The school district uses a shared storage system which has different partitions for students and teachers. This way the teacher’s information can be protected more effectively. Yes this is beneficial because if you need to save some information quickly or save something for class you can do so on the shared storage area without needing a flash drive. Having the shared storage allows you to access the information you save from any computer on the network which is especially useful for those teachers that are travelers.
The school uses Microsoft outlook to share email between staff and students. The email system can be used from both school and home. The email system can be accessed from any computer which allows teachers to keep in touch with students, parents, faculty, and administrators. I use the email system from both school and home in order to keep in touch with fellow teachers on schedule changes. Email has become an essential form of communication and as such needs to be available as much as possible. I use email to remind my self of important issues as well as administration uses email to keep in touch with faculty.
In this chapter the most important thing covered I think was acceptable use policies. Whether it be internet or access in general there has to be policies in place to manage both. I found the examples in the book to be excellent guides to see how to create such policies and good models of what need to be in these policies. I think it is important to note that everything dealing with technology changes rapidly so these policies should be updated every year. The interesting thing is that everyone has to sign them yet no one remembers signing them. There should be a better way to get the message across like a program the first time users log on that makes them go thru screens and read the acceptable use policies having already signed them of course. Acceptable use policies are so important it is like an insurance policy you don’t want to get caught without insurance but also keeping all these records can be quite tedious. Acceptable use policies have to focus on covering all scenarios because if it isn’t specified than it could be considered acceptable. In this chapter there were lots of great management tips and techniques that allow a system to rum more smoothly, the examples provided clearly depict what is necessary to run a well organized network.