SlideShare a Scribd company logo
1 of 36
CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER
WHAT IS SAM? SAM is one facet of a broader business discipline known as IT asset management (ITAM), which includes overseeing both software and hardware that comprise an organization’s computers and network. (Wikipedia) To some, SAM may just be the new name for license compliance. (Centennial Software)
WHAT IS SAM? In the Business aspects, SAM is develop as a strategic imperative that enables many organizations to achieve maximum value from their IT investments. It involves integrating people, processes and technology in such a way as to allow software licenses and usage to be systematically tracked, evaluated and managed.
SAM AND ISO In 2006, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) began working with the SAM industry to develop a standard of best practices for software asset management programs. Standard ISO/IEC 19770-1:2006, Information technology – software asset management – Part 1, was published by the ISO and IEC in May of 2006.
SAM AND ISO Part 1 of the standard details SAM processes including control environment, planning and implementation, inventory, verification and compliance, operations management and life cycle. Part 2 of the standard is still in progress, and seeks to define a model that will help improve software identification processes.
SAM GOALS Reduce software and support costs by negotiating volume contract agreements and eliminating or reallocating underutilized software licenses.  Enforce compliance with corporate security policies and desktop standards.  Improve worker productivity by deploying the right kinds of technology more quickly and reliably.
SAM GOALS Limit overhead associated with managing and supporting software by streamlining and/or automating IT processes (such as inventory tracking, software deployment, issue tracking, and patch (computing) management).  Establish ongoing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software in an effort to recognize long-term benefits of SAM.
SAM BENEFITS REDUCED TOTAL COST OF OWNERSHIP (TCO) RELATED TO I.T. ASSESTS MANAGE TECHNOLOGY CHANGE MINIMIZE SECURITY RISKS LIMIT COMPLIANCE RISK
“THE KEY TO A SUCCESSFUL SAM PROGRAM IS THE LEGWORK PERFORMED BEFORE SELECTING A TOOL”
SAM LEGWORKS… EVALUATING EXISTING I.T. ENVIRONMENT GAINING EXECUTIVE SPONSORSHIP SETTING PROGRAM GOALS COMMITTING THE APPROPRIATE HUMAN RESOURCES DESIGNING STRONG PROCESSES THAT SUPPORT THE ORGANIZATION’S BUSINESS OBJECTIVES.
SAM GROUND WORK ASSESS NEEDS AND OBTAIN EXECUTIVE APPROVAL DETERMINE ORGANIZATIONAL REQUIREMENTS ESTABLISH BASELINE DEVELOP METRICS AND TIMEFRAME DEVELOP PROCESSES ALLOCATE RESOURCES SELECT AND DEPLOY TOOL
IMPLEMENTING SAM CONDUCT INVENTORY ESTABLISH PARAMETERS RUN INVENTORY REVIEW SOFTWARE USAGE ESTABLISH PARAMETERS IMPLEMENT SOFTWARE USAGE METERING MATCH SOFTWARE INVENTORY AND USAGE WITH LICENSES OWNED LOCATE PURCHASING RECORDS CENTRALIZE PURCHASING INFORMATION PERFORM RECONCILIATION EVALUATE DATA AND DETERMINE APPROPRIATE COURSE OF ACTION
IMPLEMENTING SAM REVIEW, DOCUMENT AND COMMUNICATE POLICIES AND PROCEDURES SOFTWARE PROCUREMENT SOFTWARE USE LICENSE TRACKING ESTABLISH ONGOING SAM PROCESSES
CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping :  Store it in a safe place (offsite if possible).                                                                                     Onsite, use of a fire-proof, waterproof,  		              lockable cabinet or safe is recommended.
CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping :  Store it in a safe place (offsite if possible).                                                                                     Onsite, use of a fire-proof, waterproof,  		              lockable cabinet or safe is recommended.
CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE ICT DEPARTMENT * License Documentation Safekeeping :  Store it in a safe place (offsite if possible).                                                                                     Onsite, use of a fire-proof, waterproof,  		              lockable cabinet or safe is recommended.
SOFTWARE ACQUISITION POLICIES CAN BE ACHIVED BY: Clearly delegate and document responsibility and accountability for acquiring new software and keeping records.  Buy software only from reputable resellers.  Always keep proper license documentation in a centralized, safe location. This includes original CDs, Certificates of Authenticity, End User License Agreements, original User's Manuals and sales receipts.  Track and update your software inventory on a regular basis to help ensure proper licensing. *Please refer to the terms of license agreement before transferring any software.
CEU LIBRARY SOFTWARE ACQUISITION POLICIES CENTRALIZED ACQUISITION SYSTEM CEU PURCHASING DEPARTMENT CEU ICT DEPARTMENT CEU PROPERTY DEPARTMENT 2 Budget Approved? Library Dept. software procurement  thru Budget  Purchasing Department ICT Department YES NO Look for a Vendor and Buy YES OK? 1 1 2 Vendor deliver  to the Lib Dept. NO END ICT Dept. will provide Property dept. checks & inventory it.
