Managing Public Access Computers

Document Sample
Managing Public Access Computers Powered By Docstoc
					Managing Public Access Computers
Best Practices

Lori Bowen Ayre LBAyre@galecia.com 2006

Agenda
Role of Public Access Computing in the library  Configuration and Management  Computer Life Cycle: purchasing and retiring your computers  Staffing and Budgeting


Getting to Know You
Name  Library  # of Public Access Computers  # of IT staff  Your role with the PACs


Role of Public Access Computing in the Library

Who are using the Public Access Computers in the library and what are they doing?

Top Ten Uses of Library Computers
1. 2. 3. 4.

5.
6. 7. 8. 9. 10.

Email family and friends Write/print report Learn about a medical problem Learn about local events Write or print resume Find a job Do homework Review alternative new sources Find transportation info Get info about voting issues

Source: The Impact of Public Access Computing on Rural and Small Town Libraries (January 2003) and People from Low-Income Families Disproportionately Use Library Computers (October 2002) available from http://pacp.evans.washington.edu/reports.html

What is the library’s role in computer and information literacy?

What Does It Take to Have An Ideal Public Access Computing Environment?


Library open enough hours and adequate number of PCs available
PCs configured and managed for public access Staff trained and available





Library and PCs Available


Library open enough hours


PACs always available during open hours



Enough computers to serve your population



Provide wireless Internet access for people with laptops


inexpensive way to increase Internet and OPAC access

PCs Configured and Managed for Public Access
 Minimally
 Make  Make  Keep

restrict workstations but protect patron and library
PCs as much like a regular PC as possible system easily recoverable systems standardized and current

Staff Trained and Available


Have trained technical support staff available at all times Reinforce need for core computer competencies among all staff who work with the public Provide technology training programs for public





Best Practice
Library computers should serve as tools for accessing digital information and for increasing the user’s computer literacy

Exercise 1
Evaluating Public Access Computing at Your Library

Configuration and Management

Library Users Should be Able to…


Use the Internet
 

download documents or forms use Web-based email

     

Access electronic library resources Use productivity applications Access right-click menus View and access files from a CD Save to or access files from a USB storage device Change
 

screen resolution and contrast sensitivity of mouse and size of cursor

Users Should NOT Be Able To Access…
 

Files on the library’s network Files on the local computer other than the files in My Documents A file from an external device without the file being virus scanned Any information from a previous user





Configuration Styles


Fort Knox.
  

no right clicking certain menu items hidden cannot save files or use external drives items inconsistently disabled may or may not be secure privacy issues no features disabled reboot sets everything back to square one



Loosey Goosey…







Ideal for All!
 

Fort Knox


  

Often the work of skilled technicians who don’t get useful feedback from staff working with the users Computers stay functional 99.99%, but patrons cannot do anything considered “risky” Patrons can’t do things they expect to be able to do, so their computer experience not “real world” Usually locked down to avoid problems for tech staff but doesn’t necessarily protect users

Loosey Goosey…
Happens when technicians are not skilled enough or not given enough time to do a good job  Items are inconsistently locked down so it is annoying to patrons



e.g., one can right-click in one program but not another



Privacy usually not adequately protected

Ideal For All!


Virus scanning software protects computer and network Drive protection software protects the hard drive configuration




configuration is restored upon reboot



user can change things during their session, but changes are erased upon reboot



Time and session management software avoids fist-fights with other users

Ideal Configuration Steps
1. 2. 3.

Install the OS and patches Identify and remove unwanted features Install all necessary hardware and software and resolve conflicts this creates Tweak the OS and apps to optimize user experience Test with staff and adjust based on feedback Save it to an image so system can be easily duplicated and recovered Roll-out images to other systems Train staff in system recovery and basic troubleshooting (three hours)

4. 5. 6.

7. 8.

