SlideShare a Scribd company logo
1 of 36
CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER
WHAT IS SAM? SAM is one facet of a broader business discipline known as IT asset management (ITAM), which includes overseeing both software and hardware that comprise an organization’s computers and network. (Wikipedia) To some, SAM may just be the new name for license compliance. (Centennial Software)
WHAT IS SAM? In the Business aspects, SAM is develop as a strategic imperative that enables many organizations to achieve maximum value from their IT investments. It involves integrating people, processes and technology in such a way as to allow software licenses and usage to be systematically tracked, evaluated and managed.
SAM AND ISO In 2006, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) began working with the SAM industry to develop a standard of best practices for software asset management programs. Standard ISO/IEC 19770-1:2006, Information technology – software asset management – Part 1, was published by the ISO and IEC in May of 2006.
SAM AND ISO Part 1 of the standard details SAM processes including control environment, planning and implementation, inventory, verification and compliance, operations management and life cycle. Part 2 of the standard is still in progress, and seeks to define a model that will help improve software identification processes.
SAM GOALS Reduce software and support costs by negotiating volume contract agreements and eliminating or reallocating underutilized software licenses.  Enforce compliance with corporate security policies and desktop standards.  Improve worker productivity by deploying the right kinds of technology more quickly and reliably.
SAM GOALS Limit overhead associated with managing and supporting software by streamlining and/or automating IT processes (such as inventory tracking, software deployment, issue tracking, and patch (computing) management).  Establish ongoing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software in an effort to recognize long-term benefits of SAM.
SAM BENEFITS REDUCED TOTAL COST OF OWNERSHIP (TCO) RELATED TO I.T. ASSESTS MANAGE TECHNOLOGY CHANGE MINIMIZE SECURITY RISKS LIMIT COMPLIANCE RISK
“THE KEY TO A SUCCESSFUL SAM PROGRAM IS THE LEGWORK PERFORMED BEFORE SELECTING A TOOL”
SAM LEGWORKS… EVALUATING EXISTING I.T. ENVIRONMENT GAINING EXECUTIVE SPONSORSHIP SETTING PROGRAM GOALS COMMITTING THE APPROPRIATE HUMAN RESOURCES DESIGNING STRONG PROCESSES THAT SUPPORT THE ORGANIZATION’S BUSINESS OBJECTIVES.
SAM GROUND WORK ASSESS NEEDS AND OBTAIN EXECUTIVE APPROVAL DETERMINE ORGANIZATIONAL REQUIREMENTS ESTABLISH BASELINE DEVELOP METRICS AND TIMEFRAME DEVELOP PROCESSES ALLOCATE RESOURCES SELECT AND DEPLOY TOOL
IMPLEMENTING SAM CONDUCT INVENTORY ESTABLISH PARAMETERS RUN INVENTORY REVIEW SOFTWARE USAGE ESTABLISH PARAMETERS IMPLEMENT SOFTWARE USAGE METERING MATCH SOFTWARE INVENTORY AND USAGE WITH LICENSES OWNED LOCATE PURCHASING RECORDS CENTRALIZE PURCHASING INFORMATION PERFORM RECONCILIATION EVALUATE DATA AND DETERMINE APPROPRIATE COURSE OF ACTION
IMPLEMENTING SAM REVIEW, DOCUMENT AND COMMUNICATE POLICIES AND PROCEDURES SOFTWARE PROCUREMENT SOFTWARE USE LICENSE TRACKING ESTABLISH ONGOING SAM PROCESSES
CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping :  Store it in a safe place (offsite if possible).                                                                                     Onsite, use of a fire-proof, waterproof,  		              lockable cabinet or safe is recommended.
CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping :  Store it in a safe place (offsite if possible).                                                                                     Onsite, use of a fire-proof, waterproof,  		              lockable cabinet or safe is recommended.
CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE ICT DEPARTMENT * License Documentation Safekeeping :  Store it in a safe place (offsite if possible).                                                                                     Onsite, use of a fire-proof, waterproof,  		              lockable cabinet or safe is recommended.
SOFTWARE ACQUISITION POLICIES CAN BE ACHIVED BY: Clearly delegate and document responsibility and accountability for acquiring new software and keeping records.  Buy software only from reputable resellers.  Always keep proper license documentation in a centralized, safe location. This includes original CDs, Certificates of Authenticity, End User License Agreements, original User's Manuals and sales receipts.  Track and update your software inventory on a regular basis to help ensure proper licensing. *Please refer to the terms of license agreement before transferring any software.
CEU LIBRARY SOFTWARE ACQUISITION POLICIES CENTRALIZED ACQUISITION SYSTEM CEU PURCHASING DEPARTMENT CEU ICT DEPARTMENT CEU PROPERTY DEPARTMENT 2 Budget Approved? Library Dept. software procurement  thru Budget  Purchasing Department ICT Department YES NO Look for a Vendor and Buy YES OK? 1 1 2 Vendor deliver  to the Lib Dept. NO END ICT Dept. will provide Property dept. checks & inventory it.
CEU LIBRARY SOFTWARE USE POLICIES BROWSING DOWNLOADING INSTALLING USING SOFTWARE     TITLES
BROWSING Firewall, Internet Explorer Content Editor to block unwanted and unnecessary website. For student refer to the CEU library Website http://www.library.ceu.edu.ph/access.htm For Library Staff You are not allowed to browse any web site that will cause to eat up the bandwidth of the Internet. Examples are You-tube, online games and video streaming. Your are not allowed to browse the Internet during service hours Staff assigned to research assistance and online reference librarian are allowed to browse the internet.   CEU LIBRARY SOFTWARE USE POLICIES
DOWNLOADING For students All online periodicals, windows vista, faculty and six(6) Cybrary 2 Internet workstations are allowed for downloading files and checking emails.  Students are allowed to transfer files from their USB, floppy disk or CD’s using the File Server as long as it was scanned and cleaned for viruses. For Library Staff Downloading of games, screen saver or any free software from the internet is strictly prohibited.  Downloading of files from Internet or other media devices is allowed as long as consulted by the I.T. Staff. CEU LIBRARY SOFTWARE USE POLICIES
INSTALLING Pirated software is strictly prohibited Only I.T. staff is authorized to install, operate and administer all the server operating system. For students Installing software or anything needed for their research is allowed as long as consulted by the I.T. staff. Installing unwanted software's like games, instant messaging and other stuff in the Internet workstation is not allowed. For Library Staff Installing unwanted software's like games, instant messaging and other stuff in any workstations is not allowed unless needed for the service like photo editor, scanner and YM. CEU LIBRARY SOFTWARE USE POLICIES
