dress, but you do need to wear shoes that cover your feet, and sometimes you will get dirty, as you will be moving furniture and other fairly heavy items on a regular basis. Sneakers or boots are fine, but sandals and flops are not appropriate.

    Logging In

    Logging in to a PC Workstation

    PCs are located throughout the department to facilitate work.  See this list of public workstations, and student staff have computers in SN130.

    When you sit down at a machine press "ctrl+alt+delete" to bring up the login prompt.  Type in your login and password and then click "OK".  You will see a standard Windows environment loading on the machine.

    Logging out of a PC Workstation

    To log out of a PC, press "ctrl+alt+delete". Then select to "Log Off".  This will end your session without shutting down the machine.

    Logging in to a UNIX Machine

    Your Windows login and password will work on all our UNIX systems.

    Your new account has been initialized with standard environmental files that should allow you to log in on any machine.  Regardless of where you log in, you will share the same home directory and the same system mailbox.  In other words, you can access your files in the same way across all machines.

    To log in on any machine, first login to a PC, then open the ssh software (We use Secure CRT and OpenSSH within the department.) to ssh to that machine.  Enter your login at the login prompt and press <Return>, then enter your password at the password prompt and press <Return>.

    Logging out of a UNIX Machine

    To log out of a UNIX workstation, type "exit" or "bye" at the prompt.

    Password Changes

    To change your CS Windows and UNIX password, use the http://www.cs.unc.edu/webpass page.  To change your password on campus systems, go to http://onyen.unc.edu/ and click on "Manage password".

    Your Electronic Mail Address

    Your electronic mail address is login@cs.unc.edu, where login is your CS Department login.  Our default is to forward your mail to your campus account.  Alternatively, we can set up an account for you on the department's Google server if you want to receive mail there, but keep in mind that you only keep this account as long as you are employed by the department, a Comp Sci major, or taking a course.

    Windows software you should be familiar with

    • Remedy. UNC uses Remedy as a problem tracking system, see the ITS Remedy page for details.  In particular, you will watch the CS Students group's tickets, as that is where we will queue up tasks for students.
    • SecureCRT. This is an ssh terminal application that is part of the standard installation.  Use this to connect to Linux servers.

    Unix Software you should be familiar with

    • vi. The defacto standard text editor for unix systems, we use vi to edit configuration files.  ITS has a good introduction to vi, and there are a number of cheatsheets online, see this pdf.
    • ssh. The command line terminal program used to connect to remote machines.
    • sftp. The command line file transfer program.
    • bash. The most popular shell for unix is bash.  The shell provides the command line interface to unix systems, and you should be familiar with basic operations in bash. See this introduction for the basics.

    Hardware

    As a student employee, you will spend much of you time working in SN128 (a.k.a. "the shop"), setting up new machines and tearing down old ones.  Whenever a machine is dropped off in the shop (or moved from one room to another!), you must fill in a move form for that machine.  We also check out equipment to CS affiliates from time to time.  If you do loan something to someone, make sure that you log that on the checkout list, which hangs on the wall in SN130.

    Also, we have materials considered potentially hazardous in the shop. Please familiarize yourself with how we handle Material Safety Data Sheets.

    Proper Handling of Equipment

    You'll be moving a lot of hardware.  Here are some guidelines:

    • Always carry computers upright.
    • Be careful not to press too hard on the front of the computer because blank drive bezels can be pushed into the machine.
    • Be careful when loading and unloading computers onto and off of a cart. The cases of most PCs are made of plastic and can be damaged.
    • Remove a computer’s plastic case with care;  don’t ever force the case back into place, or you might break the case’s tabs.
    • Most cable connectors are keyed and will plug in only one way. Don’t ever force a cable;  this will usually result in a bent or broken pin in the connector. When unplugging cables, grip the connector instead of pulling the cable out by the cord.
    • Laptops are very fragile, so take special care when handling them. The cost of repairing a dropped laptop can be very high.
    • If in doubt about how to handle something, please ask a full-time staff member.

    Proper Electrostatic Discharge Procedures

    Some of the most difficult problems to diagnose on computer hardware are caused by static electricity damage.  You can harm a component even though you, yourself, have felt no voltage.  As little as 3 volts can damage a chip so that it will only partially work.  This is why proper electrostatic discharge procedures are so important.  Mike Stone has a video that explains things in detail;  feel free to ask him to let you view this tape if you want to know more.  You can avoid many problems, however, by using these few simple procedures:

    • When removing or installing adapter cards, always wear an anti-static wrist strap. These are located in drawer D1 in the gray metal cabinet in the shop.
    • If you ever need to remove an adapter and do not have an anti-static strap, make sure the computer is plugged into the wall and touch the metal on the power supply to ground whatever static electricity has built up in your body.
    • If you have to transport an adapter card, place it in a static bag, which you will find in the shop.  These are usually kept in a box below bench number 4 or in the lower right-hand drawer of bench number 3.
    • When installing or removing an adapter card, always handle the card by the metal mounting bracket and the end of the card.  Never touch the gold contacts on the edge connector.

    See also
    Preparing machines for Surplus or Transfer

      Security

      See the security collection for detailed information.

      Sensitive Data

      You will likely have to deal with some sensitive data as part of your duties, please review our document on sensitive data.

      Video security system

      The Department has a video security system installed which records the images from video cameras stationed at various locations around the building.  The following guidelines are in effect for use of the recordings:
      The viewing is done only in response to a legitimate reason, e.g., a theft.
      The recordings are viewed only with approval from the Chairman or the Associate Chairman.

      Building Access

      Access to the building is limited except between 7:30 a.m. and 5:30 p.m. on weekdays.  At other times, except for special occasions, the doors automatically lock, and you need an access card to enter the building.  Please note that you should not hold the door open for someone waiting outside the doors unless you are certain that they have a card of their own (and for some reason do not have it with them).  If someone forces his way past you, please report this to the Campus Police at 962-6565 (or just 911).
      Faculty and staff access cards provide access to the Machine Room (122).  Since the equipment in the machine room is very valuable, and since there is a whole lot of electric power running under the raised floor, please do not bring food and drink in the room.  When machines are being worked on, there might be tools and equipment in the room, so please be careful.

      Keeping An Eye Out

      If you see someone you don't recognize lurking around the building, ask if you can help them.  If you see someone walking toward the door at night with a PC under his arm, observe what is happening, and call Campus Police (962-6565) or yell "Stop, thief!" if this seems appropriate.  Do not try to stop someone yourself, just make note of what's happening and contact an appropriate authority.
      Document Actions