CEU LIBRARY SOFTWARE USE POLICIES BROWSING DOWNLOADING INSTALLING USING SOFTWARE     TITLES
BROWSING Firewall, Internet Explorer Content Editor to block unwanted and unnecessary website. For student refer to the CEU library Website http://www.library.ceu.edu.ph/access.htm For Library Staff You are not allowed to browse any web site that will cause to eat up the bandwidth of the Internet. Examples are You-tube, online games and video streaming. Your are not allowed to browse the Internet during service hours Staff assigned to research assistance and online reference librarian are allowed to browse the internet.   CEU LIBRARY SOFTWARE USE POLICIES
DOWNLOADING For students All online periodicals, windows vista, faculty and six(6) Cybrary 2 Internet workstations are allowed for downloading files and checking emails.  Students are allowed to transfer files from their USB, floppy disk or CD’s using the File Server as long as it was scanned and cleaned for viruses. For Library Staff Downloading of games, screen saver or any free software from the internet is strictly prohibited.  Downloading of files from Internet or other media devices is allowed as long as consulted by the I.T. Staff. CEU LIBRARY SOFTWARE USE POLICIES
INSTALLING Pirated software is strictly prohibited Only I.T. staff is authorized to install, operate and administer all the server operating system. For students Installing software or anything needed for their research is allowed as long as consulted by the I.T. staff. Installing unwanted software's like games, instant messaging and other stuff in the Internet workstation is not allowed. For Library Staff Installing unwanted software's like games, instant messaging and other stuff in any workstations is not allowed unless needed for the service like photo editor, scanner and YM. CEU LIBRARY SOFTWARE USE POLICIES
CEU LIBRARY SOFTWARE USE POLICIES USING SOFTWARE TITLES Only authorized I.T. staff is allowed to install software. Install software with accordance to the license agreement terms and conditions All software problems should be first reported to the Library I.T. staff. There will be penalties, if any, for not complying with the CEU Library software use policies. Like memo, suspension or your KPI (Key Performance Indicator)
CEU LIBRARY SOFTWARE DISASTER RECOVERY PLAN PROTECTING AND RESTORING SYSTEM SOFTWARES PERFORM REGULAR BACK-UPS of systems and files STORE BACK-UP COPIES  REGULAR SCANNING AND CLEANING OF VIRUSES AND SPYWARE KEEP ALL LICENSED DOCUMENTATION TECHNICAL SUPPORT Library Department  - Julius or Ron : local 243 CEU Computer technician - Aldrin or whoever is available : Local 270
CEU LIBRARY SAM PRACTICE PATCHING ALL MICROSOFT SOFTWARE SINCE 2003  SOFWARE UPDATE SERVICE (SUS) 2.0 AND NOW WINDOWS SERVER UPDATE SERVICE (WSUS) 3.0 SP1  PROTECTING ALL SERVERS AND DESKTOPS WORKSTATIONS TO VIRUSES AND SPYWARES  USING DEEPFREEZE, AVG AND SYMANTEC. INVENTORY AND AUDIT CEU LIBRARY SOFTWARE  COMPLYING WITH ICT QUARTERLY SOFTWARE MONITORING AND AUDIT SINCE 2003. BACK UP, RESTORE AND KEEP SOFTWARE IN A SAFE PLACE SINCE AUTOMATION START WAY BACK 1995  UTILIZE AND MAXIMIZE SOFTWARE USED LIKE FOLLETT LIBRARY SYSTEM.
CEU LIBRARY SAM PLAN & GOALS EXISTING TOOLS…   ICT SOFTWARE INVENTORY MONITORING AND AUDIT. WINDOWS SERVER UPDATE SERVICES 3.0 SP1 FOR PATCHING (ONLY IN THE LIBRARY DEPARTMENT)  VIRUS AND SPYWARE CLEAN-UP FINDINGS… WINDOWS XP SP2 MIGRATION TO SP3 WINDOWS VISTA MIGRATION TO SP1 INTERNET EXPLORER MIGRATION TO NEW VERSION
CEU LIBRARY SAM PLAN & GOALS SOFTWARE MATCHING FROM OLD VERSION TO NEW VERSION SOFTWARE TRAINING LIBRARY INTENSIVE TRAINING NEW ACQUIRED SOFTWARE LIKE WINDOWS VISTA AND MS OFFICE 2007 AND OTHER SOFTWARE NEEDS TO BE LEARNED BY THE STAFF. REDUCE SUPPORT COSTS FOLLETT MAINTENANCE AGREEMENTS SHOULD BE ALLOCATED TO OTHER SOFTWARE MAINTANANCE SUPPORT LIKE THE IBS OR USED IT AS DSL CONNECTION FOR LIBRARY.
CEU LIBRARY SAM PLAN & GOALS KEEP SOFTWARE SAFE STORING ORIGINAL COPIES IN THE OFFSITE OR FIREPROOF VAULT. CREATE A SOFTWARE AND HARDWARE MAP SOFTWARE MAP HARDWARE MAP NETWORK MAP INVENTORY AND AUDIT SCHEDULED EVERY SUMMER, SEM BREAK AND ICT QUARTERLY SOFTWARE MONITORING PATCHING OF ALL WINDOWS OPERATING SYSTEM UPDATES AND FINE TUNING CEU LIBRARY SOFTWARE
DEMO WINDOWS SERVERS UPDATE SERVICE 3.0 PATCHING ALL MICROSOFT SOFTWARE PRODUCTS
DEMO FOLLETT REPORTS MODULE CIRCULATION STATISTICS PATRON STATISTICS
DEMO VIRUS DEFINITION UPDATE, SCANNING AND CLEANING USING AVG AND SYMANTEC
WORKSHOP MANUAL SOFWARE INVENTORY USING THE TEMPLATE GIVEN TO YOU, INVENTORY THE SOFTWARE OF THE SECTIONS ASSIGNED TO YOU. CYBRARY 2/PERIODICAL SECTION SCIENCE/FILIPINIANA/ REFERENCE SECTION TECHNICAL SERVICES/UGR SECTION CYBRARY 1/CIRCULATION SECTION GRADUATE SCHOOL
WORKSHOP CREATE CIRCULATION REPORTS MONTHLY CATEGORY STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER MONTHLY CIRCULATION STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER PATRON STATISTICS REPORT APRIL, JUNE, JULY, AUGUST, SEPTEMBER
CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER

More Related Content

What's hot

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Testingfor Sw Security
Testingfor Sw SecurityTestingfor Sw Security
Testingfor Sw Securityankitmehta21
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Business Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsBusiness Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsHeather Axworthy
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009OS-Cubed, Inc.
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlusLee Dalton
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishFelipe Luis Garcia C
 
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...ijcsit
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Private Cloud
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 

What's hot (19)

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Testingfor Sw Security
Testingfor Sw SecurityTestingfor Sw Security
Testingfor Sw Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Business Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsBusiness Productivity and Automated Security Controls
Business Productivity and Automated Security Controls
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
 
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Incident response
Incident responseIncident response
Incident response
 
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 

Viewers also liked

library software Slim 21
library software Slim 21 library software Slim 21
library software Slim 21 Yats Bats
 
Open Source Software for Library : STKS
Open Source Software for Library :  STKSOpen Source Software for Library :  STKS
Open Source Software for Library : STKSBoonlert Aroonpiboon
 
Overview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and consOverview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and consYuga Priya Satheesh
 
Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)Tudor Girba
 
Open Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLibOpen Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLibVerus Solutions Pvt ltd
 
KOHA - Open Source Library Management Software
KOHA - Open Source Library Management SoftwareKOHA - Open Source Library Management Software
KOHA - Open Source Library Management Softwarerajivkumarmca
 

Viewers also liked (7)

library software Slim 21
library software Slim 21 library software Slim 21
library software Slim 21
 
