How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Information technology (IT) departments have historically enforced security on end-user computers through a combination of software agents that restrict what the computer can do, mandate particular actions on the part of the user, report various pieces of information back to IT, and regularly check for and apply updates, as well as policy restricti...
Many organizations follow the same error-prone, time-consuming, and redundant procedures to install software manually, whether as part of a master image or on individual computers. Usually this involves visiting a system, executing some sort of interface, selecting a subset of modules or configuring certain options, and waiting for the installer to...
Software defines the functionality and availability of computer systems, particularly those in higher education. Often, though, installing the appropriate applications in a multi-platform environment can be time-consuming, unorganized, and altogether onerous. A common approach to this problem is to create a thick image with all of the software pre-...
The image deployment process requires a certain amount of effort, finesse, and luck to effectively execute. Manual techniques are prone to inefficiency and inconsistency, and commercial products necessitate costly software, server-side additions, or network changes; and likely, these tasks must be performed by specialized IT staff. Dwindling resour...