Cloning (and Profiles)


What is Cloning?
  

duplicating a desktop configuration from one computer to another “network profiles” accomplish the same goal requires identical hardware platform saves time for setup eliminates the need to troubleshoot Ghost and PartitionMagic



Benefits
 



Products that can be used for cloning




Most libraries have several “images” to support

Comparison of Setup Time: Pay Now
Setup Time Expertise Needed How Computers 2-5 are setup Cost to setup 5 Computers

Right

9 hours

Engineer at Ghosted $100/hour (half hour each – 3 hours) Technician at $50/hour

$1200

Wrong

5 hours

Installed $1050 by hand (4 hours each – 16 hours)

Comparison of Maintenance Time: Pay Later
Maintenance Expertise Time/Year Needed Right 4 hours How Most Problems are Fixed Cost to Setup 5 Computers

Technician Re-image at (30 $50/hour minutes) Engineer Try to at figure out $100/hour what went wrong

$ 200
$2000

Wrong

20 hours

Benefits of “Doing it Right”


Fewer problems because adequate testing has been done up front
 

configuration satisfies users’ needs programs play nicely together Low-level tech or staff person can restore image without needing to call in high-priced engineer to troubleshoot more computers available more of the time staff can focus on library--not computer--service



Easy and fast to get a computer back on line




Better service for customers






More cost-effective

Best Practice
Use some kind of cloning process for duplicating and restoring desktop images

Gates Staying Connected Survey
Do you have the ability to "clone" the software on your library desktops?
 

Yes, we clone all of our desktops using Ghost, standard user profiles, or some other process: 75 We clone all of our staff desktops but not the public access computers: 3 We clone all of our public access computers but not the staff computers: 18 No, we configure each new PC individually: 42 I don't understand this question: 12 Other, please explain: 52



  

Exercise Two
Your Current Public
Computer Configuration

Software Tools That Help
Anti-virus  Anti-spy/anti-ad  Privacy protection  Session management  Disk security  Print management  Remote control software


Anti- Virus/Spyware/Ad/Popup


All these “anti” software products must be kept current
 

require a subscription computer must be configured to get updates automatically and frequently (weekly if not daily) anti-Virus: Norton Antivirus, McAfee Viruscan, ZoneAlarm anti-ad and anti-popup: ZoneAlarm, StopZilla, AdAware, InfoWorks Popup Free anti-spyware: Spyware Doctor, ZoneAlarm, StopZilla, InfoWorks SpyStopper



Example products
  

Privacy Protection


Users create files each time they use computer
   

cookies browser history recently used documents temporary files



Privacy protection software clears out these files when
  

browser is closed, or shutdown or startup, or timed intervals Webroot Window Washer, InfoWorks History Sweeper See Session Management products



Example Products
 

Session Management Software


Wide variety of capabilities, may include



  



authenticating user protecting privacy of users ending sessions without requiring staff intervention reservation-making module overall control of all public PCs timer for each individual PC Envisionware PC Reservation Fortres Time Limit Manager CMS Diginet PC Cop Cybraryn Session and Time Limit module Pharos Systems SignUp



Examples:
    

Disk Security
 

Users are unrestricted while using the computer System restored upon reboot to original configuration
 

Any changes user made are undone Any files users left behind are erased Centurion Technologies Drive Shield Centurion Technologies Centurion Guard (hardware) Faronics Deep Freeze Fortres Clean Slate



Examples:
   

Print Management





Reduces number of printers needed Allows for better control of print jobs Gives users more print options
 

color vs. B&W laser vs. deskjet

 

Can include or integrate with cost recovery systems Example products
 

Envisionware LPT:One Pharos UniPrint

Remote Control Software


IT staff can remotely

 

perform routine maintenance
troubleshoot help users



Examples
  

WebEx Symantec PCAnywhere CybraryN Library Computer Remote Control module

Microsoft Shared Computer Toolkit
Free for licensed XP owners  Provides many of the modules available in other commercial public access computer systems  Grown-up version of “PAC Installer” used on original Gates machines

More info: http://www.microsoft.com/windowsxp/sharedaccess/

Exercise 3
Exploring Configuration Solutions

Computer Life Cycle

Why Not Keep Them Going As Long As Possible?
    

