Friday, November 15, 2019

UPDATE: Thomas Hall - Network Outage

UPDATE: As of 2:50pm, we were able to restore the wireless network for APs located on the third floor only. The remaining APs will stay offline until the replacement equipment has been received. We apologize for this inconvenience.

UPDATE: As of 12pm, all critical phones and computers in Thomas 3rd floor has been reconnected. ITS has put in a ticket with our vendor to have the original network equipment replaced. Wireless and any remaining connections that are currently down will stay down until we have the replacement equipment.

UPDATE: As of 10:50am, all POS registers should be online. ITS is working on phones and high priority computers in Financial Aid office.

UPDATE: As of 9:45am, the temporary network equipment is in place. ITS is slowly migrating connections from the old equipment to the new equipment. We are prioritizing the POS registers, cameras, and phones at this point. Things will start to come online, but slowly.

UPDATE: As of 9:00am, it has been determined that a piece of network equipment has failed. ITS is currently in the process of bringing a new piece of equipment to Thomas Hall to temporarily replace the old one.

ITS is aware of a network outage in Thomas Hall and is currently working on troubleshooting and fixing the issue.

All POS registers and all wireless networks are affected throughout the building. The wired connections for the 3rd and 4th floors are also affected. Wired connections for the rest of the building are not affected.

ITS will update the community by 9am. We apologize for this inconvenience.

Sunday, November 10, 2019

How Can Higher Ed Better Prepare Cybersecurity Students for a Hot Job Market?

The 2018 (ISC)2 Cybersecurity Workforce Study estimates a global shortage of cybersecurity professionals of around three million workers. This shortage of skilled job seekers is having a real-world impact on companies and the people responsible for cybersecurity at those companies. The study also points out that Gen X and Baby Boomer workers make up about half of the current cybersecurity workforce, leaving many entry-level opportunities for new college graduates and pathways for growth as these more experienced workers approach retirement age.

The need for trained cybersecurity professionals is not going to go away. The US Bureau of Labor Statistics projects a 28% growth in US employment for cybersecurity consultants between 2016 and 2026. How can we help our students go beyond the theoretical concepts taught in computer science or cybersecurity classes and make themselves more attractive to future employers? We need to take the lead to encourage students to take the initiative to learn more about current issues in cybersecurity and take advantage of the many cybersecurity resources available.
Here are some ways you can help your students and contribute to narrowing the cybersecurity skills gap:
  • Hold informational sessions on cybersecurity. Help spread the word on your campus about the cybersecurity skills gap and job opportunities. You could ask your CISO or information security team to conduct a cybersecurity seminar or invite local experts to share their knowledge and expertise with your students. The Enterprise Security Team at The Ohio State University has already implemented this idea, and they sponsor an annual and free on-campus Cybersecurity Days to expand knowledge of security and data protection for their entire college community.
  • Sponsor or encourage membership in student associations. There are two student cybersecurity organizations for your students to explore—NationalCybersecurity Student Association and Women in CyberSecurity (WiCyS. The National Cybersecurity Student Association has a number of resources on their website, and you can sign up for their newsletter or follow their Snapchat account to view a day in the life of a cyber student or industry professional. The WiCyS is dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking, and mentoring. You can also explore setting up a local WiCyS student chapter on your campus.
  • Offer campus internships. In addition to knowledge of advanced cybersecurity concepts, the most important qualification for cybersecurity employment is relevant work experience. You can help your students by hiring them as interns in your institution's information security department. This offers students real-world experience while providing supplemental staffing for your department. For suggested qualifications and responsibilities, use the Information Security Intern Job Description Template on the EDUCAUSE website as a starting point.
  • Identify scholarship opportunities. The CyberCorps: Scholarship for Services, funded by the NSF, provides up to $22,500 per year for undergraduates and $34,000 per year for graduate students. In return, students commit to work in a for a federal, state, or local agency for a period matching the length of their scholarship. The Cyber Security Degree website provides a comprehensive list of additional cybersecurity scholarships and other career resources.
  • Encourage students to deepen their knowledge. The NICCS Education Training Catalog is a central location where cybersecurity professionals across the nation can find more than 3,000 cybersecurity-related courses. Anyone can use the interactive map and filters to search for courses offered in their local area to add to their skill set, increase their level of expertise, or earn a certification. You could also direct your students to take advantage of the free online courses offered through edXUS Department of Homeland Security, Cybrar, or SANS Cyber Aces Online.
  • Attend cyber competitions. Institutions with an information assurance or computer security curriculum can give their students an additional way to hone their skills and have fun by participating in regional events hosted by the National Collegiate Cyber Defense Competition(NCCDC). The top regional teams can then go on to the National Championship, which was won by University of Virginia in 2018. Another cybersecurity competition for high school and college students is the National Cyber League (NCL), is a defensive and offensive puzzle-based, capture-the-flag style competition. All participants play the games simultaneously and are tested with real cybersecurity challenges they will likely face in the workforce.
  • Participate in cybersecurity conferences. Students may be interested the educational and networking opportunities from attending the annual conferences for the National Cybersecurity Student Association or Women in CyberSecurity. For additional conferences in your area, InfoSec publishes a comprehensive list with hundreds of cybersecurity events in the United States, Europe, and Asia.