CEU LIBRARY SOFTWARE USE POLICIES USING SOFTWARE TITLES Only authorized I.T. staff is allowed to install software. Install software with accordance to the license agreement terms and conditions All software problems should be first reported to the Library I.T. staff. There will be penalties, if any, for not complying with the CEU Library software use policies. Like memo, suspension or your KPI (Key Performance Indicator)
CEU LIBRARY SOFTWARE DISASTER RECOVERY PLAN PROTECTING AND RESTORING SYSTEM SOFTWARES PERFORM REGULAR BACK-UPS of systems and files STORE BACK-UP COPIES  REGULAR SCANNING AND CLEANING OF VIRUSES AND SPYWARE KEEP ALL LICENSED DOCUMENTATION TECHNICAL SUPPORT Library Department  - Julius or Ron : local 243 CEU Computer technician - Aldrin or whoever is available : Local 270
CEU LIBRARY SAM PRACTICE PATCHING ALL MICROSOFT SOFTWARE SINCE 2003  SOFWARE UPDATE SERVICE (SUS) 2.0 AND NOW WINDOWS SERVER UPDATE SERVICE (WSUS) 3.0 SP1  PROTECTING ALL SERVERS AND DESKTOPS WORKSTATIONS TO VIRUSES AND SPYWARES  USING DEEPFREEZE, AVG AND SYMANTEC. INVENTORY AND AUDIT CEU LIBRARY SOFTWARE  COMPLYING WITH ICT QUARTERLY SOFTWARE MONITORING AND AUDIT SINCE 2003. BACK UP, RESTORE AND KEEP SOFTWARE IN A SAFE PLACE SINCE AUTOMATION START WAY BACK 1995  UTILIZE AND MAXIMIZE SOFTWARE USED LIKE FOLLETT LIBRARY SYSTEM.
CEU LIBRARY SAM PLAN & GOALS EXISTING TOOLS…   ICT SOFTWARE INVENTORY MONITORING AND AUDIT. WINDOWS SERVER UPDATE SERVICES 3.0 SP1 FOR PATCHING (ONLY IN THE LIBRARY DEPARTMENT)  VIRUS AND SPYWARE CLEAN-UP FINDINGS… WINDOWS XP SP2 MIGRATION TO SP3 WINDOWS VISTA MIGRATION TO SP1 INTERNET EXPLORER MIGRATION TO NEW VERSION
CEU LIBRARY SAM PLAN & GOALS SOFTWARE MATCHING FROM OLD VERSION TO NEW VERSION SOFTWARE TRAINING LIBRARY INTENSIVE TRAINING NEW ACQUIRED SOFTWARE LIKE WINDOWS VISTA AND MS OFFICE 2007 AND OTHER SOFTWARE NEEDS TO BE LEARNED BY THE STAFF. REDUCE SUPPORT COSTS FOLLETT MAINTENANCE AGREEMENTS SHOULD BE ALLOCATED TO OTHER SOFTWARE MAINTANANCE SUPPORT LIKE THE IBS OR USED IT AS DSL CONNECTION FOR LIBRARY.
CEU LIBRARY SAM PLAN & GOALS KEEP SOFTWARE SAFE STORING ORIGINAL COPIES IN THE OFFSITE OR FIREPROOF VAULT. CREATE A SOFTWARE AND HARDWARE MAP SOFTWARE MAP HARDWARE MAP NETWORK MAP INVENTORY AND AUDIT SCHEDULED EVERY SUMMER, SEM BREAK AND ICT QUARTERLY SOFTWARE MONITORING PATCHING OF ALL WINDOWS OPERATING SYSTEM UPDATES AND FINE TUNING CEU LIBRARY SOFTWARE
DEMO WINDOWS SERVERS UPDATE SERVICE 3.0 PATCHING ALL MICROSOFT SOFTWARE PRODUCTS
DEMO FOLLETT REPORTS MODULE CIRCULATION STATISTICS PATRON STATISTICS
DEMO VIRUS DEFINITION UPDATE, SCANNING AND CLEANING USING AVG AND SYMANTEC
WORKSHOP MANUAL SOFWARE INVENTORY USING THE TEMPLATE GIVEN TO YOU, INVENTORY THE SOFTWARE OF THE SECTIONS ASSIGNED TO YOU. CYBRARY 2/PERIODICAL SECTION SCIENCE/FILIPINIANA/ REFERENCE SECTION TECHNICAL SERVICES/UGR SECTION CYBRARY 1/CIRCULATION SECTION GRADUATE SCHOOL
WORKSHOP CREATE CIRCULATION REPORTS MONTHLY CATEGORY STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER MONTHLY CIRCULATION STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER PATRON STATISTICS REPORT APRIL, JUNE, JULY, AUGUST, SEPTEMBER
CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER

More Related Content

What's hot

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Testingfor Sw Security
Testingfor Sw SecurityTestingfor Sw Security
Testingfor Sw Securityankitmehta21
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Business Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsBusiness Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsHeather Axworthy
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009OS-Cubed, Inc.
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlusLee Dalton
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishFelipe Luis Garcia C
 
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...ijcsit
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Private Cloud
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 

What's hot (19)

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Testingfor Sw Security
Testingfor Sw SecurityTestingfor Sw Security
Testingfor Sw Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Business Productivity and Automated Security Controls
Business Productivity and Automated Security ControlsBusiness Productivity and Automated Security Controls
Business Productivity and Automated Security Controls
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
 
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
DESIGN AND IMPLEMENTATION OF A RASPBERRYPI BASED HOME SECURITY AND FIRE SAFET...
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Incident response
Incident responseIncident response
Incident response
 
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 

Viewers also liked

library software Slim 21
library software Slim 21 library software Slim 21
library software Slim 21 Yats Bats
 
Open Source Software for Library : STKS
Open Source Software for Library :  STKSOpen Source Software for Library :  STKS
Open Source Software for Library : STKSBoonlert Aroonpiboon
 
Overview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and consOverview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and consYuga Priya Satheesh
 
Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)Tudor Girba
 
Open Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLibOpen Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLibVerus Solutions Pvt ltd
 
KOHA - Open Source Library Management Software
KOHA - Open Source Library Management SoftwareKOHA - Open Source Library Management Software
KOHA - Open Source Library Management Softwarerajivkumarmca
 

Viewers also liked (7)

library software Slim 21
library software Slim 21 library software Slim 21
library software Slim 21
 
Open Source Software for Library : STKS
Open Source Software for Library :  STKSOpen Source Software for Library :  STKS
Open Source Software for Library : STKS
 
Overview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and consOverview of oss(open source software library) and its pros and cons
Overview of oss(open source software library) and its pros and cons
 
Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)Software assessment essentials (lecture at the University of Bern 2013)
Software assessment essentials (lecture at the University of Bern 2013)
 
Open Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLibOpen Source Library Automation Software - NewGenLib
Open Source Library Automation Software - NewGenLib
 
Niatalk24jan10
Niatalk24jan10Niatalk24jan10
Niatalk24jan10
 
KOHA - Open Source Library Management Software
KOHA - Open Source Library Management SoftwareKOHA - Open Source Library Management Software
KOHA - Open Source Library Management Software
 

Similar to Ceu library software asset management (sam)

Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
It securepro 10 nov 2010
It securepro   10 nov 2010It securepro   10 nov 2010
It securepro 10 nov 2010Agora Group
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdfinfo382133
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfaquacareser
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Jose Lopez
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guidesaurabh_classic
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guideSaurabh Singh
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 

Similar to Ceu library software asset management (sam) (20)

Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
unit5final
unit5finalunit5final
unit5final
 
It securepro 10 nov 2010
It securepro   10 nov 2010It securepro   10 nov 2010
It securepro 10 nov 2010
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Cyber security
Cyber securityCyber security
Cyber security
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
Is Using Off-the-shelf Antimalware Product to Secure Your Medical Device a Go...
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
Spe cs getting_started_guide
Spe cs getting_started_guideSpe cs getting_started_guide
Spe cs getting_started_guide
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Siwes Pesentation
Siwes PesentationSiwes Pesentation
Siwes Pesentation
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Ceu library software asset management (sam)