Open Source Software for Library : STKS
Open Source Software for Library :  STKSOpen Source Software for Library :  STKS
Open Source Software for Library : STKS
 
Overview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and consOverview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and cons
 
Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)
 
Open Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLibOpen Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLib
 
Niatalk24jan10
Niatalk24jan10Niatalk24jan10
Niatalk24jan10
 
KOHA - Open Source Library Management Software
KOHA - Open Source Library Management SoftwareKOHA - Open Source Library Management Software
KOHA - Open Source Library Management Software
 

Similar to Ceu library software asset management (sam)

Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
It securepro 10 nov 2010
It securepro   10 nov 2010It securepro   10 nov 2010
It securepro 10 nov 2010Agora Group
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdfinfo382133
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfaquacareser
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Jose Lopez
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guidesaurabh_classic
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guideSaurabh Singh
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 

Similar to Ceu library software asset management (sam) (20)

Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
unit5final
unit5finalunit5final
unit5final
 
It securepro 10 nov 2010
It securepro   10 nov 2010It securepro   10 nov 2010
It securepro 10 nov 2010
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Cyber security
Cyber securityCyber security
Cyber security
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Siwes Pesentation
Siwes PesentationSiwes Pesentation
Siwes Pesentation
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Ceu library software asset management (sam)

  • 1. CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER
  • 2. WHAT IS SAM? SAM is one facet of a broader business discipline known as IT asset management (ITAM), which includes overseeing both software and hardware that comprise an organization’s computers and network. (Wikipedia) To some, SAM may just be the new name for license compliance. (Centennial Software)
  • 3. WHAT IS SAM? In the Business aspects, SAM is develop as a strategic imperative that enables many organizations to achieve maximum value from their IT investments. It involves integrating people, processes and technology in such a way as to allow software licenses and usage to be systematically tracked, evaluated and managed.
  • 4. SAM AND ISO In 2006, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) began working with the SAM industry to develop a standard of best practices for software asset management programs. Standard ISO/IEC 19770-1:2006, Information technology – software asset management – Part 1, was published by the ISO and IEC in May of 2006.
  • 5. SAM AND ISO Part 1 of the standard details SAM processes including control environment, planning and implementation, inventory, verification and compliance, operations management and life cycle. Part 2 of the standard is still in progress, and seeks to define a model that will help improve software identification processes.
  • 6. SAM GOALS Reduce software and support costs by negotiating volume contract agreements and eliminating or reallocating underutilized software licenses. Enforce compliance with corporate security policies and desktop standards. Improve worker productivity by deploying the right kinds of technology more quickly and reliably.
  • 7. SAM GOALS Limit overhead associated with managing and supporting software by streamlining and/or automating IT processes (such as inventory tracking, software deployment, issue tracking, and patch (computing) management). Establish ongoing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software in an effort to recognize long-term benefits of SAM.