Friday, November 8, 2019

Computer Lab Software Request Deadline for Spring 2020 is December 6, 2019

If you would like to request an upgrade of a software already installed in the computer labs or if you would like us to install a new software in the computer labs on campus, please fully read through the information on the link provided and fill out the Software Request form here. (click the big green box that says “Request Service”)

Note that software listed here is already scheduled to be installed, it is not necessary to submit requests for software, unless updating to a new version.

Please note that fully completed forms are required for any change to the labs, even for free software. All software installation media and licenses are also required by the due date.

Requests for the Spring 2020 semester should be submitted by December 6, 2019. Requests submitted after the deadline may not be installed in the labs for the Spring 2020 semester. This is because we need time to develop an installation procedure and test the software in the lab environment before deploying the software. We also require a number of weeks to deploy the lab images across campus, which means our solutions need to be complete and tested several weeks prior to classes beginning.

Please submit your Software Request forms ASAP.

Thursday, November 7, 2019

Training Coordinator Opening

ITS is looking for a new Training Coordinator. Please check out the position and apply if you think you are a good fit or send it to colleagues that you think will be successful. The ideal candidate has years of experience teaching in an educational environment. This person also has a solid background in multimodal learning and pedagogy.

Windows 8.1 End of Life Schedule

Every Windows product has a life cycle. The life cycle begins when a product is released and ends when it's no longer supported. Knowing key dates in this life cycle helps you make informed decisions about when to update, upgrade or make other changes to your software. 
Windows 8.1 Mainstream support will end January 9, 2018
Windows 8.1 Extended support will end January 10, 2023
Microsoft Support Reference to determine: Which Windows operating system am I running?


Manhattan College ITS loads Windows 10 on all ITS supported compatible devices.

Next Steps

If you happen to have a computer with Windows 8.1 please upgrade your computer to Windows 10 before January 9, 2018.  You can contact ITS for assistance.

Windows 7 End of Life Schedule

Every Windows product has a life cycle. The life cycle begins when a product is released and ends when it's no longer supported. Knowing key dates in this life cycle helps you make informed decisions about when to update, upgrade or make other changes to your software. 
Windows 7 Support will end January 14, 2020.
Microsoft Support Reference to determine: Which Windows operating system am I running?


Manhattan College ITS loads Windows 10 on all ITS supported compatible devices.

Next Steps

If you happen to have a computer with Windows 7 please upgrade your computer before January 14, 2020.  You can contact ITS for assistance.
Further details:  Windows 7 End of Life Schedule 

RESOLVED: Network Outage - Leo 4th Floor

RESOLVED: As of 10:45am, the network outage in Leo 4th floor has been resolved


ITS is aware of a network outage affecting Leo Engineering building, fourth floor. Both wired and wireless is affected at this time.  The rest of the building is not affected.

ITS has reached out to electricians to look into this issue. We will updated the community as soon as we can once this issue has been resolved.

We apologize for any inconvenience that this may cause.

Sunday, October 27, 2019

Top Tips to Securely Using Social Media

Manhattan College IT Services is sharing cyber safety tips in support of raising awareness during National Cyber Security Awareness Month, October 2019.


Social media sites, such as Snapchat, Facebook, Twitter, Instagram, and LinkedIn, are amazing resources, allowing you to meet, interact, and share with people around the world. However, with all this power comes risks--not just for you, but your family, friends, and employer. In this post, we cover the key steps to making the most of social media securely and safely. 