  • 1. CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER
  • 2. WHAT IS SAM? SAM is one facet of a broader business discipline known as IT asset management (ITAM), which includes overseeing both software and hardware that comprise an organization’s computers and network. (Wikipedia) To some, SAM may just be the new name for license compliance. (Centennial Software)
  • 3. WHAT IS SAM? In the Business aspects, SAM is develop as a strategic imperative that enables many organizations to achieve maximum value from their IT investments. It involves integrating people, processes and technology in such a way as to allow software licenses and usage to be systematically tracked, evaluated and managed.
  • 4. SAM AND ISO In 2006, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) began working with the SAM industry to develop a standard of best practices for software asset management programs. Standard ISO/IEC 19770-1:2006, Information technology – software asset management – Part 1, was published by the ISO and IEC in May of 2006.
  • 5. SAM AND ISO Part 1 of the standard details SAM processes including control environment, planning and implementation, inventory, verification and compliance, operations management and life cycle. Part 2 of the standard is still in progress, and seeks to define a model that will help improve software identification processes.
  • 6. SAM GOALS Reduce software and support costs by negotiating volume contract agreements and eliminating or reallocating underutilized software licenses. Enforce compliance with corporate security policies and desktop standards. Improve worker productivity by deploying the right kinds of technology more quickly and reliably.
  • 7. SAM GOALS Limit overhead associated with managing and supporting software by streamlining and/or automating IT processes (such as inventory tracking, software deployment, issue tracking, and patch (computing) management). Establish ongoing policies and procedures surrounding the acquisition, documentation, deployment, usage and retirement of software in an effort to recognize long-term benefits of SAM.
  • 8. SAM BENEFITS REDUCED TOTAL COST OF OWNERSHIP (TCO) RELATED TO I.T. ASSESTS MANAGE TECHNOLOGY CHANGE MINIMIZE SECURITY RISKS LIMIT COMPLIANCE RISK
  • 9. “THE KEY TO A SUCCESSFUL SAM PROGRAM IS THE LEGWORK PERFORMED BEFORE SELECTING A TOOL”
  • 10. SAM LEGWORKS… EVALUATING EXISTING I.T. ENVIRONMENT GAINING EXECUTIVE SPONSORSHIP SETTING PROGRAM GOALS COMMITTING THE APPROPRIATE HUMAN RESOURCES DESIGNING STRONG PROCESSES THAT SUPPORT THE ORGANIZATION’S BUSINESS OBJECTIVES.
  • 11. SAM GROUND WORK ASSESS NEEDS AND OBTAIN EXECUTIVE APPROVAL DETERMINE ORGANIZATIONAL REQUIREMENTS ESTABLISH BASELINE DEVELOP METRICS AND TIMEFRAME DEVELOP PROCESSES ALLOCATE RESOURCES SELECT AND DEPLOY TOOL
  • 12. IMPLEMENTING SAM CONDUCT INVENTORY ESTABLISH PARAMETERS RUN INVENTORY REVIEW SOFTWARE USAGE ESTABLISH PARAMETERS IMPLEMENT SOFTWARE USAGE METERING MATCH SOFTWARE INVENTORY AND USAGE WITH LICENSES OWNED LOCATE PURCHASING RECORDS CENTRALIZE PURCHASING INFORMATION PERFORM RECONCILIATION EVALUATE DATA AND DETERMINE APPROPRIATE COURSE OF ACTION
  • 13. IMPLEMENTING SAM REVIEW, DOCUMENT AND COMMUNICATE POLICIES AND PROCEDURES SOFTWARE PROCUREMENT SOFTWARE USE LICENSE TRACKING ESTABLISH ONGOING SAM PROCESSES
  • 14. CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping : Store it in a safe place (offsite if possible). Onsite, use of a fire-proof, waterproof, lockable cabinet or safe is recommended.