  • 8. SAM BENEFITS REDUCED TOTAL COST OF OWNERSHIP (TCO) RELATED TO I.T. ASSESTS MANAGE TECHNOLOGY CHANGE MINIMIZE SECURITY RISKS LIMIT COMPLIANCE RISK
  • 9. “THE KEY TO A SUCCESSFUL SAM PROGRAM IS THE LEGWORK PERFORMED BEFORE SELECTING A TOOL”
  • 10. SAM LEGWORKS… EVALUATING EXISTING I.T. ENVIRONMENT GAINING EXECUTIVE SPONSORSHIP SETTING PROGRAM GOALS COMMITTING THE APPROPRIATE HUMAN RESOURCES DESIGNING STRONG PROCESSES THAT SUPPORT THE ORGANIZATION’S BUSINESS OBJECTIVES.
  • 11. SAM GROUND WORK ASSESS NEEDS AND OBTAIN EXECUTIVE APPROVAL DETERMINE ORGANIZATIONAL REQUIREMENTS ESTABLISH BASELINE DEVELOP METRICS AND TIMEFRAME DEVELOP PROCESSES ALLOCATE RESOURCES SELECT AND DEPLOY TOOL
  • 12. IMPLEMENTING SAM CONDUCT INVENTORY ESTABLISH PARAMETERS RUN INVENTORY REVIEW SOFTWARE USAGE ESTABLISH PARAMETERS IMPLEMENT SOFTWARE USAGE METERING MATCH SOFTWARE INVENTORY AND USAGE WITH LICENSES OWNED LOCATE PURCHASING RECORDS CENTRALIZE PURCHASING INFORMATION PERFORM RECONCILIATION EVALUATE DATA AND DETERMINE APPROPRIATE COURSE OF ACTION
  • 13. IMPLEMENTING SAM REVIEW, DOCUMENT AND COMMUNICATE POLICIES AND PROCEDURES SOFTWARE PROCUREMENT SOFTWARE USE LICENSE TRACKING ESTABLISH ONGOING SAM PROCESSES
  • 14. CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping : Store it in a safe place (offsite if possible). Onsite, use of a fire-proof, waterproof, lockable cabinet or safe is recommended.
  • 15. CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping : Store it in a safe place (offsite if possible). Onsite, use of a fire-proof, waterproof, lockable cabinet or safe is recommended.
  • 16. CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE ICT DEPARTMENT * License Documentation Safekeeping : Store it in a safe place (offsite if possible). Onsite, use of a fire-proof, waterproof, lockable cabinet or safe is recommended.
  • 17.
  • 18.
  • 19. SOFTWARE ACQUISITION POLICIES CAN BE ACHIVED BY: Clearly delegate and document responsibility and accountability for acquiring new software and keeping records. Buy software only from reputable resellers. Always keep proper license documentation in a centralized, safe location. This includes original CDs, Certificates of Authenticity, End User License Agreements, original User's Manuals and sales receipts. Track and update your software inventory on a regular basis to help ensure proper licensing. *Please refer to the terms of license agreement before transferring any software.
  • 20. CEU LIBRARY SOFTWARE ACQUISITION POLICIES CENTRALIZED ACQUISITION SYSTEM CEU PURCHASING DEPARTMENT CEU ICT DEPARTMENT CEU PROPERTY DEPARTMENT 2 Budget Approved? Library Dept. software procurement thru Budget Purchasing Department ICT Department YES NO Look for a Vendor and Buy YES OK? 1 1 2 Vendor deliver to the Lib Dept. NO END ICT Dept. will provide Property dept. checks & inventory it.
  • 21. CEU LIBRARY SOFTWARE USE POLICIES BROWSING DOWNLOADING INSTALLING USING SOFTWARE TITLES
  • 22. BROWSING Firewall, Internet Explorer Content Editor to block unwanted and unnecessary website. For student refer to the CEU library Website http://www.library.ceu.edu.ph/access.htm For Library Staff You are not allowed to browse any web site that will cause to eat up the bandwidth of the Internet. Examples are You-tube, online games and video streaming. Your are not allowed to browse the Internet during service hours Staff assigned to research assistance and online reference librarian are allowed to browse the internet. CEU LIBRARY SOFTWARE USE POLICIES
  • 23. DOWNLOADING For students All online periodicals, windows vista, faculty and six(6) Cybrary 2 Internet workstations are allowed for downloading files and checking emails. Students are allowed to transfer files from their USB, floppy disk or CD’s using the File Server as long as it was scanned and cleaned for viruses. For Library Staff Downloading of games, screen saver or any free software from the internet is strictly prohibited. Downloading of files from Internet or other media devices is allowed as long as consulted by the I.T. Staff. CEU LIBRARY SOFTWARE USE POLICIES
