SlideShare a Scribd company logo
1 of 21
Implement an Online
  Help Desk Using
   Event Tracker
You will learn how to:
  • Login to TechAtlas and access Event Tracker
  • Create an event record
  • Provide library staff with access to an Event
    Form
  • Search and sort existing records
  • Update and mark events as Resolved
What is Event Tracker?
 • Help desk tool built around reported “events”
   broadly defined as:
   –   Bugs
   –   Errors
   –   Hardware, software, network, or e-mail issues
   –   Changes (hardware upgrades, etc.)
   –   Requests of any sort (software installation,
       scheduled maintenance, etc.)
Why Use Event Tracker?
• Events can be linked to inventoried equipment in
  TechAtlas.
  – Can group equipment by Library Location (branches or
    areas within a library)
  – Creates customized help desk tool for your library.
• Library staff can log events
  – Don’t need your TechAtlas account password.
  – Fast and direct reporting to Tech Support staff
• Problem/resolution status can be emailed to staff
• Save “old” events to build a technical knowledge
  base for your library.
webjunction.techatlas.org
Suggested Workflow
1. Create Library Locations in Inventory section
2. Inventory technology in your library using the
   inventory tools.


                            2. Inventory networks, computers,
                            software and other technology
1. Create
Library
Locations
Setup Tech Contacts
3. In the TechAtlas account Profile, enter an e-mail
   address for your Tech Contact(s).



                                                A. Click Profile




                          B. Enter email(s) of staff who should
                          receive notification of “events” and
                          will manage technology issues in
                          Event Tracker.
Get Started
4. Open Event Tracker and begin using




                                   A. Open Tools
                                   & Report page
             B. Click Event
             Tracker
Create a Record Using the Event Form




       Click Add New Event to
       access the Event Form

•   Event records can be created while
    approved users are logged into TechAtlas
•   Library staff can add records via a link to
    the form without needing your login
    information.
Creating an Event Record-While Logged In
1. Library Locations you
   created
                                        1
2. Your library’s
                                            2
   inventoried technology
                                    3
   or generic categories
   (Computers, Network,
                                4
   Peripherals,…)
3. ID general type of event
   from list:
    •   Bug, Error, Hardware,
        Software, Network,
        Change, Email or
        Request
4. Enter detailed
   description of problem
Creating an Event Record-While Logged In

5. Defaults to Primary
   Contact name in account
   Profile.
     • Edit to reflect name
        of user, if needed.
6. Enter contact email for
                              5
   future follow up.
                               6
7. Displays date/time event
                              7
   is reported.
Creating an Event Record-While Logged In
8. Status is marked
    Unresolved by default
    when first created.
     • Tech Support can
        change status when
        event is resolved.
9. Resolution text can only
    be entered by Tech
    Support when logged into
    TechAtlas.
     • Keep this information
        to create historic         8
        knowledge base
10. User can request status    9
    updates.
                                   10
Event Form Access for Library Staff
Library staff can report issues without logging into TechAtlas
•   Create a link to the Event Form on:
    –   Your library intranet
    –   Each computer desktop



•   Email library staff a
    link to the form with
    an explanation of use
Launch Event Form
                    Event Tracker provides:
                        a. Customization options
                        b. Event Forms by Library
                           Location




a



                    b
Staff Event Form
•    Event Form accessed off-line is slightly different from that used when
     logged into TechAtlas

1.   Add a custom
     welcome to staff on
     form
                                              1
2.   Staff can view and
     search existing
                                          2
     records before
     submitting a new one
3.   Clicking Send adds
     the event to the
     Event Tracker list of
     records and sends
     an email to Tech
     Support.
                                  3
Event Records = Knowledge Base
       2

 1


               3
                                         4




1.   Click icons to sort by Event Type
                                                                   Marked
2.   View/sort by equipment name/type
                                                                  Resolved
3.   Sort by date issue was Last Updated
4.   Original Description of Problem displays in black text.
      • Resolution text entered by Tech Support and date stamp display in green
Event Records
  Sort and search list of events
1. Hide/show                1
   resolved                        2
   issues                              3
2. Use Search                                  1
   to find issues
                                                   5
   containing
   common text
3. Sort by Event
                                           4
   Type
4. Sort by
   location
5. View by
   name of user
   reporting the
   event
View/Edit
                                                                      1


Tech Support reviews and updates
event records
1.   Click View/Edit
                                        2
2.   Review details of event record
     –   Troubleshoot and take action
         as needed.
3.   Notify others of this issue &/or       morgank@oclc.org; techatlas@webjunction.org
                                        3
     resolution by email, when
     needed.
                                                                        Mark Resolved
                                        4
4.   Update status when resolved
                                                                         when issue is
5.   Describe resolution or status,                                         closed
                                        5
     if work is in progress
Other Useful Features
• View event history on inventoried Computer Profile page


