Thank you for visiting the GAGE College ICT Services Website.<\/p>\n
ICT Services\u00a0<\/strong>has a service remit to provision, maintain and support appropriate ICT hardware and software systems to enable Academic staff, Professional services staff and students to support the strategic goals and targets of a modern third-level teaching, learning and research environment.<\/p>\n Services provided are in the following areas:<\/p>\n 1.<\/p>\n Wireless network access is available throughout the college campus. \u00a0You can connect to gage wifi using your\u00a0student Access Account\u00a0credentials. \u00a0On the College IT Services pages you can find wifi Password from service desk and a helpful\u00a0configuration tool\u00a0which you can download.<\/p>\n All academic information for students is held on the New College web site. \u00a0You will need your\u00a0GOS credentials\u00a0to login. \u00a0If you do not have permissions to certain sub sites or pages please request it via the online support site. \u00a0The recommended browser for GAGE SiS , GAGE ERP and so on\u00a0 is Google Chrome.<\/p>\n The computers have generic software installed, Microsoft\u00a0Office, Adobe Reader, Course related software tools etc. \u00a0You will need your GOS credentials to\u00a0login to the workstations. \u00a0There is a dedicated drive for students to save their College related data.<\/p>\n 2.<\/p>\n If you need advice concerning a problem with your personal computer please drop into the IT Office in 12OB. \u00a0Minor repairs can be performed\u00a0in the IT Office, however we\u00a0may refer you\u00a0to\u00a0University IT Services\u00a0who provide specific services including hardware repairs and upgrades..<\/p>\n The ICT Department have a couple of laptops that we are happy to loan out, on a short term basis\u00a0in times of technical catastrophe.\u00a0\u00a0 These are on a first come first served basis and are of limited quantity.\u00a0\u00a0\u00a0 Students are liable for damage to the loan equipment and will be batteled for the cost of replacement or repair to loan equipment.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n <\/p>\n The IT Services of the GAGE College offer a number of services for the repair and upgrade of personal computers. These include the\u00a0Computer Hardware Breakdown Service.<\/p>\n <\/p>\n Computer Hardware Breakdown Service<\/p>\n Soon !!<\/p>\n 3.<\/p>\n Depending on your\u00a0academic status, College will either provide you with a computer from a pool of resources or buy you one from your resaerch allowance. \u00a0We are happy to advise you on the purchase of\u00a0computers and other devices and\u00a0have acces to Apple\u00a0Educational discounts. \u00a0The University have an\u00a0extensive range of\u00a0software available through\u00a0their\u00a0shop\u00a0\u00a0– please\u00a0note some software is only available for University Owned machines.<\/p>\n 4.<\/p>\n These rules apply to all use of the computing and network facilities in New College and concern what is considered to be unacceptable behaviour and misuse, as well as what may infringe licence terms or may be otherwise illegal. Note that all use is permitted for bona fide purposes only, and is subject to proper authorisation (which may be provided either explicitly or implicitly – see below).<\/p>\n The College regards computer misuse as a serious matter, which may warrant disciplinary proceedings, and offenders will be prevented from using the College computing facilities for a period of time dependant on the severity of the misuse.<\/p>\n Explicit authorisation will normally involve the assignment of a \u2018username\u2019 and password for the purpose in question.<\/p>\n Implicit authorisation can normally be assumed for services that are advertised as being available without prior registration, for example the Library OPAC services and Networked CD-ROMs accessed from public terminals in the Library. Any facility which is not controlled by the College is subject to regulations determined by the organisation concerned, so authorisation to use such facilities should not be assumed, even though they may be accessible from or connected to the College facilities.