Be careful and think before posting. Anything you post will most likely become public at some point, impacting your reputation and future, including where you can go to school or the jobs you can get. If you don’t want your family or boss to see it, you probably shouldn’t post it. Also, be aware of what others are posting about you. You may have to ask others to remove what they share about you. 


Almost all social media sites have strong privacy options. Enable them when possible. For example, does the site really need to be able to track your location? In addition, privacy options can be confusing and change often. Make it a habit to check and confirm they are working as you expect them to. 


Secure your social media account with a long, unique passphrase. A passphrase is a password made up of multiple words, making it easy for you to type and remember, but hard for cyber attackers to guess. 

Lock Down Your Account 

Even better, enable two-factor authentication on all of your accounts. This adds a one-time code with your password when you need to log in to your account. This is actually very simple and is one of the most powerful ways to secure your account. 


Just like in email, bad guys will attempt to trick or fool you using social media messages. For example, they may try to trick you out of your password or credit card. Be careful what you click on: If a friend sends you what appears to be an odd message or one that does not sound like them, it could be a cyber attacker pretending to be your friend. 

Terms of Services

Know the site’s terms of service. Anything you post or upload might become the property of the site.


If you want to post anything about work, check with your supervisor first to make sure it is okay to publicly share.
Follow these tips to enjoy a much safer online experience. To learn more on how to use social media sites safely, or report unauthorized activity, check your social media site’s security page.

Be Secure Online! Refer to Manhattan College's Cyber Safety site for additional resources.

Refer to Manhattan College's Email Signature Knowledge Base 
Article for instructions on how to create your own email signature. 
Using a Manhattan College email signature is important because it is the perfect opportunity to brand every message you send. By creating a cohesive email signature for each employee on your team, you create brand recognition in every person to whom your employees sends emails. 

Reach out to IT Services with any questions:

Partially reposted from

Friday, October 25, 2019

COMPLETE: Planned Network Maintenance OV on 10/29 at 530am

COMPLETE: As of 540am, this maintenance has been completed successfully.

Update: This maintenance has been rescheduled for Tuesday at 530am. Sorry for the inconvenience.

ITS will be conducting maintenance in Overlook Manor on Monday, October 28th at 530am. This maintenance should be complete by 7am.

In order to improve network reliability, there will be scheduled network maintenance in order to upgrade firmware on the network equipment that services OV. This network maintenance will affect both of the wired and wireless networks throughout Overlook. This maintenance will not affect any other buildings on campus.

We apologize for this inconvenience. If you have any questions, please feel free to contact ITS at 178-862-7973 or via email at

RESOLVED: 12:35pm BANNER OUTAGE - 25 October 2019 12:29pm

UPDATE: 12:35pm
The issue has been resolved as of 12:33pm, we do not expect another outage to occur but will continue to monitor closely.

You may need to restart your browser.

ITS is investigating an issue causing login failures to Banner and Self Service.

Next update no later than 12:50pm

Monday, October 21, 2019

Improving Real-Time Collaboration in Google Docs for Assistive Technology Users

It’s now easier for users of assistive technologies, like screen readers and Braille displays, to keep track of real-time updates made by collaborators in a document. With live edits, you can view a periodically updated summary of collaborator changes in a convenient sidebar. In Google Docs we believe that collaboration works best when it works for everyone.

New edits made by collaborators appear in the live edits sidebar.

To see live edits, open the Accessibility settings by going to Tools > Accessibility settings and check “Turn on screen reader support.” Then, select “Show live edits” from the Accessibility menu. To learn more, see this article in Google's Help Center.

Helpful links

Reach out to IT Services with any questions:

Sunday, October 20, 2019

Cyber World Reality Facts

  1. Microsoft Security Intelligence Report and Consumer Reports
  2. AARP, “Caught in the Scammer’s Net: Risk Factors That May Lead to Becoming an Internet Fraud Victim,” 2014
  3. Norton Cyber Security Insights Report Q1, 2017
  4. Ponemon Institute, “2015 Cost of Cyber Crime Study: Global,” 2015
  5. Facebook
  6. Federal Trade Commission, “The Top Frauds of 2017”

For more information on this topic review The Facts Get Clued into the Cyber World Reality.

Be Secure Online! Refer to Manhattan College's Cyber Safety site for additional resources.

Refer to Manhattan College's Email Signature Knowledge Base 
Article for instructions on how to create your own email signature. 
Using a Manhattan College email signature is important because it is the perfect opportunity to brand every message you send. By creating a cohesive email signature for each employee on your team, you create brand recognition in every person to whom your employees sends emails. 