Increased costs for maintenance and support Must keep bigger inventory of replacement parts More models for support staff to master More versions of software to support The older the machine, the harder to keep it in service Source: Consortium for School Networking (cosn.org)



Scheduled Replacement Cycle
 

Four-year replacement cycle is reasonable
Computers can be replaced in batches instead of all at once



Build computer purchases into operating budget

Best Practice
All computers should be on a scheduled replacement cycle

Gates Staying Connected Survey
Are your computers part of an ongoing replacement cycle? (208 reporting)
    

All library computers are on a scheduled replacement cycle: 88 Only staff computers are on a scheduled replacement cycle: 10 Only public access computers are on a scheduled replacement cycle: 1 None of our computers are on a scheduled replacement cycle: 47

Other, please explain: 62

Standardizing
Reducing variation saves time and money  Same hardware platform allows for

 

same software versions ability to clone less expertise needed by staff fewer patches to keep track of



Same operating system means
 



Same applications on each PC mean



fewer variations of software conflicts to resolve fewer software products to learn

Best Practice
Standardize on hardware platform and software selections

Upgrades Worth Doing In a Pinch
1.
2.

RAM
Hard Drive

3.

Video Card (rarely)

Purchasing New Computers
  

What do your users need? What would help your support staff? What standards must you comply with?



What features are needed for functioning in library environment?
What features will make management and support…more manageable?



PC Purchasing Suggestions
    

Buy computers designed for businesses. not home Buy new or refurbished for the warranty (3 years) Consider premier support so your staff has quick access to help Consider having image pre-installed by manufacturer Get quiet machines

Best Practice
Buy business class computers with three-year warranty and good support

Exercise 4
Planning for Replacements and Upgrades

Acquisition Steps
1. 2. 3. 4.

Define needs Create specs document Get bids Compare alternatives and negotiate with vendors

Bids, Quotes, and Negotiation
You can always get a better price (or better system) than the first offer  Include everything in the bid process






hardware software services



Allocate enough time for the entire process

Best Practice
Even if you don’t do a formal RFP process, define specs and get quotes

Alternatives to Standard PCs


Turnkey solutions
 

all software provided by and maintained by vendor example: Smart Access Manager (SAM), CybraryN
software centralized on a server users have keyboard and monitor only example: Veicon Technology software centralized on a server can be completely maintained by vendor users have keyboard, monitor, USB drive, dedicated video card



Thin client
  



Userful
  

What products are you using and how are they working?

Exercise 5
Preparing Your Elevator Talks

Staffing and Budgeting

Staff Training
All staff should meet CLA’s Technology Core Competencies  Staff supporting users should be trained to

 

train the public use the software and hardware in library networking desktop configuration troubleshooting



IT staff need generic IT training
 



Do you have enough IT Staff?


More IT staff needed when
    

outlets are spread apart geographically lots of applications and operating systems are supports systems are not stable users demand sophisticated help computers are old and breaking down remote control tech support is possible systems are well-configured and stable users are not as demanding computers are not more than 3-4 years old and are well-maintained



Fewer IT staff needed when
   

IT Staff Calculator


Tool to help determine how many full-time IT staff your library needs based on number of:
   

staff, patrons, branches, minutes between branches, networks, servers, self-check units , catalog-only PCs, multipurpose PCs, staff PCs, printers, operating systems supported, ILS modules, subscription databases, other databases (e.g. Active Directory and ILS) desktop images maintained http://galecia.com/libraries_resources.php



Available from
 

Disclaimer: The Library IT Staff Calculator was created by Lori Ayre, not Infopeople and not the Gates Foundation (although it is now available on WebJunction)

Tech Support Guidelines
 

Make sure lower-cost tech staff provide bulk of support Provide clear support request process
 

one beeper number everyone knows to call, or one person at branch who handles support requests deploy new, standardized hardware use “centralized, “mature” processes for software deployment re-image computers each year to remove anomalies introduced each year



Reduce need for support
  

Source: Consortium for School Networking “Taking TCO to the Classroom”

Gates Staying Connected Survey Q1
Have you integrated the support of public access computers into your basic library operations and budget?
1) 2)

Support is integrated with library operations and is part of the general budget: 99 Support and budgeting for public access computers is covered with a combination of special funds and regular funding: 23 Support and budgeting for public access computers is covered with special funds as it becomes available: 4 Support is handled by the county or city: 24 We have a contract with an outside vendor who supports all of our computers: 5

3) 4) 5)

Best Practice
Integrate support of computers into library operations and budget

Gap Analysis


What do you think about your public access computing program today? What can you improve relatively easily (low hanging fruit)? What are the big hurdles? What would you like to see next year – vis-à-vis public access computing at your library?



 

Exercise 6
Goals and Objectives


				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:6
posted:11/9/2009
language:English
pages:64