<\/p>\n Misuse of computing and network facilities and unacceptable behaviour include (but are not limited to) the following:<\/p>\n Users may NOT run:<\/p>\n Poisoned UTorrent The software and any datasets supplied by the College may be used subject to the relevant supplier\u2019s licence agreements. Software should not be copied from the network, nor should any other software be installed on any of the workstations or networks without the prior consent of the IT Officer.<\/p>\n In general, all software and dataset use is subject to the Code of Conduct produced by the Combined Higher Education Software Team (CHEST).<\/p>\n Please note also the College Statement on Illegal Software. (You can find from GAGE College ICT security policy )<\/p>\n Please download our\u00a0Information Security Policy<\/a>\u00a0which can also be found in our\u00a0Policy Documents<\/a>‘ page.<\/p>\n <\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" ICT Services : Thank you for visiting the GAGE College ICT Services Website. ICT Services\u00a0has a service remit to provision, maintain and support appropriate ICT hardware and software systems to enable Academic staff, Professional services staff and students to support Read More …<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"yoast_head":"\n\n
You can Find Some details of ICT Facilities and Services for Student and Staff Members\u00a0<\/strong><\/span><\/h2>\n
Student ICT Facilities and Services<\/h1>\n
Network<\/strong><\/h2>\n
Intranet – GAGE SiS, GAGE ERP, docRepo ….\u00a0Read More<\/a><\/span>\n
Computer Rooms<\/strong><\/h2>\n
[\/read]<\/strong><\/h2>\n
Personal computers<\/strong><\/h2>\n
Read More<\/a><\/span>\n
<\/div><\/strong><\/h2>\n
Personal and research computers – Academic Staff<\/strong><\/h2>\n
Rules and Regulations<\/h1>\n
Computer Misuse<\/h2>\n
Read More<\/a><\/span>\n
\n
Concerning hardware<\/h3>\n
\n
The state and status of computers<\/h3>\n
\n
Peer-to-peer programs and file sharing<\/h3>\n
\n
Network services<\/h3>\n
\n
A\u00a0reasonably comprehensive list of forbidden P2P programs includes<\/h2>\n
\n\n
\n rrent
\nABC
\nAcquisition
\nAdagio
\nAlliance
\nAllPeers
\nAmicima
\naMule
\nANts P2P
\nApexDC++
\nApplejuice
\nAres
\nAres Galaxy
\nAudiogalaxy
\nAvalanche
\nAzureus
\nBCDC++
\nBearShare
\nBitComet
\nBitLord
\nBitSpirit
\nBitTornado
\nBITTORRENT<\/strong>
\nBlubster
\nBurst!
\nCabos
\nCAKE
\nCaribou
\nChord
\nCoolStreaming
\nCoral
\nCybersky-TV
\nDC++
\nDijjer
\nDirect Connect
\nEarthStation 5<\/td>\neDonkey
\neDonkey2000
\neMule
\neMule Plus
\nEntropy
\nexpressLoad
\nFastTrack
\nFilecroc
\nFileScope
\nFileTopia
\nFlashGet
\nFreeCast
\nFreenet
\nFrostWire
\nG3 Torrent
\ngiFT
\nGnucleus
\nGNUnet
\nGNUnet-gtk
\nGnutella
\nGnutella2
\nGrokster
\nGroove
\ngtk-gnutella
\nHalite
\nHamachi
\nHydranode
\nIceShare
\niFolder
\niMesh
\niMesh Light
\nIRC<\/strong>
\nJoost
\nJubster
\nJXTA
\nKad network<\/td>\nKazaa
\nKazaa Lite
\nKCeasy
\nKey network
\nKiwi Alpha
\nKoffeePhoto
\nkonspire2b
\nKONTIKI (Sky)<\/strong>
\nKrawler[x]
\nKTorrent
\nLIMEWIRE<\/strong>
\nlMule
\nLphant
\nMadster\/Aimster
\nMammoth
\nMLDonkey
\nmlMac
\nMnet
\nMojoNation
\nMorpheus
\nMUTE
\nNapigator
\nNapshare
\nNEO Network
\nNeoModus Direct Connect
\nOctoshape
\nOmemo
\nOpenFT
\nOpenNap
\nOpera
\nOvernet
\nPeerCast
\nPeersites
\nPeerStream
\nPerfect Dark<\/td>\nP-Grid
\nPhex
\nPiolet<\/p>\n
\nPPLive
\nPruna
\nQTorrent
\nRawflow
\nRetroshare
\nrtorrent
\nScour
\nShareaza
\nSolipsis
\nsoribada
\nSoulseek
\nSPIN
\nStrongDC++
\nSwapper
\nSwarmcast
\nThe Circle
\nTransmission
\nTribler
\nTrustyFiles
\nTVants
\nTVUPlayer<\/p>\n
\nWarez P2P
\nWASTE
\nWinMX
\nWinny
\nxMule
\nXoloX
\nZEPP
\nZultrax<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\nIf in doubt, ask the IT Department.<\/h2>\n
Computer Suite Rules<\/h2>\n
\n
Software Rules<\/h2>\n
Information Security Policy<\/h2>\n
<\/div><\/strong><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n