Reach out to IT Services with any questions:

Friday, October 18, 2019

25Live Training Resources

25Live is the site our campus community uses to schedule an event or book a meeting room on campus.  The ITS Training Team has put together a training course with 25Live materials.  The course contains instructions for the 25Live Mobile View and the 25Live Pro View and resources for the best way to book a room on campus using 25Live.  Clients who complete this course will be awarded a 25Live Digital Badge.

This course is located on the Moodle Pro Dev server please access the course here:  

25Live Training Course 
The ITS Knowledge Base also has 25Live Resources.

25Live Mobile View:  Best option to book a room.

25Live Pro View:  Additional resources for power users and room approvers.

Feel free to contact ITS with any questions:
email:       TEL . 718-862-7973

Sunday, October 13, 2019

Step Up to Stronger Passwords

Weak and reused passwords continue to be a common entry point for account or identity takeover and network intrusions. Simple steps and tools exist to help your end users achieve unique, strong passwords for their dozens of accounts. Help your community members improve their individual and collective security by sharing the following tips.

A password is often all that stands between you and sensitive data. It’s also often all that stands between a cybercriminal and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further step to protect against account theft.
  • Always: Use a unique password for each account so one compromised password does not put all of your accounts at risk of takeover.
  • Good: A good password is 10 or more characters in length, with a combination of uppercase and lowercase letters, plus numbers and/or symbols — such as pAMPh$3let. Complex passwords can be challenging to remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also difficult to type on a smartphone keyboard (for an easy password management option, see “best” below).
  • Better: A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional length makes its exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in uppercase letters, and add a number or symbol to make it even stronger — such as rubbishconsiderGREENSwim$3. You’ll still find it challenging to remember multiple passphrases, though, so read on.
  • Best: The strongest passwords are created by password managers — software that generates and keeps track of complex and unique passwords for all of your accounts. All you need to remember is one complex password or passphrase to access your password manager. With a password manager, you can look up passwords when you need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best practice is to add two-step verification to your password manager account. Keep reading!
  • Step it up! When you use two-step verification** (a.k.a., two-factor authentication or login approval), a stolen password doesn’t result in a stolen account. Anytime your account is logged into from a new device, you receive an authorization check on your smartphone or other registered device. Without that second piece, a password thief can’t get into your account. It’s the single best way to protect your account from cybercriminals.
**Please note: this option is not available for Manhattan College accounts but should be considered for external (personal) accounts.

    How to pick a proper password.

    Partially reposted from

    Monday, October 7, 2019

    IT Services Training Team presents on Digital Accessibility

    Alberto DeAngelis and Anita McCarthy presented at the Montgomery County Community College Technology and Learning Conference on October 4th. Their presentation on Digital Accessibility was among 1 of 25 hot topics facing education institutions today.  Close to 300 participants attended the technology conference in Blue Bell, PA .
    The Training Team has created an online, self paced Digital Accessibility course.

    If interested in this topic feel free to reach out to ITS with any questions:

    Sunday, October 6, 2019

    Stop That Phish


    phishing computer screen

    Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but also to stay in touch with friends and family. Since so many people around the world depend on these technologies, they have become one of the primary attack methods used by cyber attackers. This attack method is called phishing. Learn what phishing is and how you can spot and stop these attacks, regardless if you are at work or at home.

    What Is Phishing

    Phishing is a type of attack that uses email or a messaging service to fool you into taking an action you should not take, such as clicking on a malicious link, sharing your password, or opening an infected email attachment. Attackers work hard to make these messages convincing and tap your emotional triggers, such as urgency or curiosity. They can make them look like they came from someone or something you know, such as a friend or a trusted company you frequently use. They could even add logos of your bank or forge the email address so the message appears more legitimate. Attackers then send these messages to millions of people. They do not know who will take the bait, all they know is the more they send, the more people will fall victim.

