John Tyndall

John Tyndall
Pennsylvania State University | Penn State · College of Information Sciences and Technology

BS, MS

About

4
Publications
1,679
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8
Citations
Additional affiliations
June 2005 - present
Pennsylvania State University
Position
  • Information Technology Manager
Education
June 2012 - May 2014
Pennsylvania State University
Field of study
  • Information Sciences & Technology
January 2000 - December 2003
Pennsylvania State University
Field of study
  • Computer Engineering

Publications

Publications (4)
Conference Paper
Full-text available
Information technology (IT) departments have historically enforced security on end-user computers through a combination of software agents that restrict what the computer can do, mandate particular actions on the part of the user, report various pieces of information back to IT, and regularly check for and apply updates, as well as policy restricti...
Conference Paper
Full-text available
Many organizations follow the same error-prone, time-consuming, and redundant procedures to install software manually, whether as part of a master image or on individual computers. Usually this involves visiting a system, executing some sort of interface, selecting a subset of modules or configuring certain options, and waiting for the installer to...
Conference Paper
Full-text available
Software defines the functionality and availability of computer systems, particularly those in higher education. Often, though, installing the appropriate applications in a multi-platform environment can be time-consuming, unorganized, and altogether onerous. A common approach to this problem is to create a thick image with all of the software pre-...
Conference Paper
Full-text available
The image deployment process requires a certain amount of effort, finesse, and luck to effectively execute. Manual techniques are prone to inefficiency and inconsistency, and commercial products necessitate costly software, server-side additions, or network changes; and likely, these tasks must be performed by specialized IT staff. Dwindling resour...