                   Event Tracker history
                     for this computer




                                  •   You can download a spreadsheet
                                      of your events (CSV format).
WebJunction.org/techatlas
Thank you for joining us today.




       techatlas@webjunction.org

More Related Content

Similar to Implement Online Help Desk Using Event Tracker

Mastering informatica log files
Mastering informatica log filesMastering informatica log files
Mastering informatica log filesAmit Sharma
 
williams-wwhf-20210617-eventlogs.pdf
williams-wwhf-20210617-eventlogs.pdfwilliams-wwhf-20210617-eventlogs.pdf
williams-wwhf-20210617-eventlogs.pdfVinceVulpes
 
Back-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETBack-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETDavid McCarter
 
Back-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETBack-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETDavid McCarter
 
Un-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew SkeltonUn-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew SkeltonSkelton Thatcher Consulting Ltd
 
Un-broken logging - the foundation of software operability - Operability.io -...
Un-broken logging - the foundation of software operability - Operability.io -...Un-broken logging - the foundation of software operability - Operability.io -...
Un-broken logging - the foundation of software operability - Operability.io -...Matthew Skelton
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Totan Banik
 
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docxDigital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docxlynettearnold46882
 
SF Bay Area Disaster Management overview
SF Bay Area Disaster Management overviewSF Bay Area Disaster Management overview
SF Bay Area Disaster Management overviewknmontgomery
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
( 4 ) Office 2007 Configure The Official Records Site
( 4 ) Office 2007   Configure The Official Records Site( 4 ) Office 2007   Configure The Official Records Site
( 4 ) Office 2007 Configure The Official Records SiteLiquidHub
 
( 4 ) Office 2007 Configure The Official Records Site
( 4 ) Office 2007   Configure The Official Records Site( 4 ) Office 2007   Configure The Official Records Site
( 4 ) Office 2007 Configure The Official Records SiteLiquidHub
 
COC L1-4 sample.pdf
COC L1-4 sample.pdfCOC L1-4 sample.pdf
COC L1-4 sample.pdfSamiTech2
 
Thick Client Testing Basics
Thick Client Testing BasicsThick Client Testing Basics
Thick Client Testing BasicsNSConclave
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fiDeepak John
 
After The Crash Minimize Your Downtime
After The Crash Minimize Your DowntimeAfter The Crash Minimize Your Downtime
After The Crash Minimize Your DowntimeTechSoup
 
Cashing in on logging and exception data
Cashing in on logging and exception dataCashing in on logging and exception data
Cashing in on logging and exception dataStackify
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)trayyoo
 

Similar to Implement Online Help Desk Using Event Tracker (20)

Mastering informatica log files
Mastering informatica log filesMastering informatica log files
Mastering informatica log files
 
williams-wwhf-20210617-eventlogs.pdf
williams-wwhf-20210617-eventlogs.pdfwilliams-wwhf-20210617-eventlogs.pdf
williams-wwhf-20210617-eventlogs.pdf
 
Back-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETBack-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NET
 
Back-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NETBack-2-Basics: Exception & Event Instrumentation in .NET
Back-2-Basics: Exception & Event Instrumentation in .NET
 
Un-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew SkeltonUn-broken Logging - Operability.io 2015 - Matthew Skelton
Un-broken Logging - Operability.io 2015 - Matthew Skelton
 
Un-broken logging - the foundation of software operability - Operability.io -...
Un-broken logging - the foundation of software operability - Operability.io -...Un-broken logging - the foundation of software operability - Operability.io -...
Un-broken logging - the foundation of software operability - Operability.io -...
 
Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)Software Development Methodologies Library Management System (Part-1)
Software Development Methodologies Library Management System (Part-1)
 
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docxDigital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
 
SF Bay Area Disaster Management overview
SF Bay Area Disaster Management overviewSF Bay Area Disaster Management overview
SF Bay Area Disaster Management overview
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
( 4 ) Office 2007 Configure The Official Records Site
( 4 ) Office 2007   Configure The Official Records Site( 4 ) Office 2007   Configure The Official Records Site
( 4 ) Office 2007 Configure The Official Records Site
 
( 4 ) Office 2007 Configure The Official Records Site
( 4 ) Office 2007   Configure The Official Records Site( 4 ) Office 2007   Configure The Official Records Site
( 4 ) Office 2007 Configure The Official Records Site
 
COC L1-4 sample.pdf
COC L1-4 sample.pdfCOC L1-4 sample.pdf
COC L1-4 sample.pdf
 
Thick Client Testing Basics
Thick Client Testing BasicsThick Client Testing Basics
Thick Client Testing Basics
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
Desk Maintenance
Desk MaintenanceDesk Maintenance
Desk Maintenance
 
After The Crash Minimize Your Downtime
After The Crash Minimize Your DowntimeAfter The Crash Minimize Your Downtime
After The Crash Minimize Your Downtime
 
Cashing in on logging and exception data
Cashing in on logging and exception dataCashing in on logging and exception data
Cashing in on logging and exception data
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Implement Online Help Desk Using Event Tracker

  • 1. Implement an Online Help Desk Using Event Tracker
  • 2. You will learn how to: • Login to TechAtlas and access Event Tracker • Create an event record • Provide library staff with access to an Event Form • Search and sort existing records • Update and mark events as Resolved
  • 3. What is Event Tracker? • Help desk tool built around reported “events” broadly defined as: – Bugs – Errors – Hardware, software, network, or e-mail issues – Changes (hardware upgrades, etc.) – Requests of any sort (software installation, scheduled maintenance, etc.)
  • 4. Why Use Event Tracker? • Events can be linked to inventoried equipment in TechAtlas. – Can group equipment by Library Location (branches or areas within a library) – Creates customized help desk tool for your library. • Library staff can log events – Don’t need your TechAtlas account password. – Fast and direct reporting to Tech Support staff • Problem/resolution status can be emailed to staff • Save “old” events to build a technical knowledge base for your library.
  • 6. Suggested Workflow 1. Create Library Locations in Inventory section 2. Inventory technology in your library using the inventory tools. 2. Inventory networks, computers, software and other technology 1. Create Library Locations
  • 7. Setup Tech Contacts 3. In the TechAtlas account Profile, enter an e-mail address for your Tech Contact(s). A. Click Profile B. Enter email(s) of staff who should receive notification of “events” and will manage technology issues in Event Tracker.
  • 8. Get Started 4. Open Event Tracker and begin using A. Open Tools & Report page B. Click Event Tracker
  • 9. Create a Record Using the Event Form Click Add New Event to access the Event Form • Event records can be created while approved users are logged into TechAtlas • Library staff can add records via a link to the form without needing your login information.
  • 10. Creating an Event Record-While Logged In 1. Library Locations you created 1 2. Your library’s 2 inventoried technology 3 or generic categories (Computers, Network, 4 Peripherals,…) 3. ID general type of event from list: • Bug, Error, Hardware, Software, Network, Change, Email or Request 4. Enter detailed description of problem
  • 11. Creating an Event Record-While Logged In 5. Defaults to Primary Contact name in account Profile. • Edit to reflect name of user, if needed. 6. Enter contact email for 5 future follow up. 6 7. Displays date/time event 7 is reported.
  • 12. Creating an Event Record-While Logged In 8. Status is marked Unresolved by default when first created. • Tech Support can change status when event is resolved. 9. Resolution text can only be entered by Tech Support when logged into TechAtlas. • Keep this information to create historic 8 knowledge base 10. User can request status 9 updates. 10
  • 13. Event Form Access for Library Staff Library staff can report issues without logging into TechAtlas • Create a link to the Event Form on: – Your library intranet – Each computer desktop • Email library staff a link to the form with an explanation of use
  • 14. Launch Event Form Event Tracker provides: a. Customization options b. Event Forms by Library Location a b
  • 15. Staff Event Form • Event Form accessed off-line is slightly different from that used when logged into TechAtlas 1. Add a custom welcome to staff on form 1 2. Staff can view and search existing 2 records before submitting a new one 3. Clicking Send adds the event to the Event Tracker list of records and sends an email to Tech Support. 3
  • 16. Event Records = Knowledge Base 2 1 3 4 1. Click icons to sort by Event Type Marked 2. View/sort by equipment name/type Resolved 3. Sort by date issue was Last Updated 4. Original Description of Problem displays in black text. • Resolution text entered by Tech Support and date stamp display in green
  • 17. Event Records Sort and search list of events 1. Hide/show 1 resolved 2 issues 3 2. Use Search 1 to find issues 5 containing common text 3. Sort by Event 4 Type 4. Sort by location 5. View by name of user reporting the event
  • 18. View/Edit 1 Tech Support reviews and updates event records 1. Click View/Edit 2 2. Review details of event record – Troubleshoot and take action as needed. 3. Notify others of this issue &/or morgank@oclc.org; techatlas@webjunction.org 3 resolution by email, when needed. Mark Resolved 4 4. Update status when resolved when issue is 5. Describe resolution or status, closed 5 if work is in progress
  • 19. Other Useful Features • View event history on inventoried Computer Profile page Event Tracker history for this computer • You can download a spreadsheet of your events (CSV format).
  • 21. Thank you for joining us today. techatlas@webjunction.org