  • 24. INSTALLING Pirated software is strictly prohibited Only I.T. staff is authorized to install, operate and administer all the server operating system. For students Installing software or anything needed for their research is allowed as long as consulted by the I.T. staff. Installing unwanted software's like games, instant messaging and other stuff in the Internet workstation is not allowed. For Library Staff Installing unwanted software's like games, instant messaging and other stuff in any workstations is not allowed unless needed for the service like photo editor, scanner and YM. CEU LIBRARY SOFTWARE USE POLICIES
  • 25. CEU LIBRARY SOFTWARE USE POLICIES USING SOFTWARE TITLES Only authorized I.T. staff is allowed to install software. Install software with accordance to the license agreement terms and conditions All software problems should be first reported to the Library I.T. staff. There will be penalties, if any, for not complying with the CEU Library software use policies. Like memo, suspension or your KPI (Key Performance Indicator)
  • 26. CEU LIBRARY SOFTWARE DISASTER RECOVERY PLAN PROTECTING AND RESTORING SYSTEM SOFTWARES PERFORM REGULAR BACK-UPS of systems and files STORE BACK-UP COPIES REGULAR SCANNING AND CLEANING OF VIRUSES AND SPYWARE KEEP ALL LICENSED DOCUMENTATION TECHNICAL SUPPORT Library Department - Julius or Ron : local 243 CEU Computer technician - Aldrin or whoever is available : Local 270
  • 27. CEU LIBRARY SAM PRACTICE PATCHING ALL MICROSOFT SOFTWARE SINCE 2003 SOFWARE UPDATE SERVICE (SUS) 2.0 AND NOW WINDOWS SERVER UPDATE SERVICE (WSUS) 3.0 SP1 PROTECTING ALL SERVERS AND DESKTOPS WORKSTATIONS TO VIRUSES AND SPYWARES USING DEEPFREEZE, AVG AND SYMANTEC. INVENTORY AND AUDIT CEU LIBRARY SOFTWARE COMPLYING WITH ICT QUARTERLY SOFTWARE MONITORING AND AUDIT SINCE 2003. BACK UP, RESTORE AND KEEP SOFTWARE IN A SAFE PLACE SINCE AUTOMATION START WAY BACK 1995 UTILIZE AND MAXIMIZE SOFTWARE USED LIKE FOLLETT LIBRARY SYSTEM.
  • 28. CEU LIBRARY SAM PLAN & GOALS EXISTING TOOLS… ICT SOFTWARE INVENTORY MONITORING AND AUDIT. WINDOWS SERVER UPDATE SERVICES 3.0 SP1 FOR PATCHING (ONLY IN THE LIBRARY DEPARTMENT) VIRUS AND SPYWARE CLEAN-UP FINDINGS… WINDOWS XP SP2 MIGRATION TO SP3 WINDOWS VISTA MIGRATION TO SP1 INTERNET EXPLORER MIGRATION TO NEW VERSION
  • 29. CEU LIBRARY SAM PLAN & GOALS SOFTWARE MATCHING FROM OLD VERSION TO NEW VERSION SOFTWARE TRAINING LIBRARY INTENSIVE TRAINING NEW ACQUIRED SOFTWARE LIKE WINDOWS VISTA AND MS OFFICE 2007 AND OTHER SOFTWARE NEEDS TO BE LEARNED BY THE STAFF. REDUCE SUPPORT COSTS FOLLETT MAINTENANCE AGREEMENTS SHOULD BE ALLOCATED TO OTHER SOFTWARE MAINTANANCE SUPPORT LIKE THE IBS OR USED IT AS DSL CONNECTION FOR LIBRARY.
  • 30. CEU LIBRARY SAM PLAN & GOALS KEEP SOFTWARE SAFE STORING ORIGINAL COPIES IN THE OFFSITE OR FIREPROOF VAULT. CREATE A SOFTWARE AND HARDWARE MAP SOFTWARE MAP HARDWARE MAP NETWORK MAP INVENTORY AND AUDIT SCHEDULED EVERY SUMMER, SEM BREAK AND ICT QUARTERLY SOFTWARE MONITORING PATCHING OF ALL WINDOWS OPERATING SYSTEM UPDATES AND FINE TUNING CEU LIBRARY SOFTWARE
  • 31. DEMO WINDOWS SERVERS UPDATE SERVICE 3.0 PATCHING ALL MICROSOFT SOFTWARE PRODUCTS
  • 32. DEMO FOLLETT REPORTS MODULE CIRCULATION STATISTICS PATRON STATISTICS
  • 33. DEMO VIRUS DEFINITION UPDATE, SCANNING AND CLEANING USING AVG AND SYMANTEC
  • 34. WORKSHOP MANUAL SOFWARE INVENTORY USING THE TEMPLATE GIVEN TO YOU, INVENTORY THE SOFTWARE OF THE SECTIONS ASSIGNED TO YOU. CYBRARY 2/PERIODICAL SECTION SCIENCE/FILIPINIANA/ REFERENCE SECTION TECHNICAL SERVICES/UGR SECTION CYBRARY 1/CIRCULATION SECTION GRADUATE SCHOOL
  • 35. WORKSHOP CREATE CIRCULATION REPORTS MONTHLY CATEGORY STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER MONTHLY CIRCULATION STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER PATRON STATISTICS REPORT APRIL, JUNE, JULY, AUGUST, SEPTEMBER
  • 36. CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER