...
- MIT owned computers on campus in our supported sections
- Anthropology
- Global Languages
- History
- Literature
- Music and Theater Arts
- Programs in Science, Technology, and Society
- Women and Gender Studies
- Consortium for Graduate Studies in Gender, Culture, Women, and Sexuality
- SHASS Dean's Office
- Installation of basic software from IS&T and troubleshooting of any buggy performance
- Troubleshooting of malfunctioning hardware
- Computer virus/malware infection mitigation
- Set up of new machines and installation of computer operating systems (Windows or Mac) and Boot Camp on a Mac
- Account migrations from old to new machines
- Set up of email, backup, and anti-virus software
- How to use MIT email on Apple Mail or Outlook and browser-based webmailÂ
- Contacting MIT Property to deactivate old machines
- Secure wiping of data and recycling of old machines
- Basic troubleshooting of printers
- Recommendations Providing hardware recommendations for and spec'ing specifications for new computers, printers, and peripherals
- Tips and tricks for troubleshooting unusual issues that may be encountered by our clients
- iPhone troubleshooting and email setups
- Very basic Windows and android phone troubleshooting (there are so many different mobile devices, IS&T has a mobile team studying, troubleshooting, and solving issues with the plethora of makes and models of devices http://ist.mit.edu/mobile)
- Providing documentation as time permits for known issues and best practices on the SHASS IT website and the SHASS IT Documentation Site
- Troubleshooting of wireless and wired network and email issues in our supported areas and reporting them to IS&T
- Set up, maintenance, troubleshooting, security, updating, and life cycle management of DLC owned Synology NAS servers
- Set up, maintenance, troubleshooting, security, updating, and life cycle management of the SHASS Film Servers and all associated backup systems
- Make recommendations for machine cybersecurity configurations and user data backups
- Electronic publication of recommended data security, infosec, and cybersecurity best practices for critical work systems
- Email warnings and notices of cybersecurity threats or impending changes to vendor products that can directly affect critical work functions
...