  • 15. CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE LIBRARY DEPARTMENT * License Documentation Safekeeping : Store it in a safe place (offsite if possible). Onsite, use of a fire-proof, waterproof, lockable cabinet or safe is recommended.
  • 16. CEU LIBRARY MENDIOLA LICENSED SOFTWARE INVENTORY SUMMARY REPORT AS OF OCT. 2008 DOCUMENTS LOCATED AT THE ICT DEPARTMENT * License Documentation Safekeeping : Store it in a safe place (offsite if possible). Onsite, use of a fire-proof, waterproof, lockable cabinet or safe is recommended.
  • 17.
  • 18.
  • 19. SOFTWARE ACQUISITION POLICIES CAN BE ACHIVED BY: Clearly delegate and document responsibility and accountability for acquiring new software and keeping records. Buy software only from reputable resellers. Always keep proper license documentation in a centralized, safe location. This includes original CDs, Certificates of Authenticity, End User License Agreements, original User's Manuals and sales receipts. Track and update your software inventory on a regular basis to help ensure proper licensing. *Please refer to the terms of license agreement before transferring any software.
  • 20. CEU LIBRARY SOFTWARE ACQUISITION POLICIES CENTRALIZED ACQUISITION SYSTEM CEU PURCHASING DEPARTMENT CEU ICT DEPARTMENT CEU PROPERTY DEPARTMENT 2 Budget Approved? Library Dept. software procurement thru Budget Purchasing Department ICT Department YES NO Look for a Vendor and Buy YES OK? 1 1 2 Vendor deliver to the Lib Dept. NO END ICT Dept. will provide Property dept. checks & inventory it.
  • 21. CEU LIBRARY SOFTWARE USE POLICIES BROWSING DOWNLOADING INSTALLING USING SOFTWARE TITLES
  • 22. BROWSING Firewall, Internet Explorer Content Editor to block unwanted and unnecessary website. For student refer to the CEU library Website http://www.library.ceu.edu.ph/access.htm For Library Staff You are not allowed to browse any web site that will cause to eat up the bandwidth of the Internet. Examples are You-tube, online games and video streaming. Your are not allowed to browse the Internet during service hours Staff assigned to research assistance and online reference librarian are allowed to browse the internet. CEU LIBRARY SOFTWARE USE POLICIES
  • 23. DOWNLOADING For students All online periodicals, windows vista, faculty and six(6) Cybrary 2 Internet workstations are allowed for downloading files and checking emails. Students are allowed to transfer files from their USB, floppy disk or CD’s using the File Server as long as it was scanned and cleaned for viruses. For Library Staff Downloading of games, screen saver or any free software from the internet is strictly prohibited. Downloading of files from Internet or other media devices is allowed as long as consulted by the I.T. Staff. CEU LIBRARY SOFTWARE USE POLICIES
  • 24. INSTALLING Pirated software is strictly prohibited Only I.T. staff is authorized to install, operate and administer all the server operating system. For students Installing software or anything needed for their research is allowed as long as consulted by the I.T. staff. Installing unwanted software's like games, instant messaging and other stuff in the Internet workstation is not allowed. For Library Staff Installing unwanted software's like games, instant messaging and other stuff in any workstations is not allowed unless needed for the service like photo editor, scanner and YM. CEU LIBRARY SOFTWARE USE POLICIES