    Protecting Yourself

    In almost all cases, opening and reading an email or message is fine. For a phishing attack to work, the bad guys need to trick you into doing something. Fortunately, there are clues that a message is an attack. Here are the most common ones:
    • A tremendous sense of urgency that demands “immediate action” before something bad happens, like threatening to close an account or send you to jail. The attacker wants to rush you into making a mistake.
    • Pressuring you to bypass or ignore your policies or procedures at work.
    • A strong sense of curiosity or something that is too good to be true. (No, you did not win the lottery.)
    • A generic salutation like “Dear Customer.” Most companies or friends contacting you know your name.
    • Requesting highly sensitive information, such as your credit card number, password, or any other information that a legitimate sender should already know.
    • The message says it comes from an official organization, but has poor grammar or spelling or uses a personal email address like
    • The message comes from an official email (such as your boss) but has a Reply-To address going to someone’s personal email account.
    • You receive a message from someone you know, but the tone or wording just does not sound like him or her. If you are suspicious, call the sender to verify they sent it. It is easy for a cyber attacker to create a message that appears to be from a friend or coworker.
    Ultimately, common sense is your best defense. If an email or message seems odd, suspicious, or too good to be true, it may be a phishing attack. 
    Be Secure Online! Refer to Manhattan College's Cyber Safety site for additional resources.

    Refer to Manhattan College's Email Signature Knowledge Base 
    Article for instructions on how to create your own email signature.

    Using a Manhattan College email signature is important because it is the perfect opportunity to brand every message you send. By creating a cohesive email signature for each employee on your team, you create brand recognition in every person to whom your employees sends emails. 

    Reach out to IT Services with any questions:

    Friday, October 4, 2019

    Complete: Banner Upgrade - Banner will be unavailable this weekend

    The Banner upgrade has been completed, all ancillary applications (Self-Service, Workflow, Banner Communications Manager, etc...) here been restored. Thank you for your patience.

    Information Technology Services

    Dear Manhattan College Community,

    Tonight at 7:00pm, ITS will begin the scheduled Banner Upgrade process.  Banner and its ancillary applications (Self-Service, Workflow, Banner Communications Manager, etc...) will be offline throughout the weekend and will be back up on Monday, October 7th.  Thank you.

    Information Technology Services

    Tuesday, October 1, 2019

    UPDATE: Campus-Wide Network Outage - Resolved

    UPDATE: ITS has corrected the issue and internet has been restored to Upper and Lower Campus. 

    Previous: There is currently an issue/outage with the network on Upper and Lower Campus as of around 2:30pm. ITS is investigating the situation and will update the community as soon as we can.

    Monday, September 30, 2019

    Papercut and Kramer VSM Down

    Outage resolved at approximately 2:30PM.  All affected servers are backup.  Systems needed a hard reboot.

    We are aware of a system outage affecting Papercut and Kramer VSM.  The outage is currently being investigated.  An update will be provided here when the issue has been resolved.

    See when someone is out of office in Gmail and Hangouts Chat

    What’s changing

    Now, when you have an Out of office (OOO) entry on your calendar, a notice of that OOO status will appear in Gmail and Hangouts Chat when people try to contact you.

    In Gmail, we’ll show a banner about the recipient being out of office and when they’ll be back in the email compose window.

    In Hangouts Chat, you’ll also see a small notification in the chat compose window alerting you that the person you’re trying to message is out of office.

    Why you’d use it

    With this launch, before people even hit “send,” your time out of office is visible in more places across G Suite, meaning you get more uninterrupted time away. As a sender, you’ll also have more confidence that you’re messaging people at an appropriate time.

    If you’d like to disable sharing of availability information to other G Suite apps, you can do so in Calendar under Calendar settings > Access permissions. Just deselect “Show calendar info in other Google apps, limited by access permissions.”

    Helpful links

    Reach out to IT Services with any questions:

    This feature will be ON by default and can be disabled in your Calendar settings.

    Sunday, September 29, 2019

    October is National Cybersecurity Awareness Month 2019

    Welcome to National Cybersecurity Awareness Month 2019. Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to ensure every American has the resources they need to stay safe and secure online while increasing the resilience of the Nation against cyber threats. 

    Themes and Key Messages for October 2019 This year’s overarching theme is “OWN IT. SECURE IT. PROTECT IT.” NCSAM will emphasize the role each individual plays in online safety and stress the importance of taking proactive steps to enhance cybersecurity at home and in the workplace. 

    In support of this national cybersecurity initiative Manhattan College will be releasing weekly tips on our blog aimed at raising awareness on this important topic.

    “OWN IT.” Understand your digital profile. Internet-based devices are present in every aspect of our lives: at home, school, work, and on the go. Constant connection provides opportunities for innovation and modernization, but also presents opportunities for potential cybersecurity threats that can compromise your most important personal information. Understand the devices and applications you use every day to help keep you and your information safe and secure. 

    “SECURE IT.” Secure your digital profile. Cybercriminals are very good at getting personal information from unsuspecting victims, and the methods are getting more sophisticated as technology evolves. Protect against cyber threats by learning about security features available on the equipment and software you use. Apply additional layers of security to your devices – like Multi-Factor Authentication – to better protect your personal information. 

    “PROTECT IT.” Maintain your digital profile. Every click, share, send, and post you make creates a digital trail that can be exploited by cybercriminals. To protect yourself from becoming a cybercrime victim you must understand, secure, and maintain your digital profile. Be familiar with and routinely check privacy settings to help protect your privacy and limit cybercrimes. 

    Be Secure Online! Refer to Manhattan College's Cyber Safety site for additional resources.

    Refer to Manhattan College's Email Signature Knowledge Base 
    Article for instructions on how to create your own email signature.
    Using a Manhattan College email signature is important because it is the perfect opportunity to brand every message you send. By creating a cohesive email signature for each employee on your team, you create brand recognition in every person to whom your employees sends emails. 

    Friday, September 27, 2019

    Horan Hall - Brief Network Outage 10/1 at 2pm

    Physical Plant will be conducting a generator test in Horan Hall on Tuesday, October 1st at approximately 2pm.

    There will be two brief outages, one while switching to generator power, the other while switching back to main power.

    This will not affect the rest of campus.

    If you have any questions, please contact ITS at or at extension x-7973. We apologize for this inconvenience.

    Wednesday, September 25, 2019

    Mail Merges Made Easy

    formMule is an add-on for Google Sheets that allows you to easily and quickly send mail merges. Mail merging makes emailing many recipients easier by utilizing tags, which takes data from a spreadsheet and uses that to organize and send personalized emails to multiple recipients. 

    formMule sends targeted, personalized emails from a Google Sheet. Run as either a manual email merge or -- more powerfully -- as a triggered merge that runs automatically on form submit or on a timer. 

    A great way to use formMule is when you are gathering responses in a Google Form, and later on, you want to email everyone who signed up using your form. Create a spreadsheet from the responses. Make sure to collect their email addresses!

    For more instructions, including a video tutorial please refer to Mail Merging using formMule.

    Reach out to IT Services with any questions:

    Updating Your Personal Email on Self Service

    Your personal email address on Self Service is used for verification purposes.  
    For this reason, it is very important that is it kept up to date. 

    Sometimes you may have an old personal email on file, if you ever lose access to your Jaspernet account, your personal email is the easiest way to verify who you are in order to quickly restore account access.  If there is no personal email on file for verification purposes it becomes necessary to come in person to an IT Services office on campus and show a representative your identification.

    The following step-by-step article How to Update Your Personal Email will guide you through updating your personal email. 

    Reach out to IT Services with any questions:

    Thursday, September 19, 2019

    Authentication System Maintenance Thursday September 19 @9pm

    The single sign on authentication system will undergo urgent maintenance tonight September 19 at 9pm.

    The will affect new signons to all single sign on services for approximately 5 minutes. Already authenticated users and applications will generally not be affected.

    Wednesday, September 18, 2019

    LabStats Features Manhattan College on Homepage

    Check out Rich Musal, Director of Client Services & Operations, and Anita McCarthy, Training Manager, IT Services, discussing how LabStats helped Manhattan College make better, more informed budgeting decisions for their computer labs. 
    This interview is featured on the LabStats home page.

    Software usage data was used to accurately adjust the amounts of licenses being purchased. A request to make more open computer labs available to students was proved unnecessary when hardware usage data was presented to administration.

    IT Services uses the data from Labstats to support LabSeat. Which can be found on Quick Links (see image below.)  This  is a new web application that is installed on our lab computers.  These simple computer lab maps show computer availability in real time before you leave for the lab. This is especially useful during busier times such as midterms and finals week as students can choose where to study by how many computers are available.

    labseat icon

    Often times a lab is underutilized because students don’t know it exists. They flock to common areas like the library or student center, walking past smaller labs in department buildings or multi-use classroom labs. The data LabSeat provides solves this challenge.

    image from LabSeat showing computer lab availability in O'Malley Library

    For more details please review LabSeat: Find an Open Computer on Campus.

    Partially reposted from the LabStats home page.