  • 25. CEU LIBRARY SOFTWARE USE POLICIES USING SOFTWARE TITLES Only authorized I.T. staff is allowed to install software. Install software with accordance to the license agreement terms and conditions All software problems should be first reported to the Library I.T. staff. There will be penalties, if any, for not complying with the CEU Library software use policies. Like memo, suspension or your KPI (Key Performance Indicator)
  • 26. CEU LIBRARY SOFTWARE DISASTER RECOVERY PLAN PROTECTING AND RESTORING SYSTEM SOFTWARES PERFORM REGULAR BACK-UPS of systems and files STORE BACK-UP COPIES REGULAR SCANNING AND CLEANING OF VIRUSES AND SPYWARE KEEP ALL LICENSED DOCUMENTATION TECHNICAL SUPPORT Library Department - Julius or Ron : local 243 CEU Computer technician - Aldrin or whoever is available : Local 270
  • 27. CEU LIBRARY SAM PRACTICE PATCHING ALL MICROSOFT SOFTWARE SINCE 2003 SOFWARE UPDATE SERVICE (SUS) 2.0 AND NOW WINDOWS SERVER UPDATE SERVICE (WSUS) 3.0 SP1 PROTECTING ALL SERVERS AND DESKTOPS WORKSTATIONS TO VIRUSES AND SPYWARES USING DEEPFREEZE, AVG AND SYMANTEC. INVENTORY AND AUDIT CEU LIBRARY SOFTWARE COMPLYING WITH ICT QUARTERLY SOFTWARE MONITORING AND AUDIT SINCE 2003. BACK UP, RESTORE AND KEEP SOFTWARE IN A SAFE PLACE SINCE AUTOMATION START WAY BACK 1995 UTILIZE AND MAXIMIZE SOFTWARE USED LIKE FOLLETT LIBRARY SYSTEM.
  • 28. CEU LIBRARY SAM PLAN & GOALS EXISTING TOOLS… ICT SOFTWARE INVENTORY MONITORING AND AUDIT. WINDOWS SERVER UPDATE SERVICES 3.0 SP1 FOR PATCHING (ONLY IN THE LIBRARY DEPARTMENT) VIRUS AND SPYWARE CLEAN-UP FINDINGS… WINDOWS XP SP2 MIGRATION TO SP3 WINDOWS VISTA MIGRATION TO SP1 INTERNET EXPLORER MIGRATION TO NEW VERSION
  • 29. CEU LIBRARY SAM PLAN & GOALS SOFTWARE MATCHING FROM OLD VERSION TO NEW VERSION SOFTWARE TRAINING LIBRARY INTENSIVE TRAINING NEW ACQUIRED SOFTWARE LIKE WINDOWS VISTA AND MS OFFICE 2007 AND OTHER SOFTWARE NEEDS TO BE LEARNED BY THE STAFF. REDUCE SUPPORT COSTS FOLLETT MAINTENANCE AGREEMENTS SHOULD BE ALLOCATED TO OTHER SOFTWARE MAINTANANCE SUPPORT LIKE THE IBS OR USED IT AS DSL CONNECTION FOR LIBRARY.
  • 30. CEU LIBRARY SAM PLAN & GOALS KEEP SOFTWARE SAFE STORING ORIGINAL COPIES IN THE OFFSITE OR FIREPROOF VAULT. CREATE A SOFTWARE AND HARDWARE MAP SOFTWARE MAP HARDWARE MAP NETWORK MAP INVENTORY AND AUDIT SCHEDULED EVERY SUMMER, SEM BREAK AND ICT QUARTERLY SOFTWARE MONITORING PATCHING OF ALL WINDOWS OPERATING SYSTEM UPDATES AND FINE TUNING CEU LIBRARY SOFTWARE
  • 31. DEMO WINDOWS SERVERS UPDATE SERVICE 3.0 PATCHING ALL MICROSOFT SOFTWARE PRODUCTS
  • 32. DEMO FOLLETT REPORTS MODULE CIRCULATION STATISTICS PATRON STATISTICS
  • 33. DEMO VIRUS DEFINITION UPDATE, SCANNING AND CLEANING USING AVG AND SYMANTEC
  • 34. WORKSHOP MANUAL SOFWARE INVENTORY USING THE TEMPLATE GIVEN TO YOU, INVENTORY THE SOFTWARE OF THE SECTIONS ASSIGNED TO YOU. CYBRARY 2/PERIODICAL SECTION SCIENCE/FILIPINIANA/ REFERENCE SECTION TECHNICAL SERVICES/UGR SECTION CYBRARY 1/CIRCULATION SECTION GRADUATE SCHOOL
  • 35. WORKSHOP CREATE CIRCULATION REPORTS MONTHLY CATEGORY STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER MONTHLY CIRCULATION STATISTICS APRIL, JUNE, JULY, AUGUST, SEPTEMBER PATRON STATISTICS REPORT APRIL, JUNE, JULY, AUGUST, SEPTEMBER
  • 36. CEU LIBRARY SOFTWARE ASSET MANAGEMENT (SAM) JULIUS D. CORTEZ COORDINATOR, WEBSITE & SYSTEM SERVICES LIBRARY DEPARTMENT OCTOBER 21, 2008 SERIALS MANAGER