Connect

advertisement
onnect
C
Spring2004
Volume14,Number2
InformationTechnologyatNYU
Welcome to the Spring 2004 edition of Connect!
Thanks to the hard work and creativity of many talented
NYU community members, this edition of Connect is the
largest, most varied issue it has been my pleasure to work
on. It seems to have something for everyone, featuring
articles about computer security and online privacy,
digital archives, online journals, web design for handheld
devices, the redesigned campus network, support for
researchers at NYU, advances in arts technology, a recent
ITS Client Satisfaction Survey, and more.
I hope that you find this issue of Connect as informative
and interesting as I have, and that you will send your feedback and ideas for future issues to us at its.connect@nyu.edu.
As always, many thanks to Connect’s talented contributors for finding the time in their busy schedules to share
their news, knowledge, and expertise with our readership.
- Kate Monahan
Editor
Kate Monahan
kate.monahan@nyu.edu
The Editor gratefully acknowledges
the invaluable editorial support of
Jill Hochberg and Norma Kenigsberg.
Contributors
David Ackerman,
John Bako,
Robyn Berland,
Eduardo DeLeón,
Joanna DiPasquale,
Ken Fauerbach,
Philip Galanter,
Carlos Garcia,
Jill Hochberg,
David Hoover,
Jimmy Kyriannis,
Jeffrey Lane,
Frank LoPresti,
Tracey Losco,
Ben Maddox,
Kate Monahan,
Martha Rust,
Jennifer Vinopal,
James Viskochil,
Will Wilson,
Robert Yaffee,
Yingkai Zhange, and
Matthew Zimmerman
About Connect
Connect: Information Technology at NYU is edited and published
by Information Technology Services (ITS). Its scope includes
information about computing, networking, and telecommunications across NYU’s various schools, departments, and
administrative units, as well as developments in information
technology outside the University.
Print copies of Connect are available at the ITS Faculty
Technology Center, the ITS computer labs, the ITS Client
Services Center, the NYU Information Center, and most graduate school offices. Copies are mailed to full-time University
faculty, staff, administrators, and researchers, based on
mailing lists administered by the Human Resources Division.
Current and past issues of Connect are also available on the
Web at http://www.nyu.edu/its/pubs/connect/.
If you are a full-time faculty member and do not receive
a copy, please notify your dean’s office; full-time staff should
notify their human resources representative. If you are not
among these groups but would like a free subscription, please
send e-mail to its.connect@nyu.edu.
We welcome your comments about the articles in this issue,
as well as suggestions for future issues. Contributions are
invited for consideration by the editor.
Opinions expressed in the articles in this publication are
those of the authors and not necessarily those of Information
Technology Services or of New York University.
Thanks also to...
Will Arnold, Jeff Bary, Doug Carlson,
Lucinda Covert-Vail, Jane DelFavero,
Vincent Doogan, Lorna Hughes,
Carol Mandel, and Marilyn McMillan.
http://www.nyu.edu/its/pubs/connect/
Copyright © 2004 New York University.
Contents•Spring2004
Computing in the Arts
ITS Computer Labs
4 Rapid Prototyping
Additive Technologies That Will Reshape
Design & Manufacturing
By Philip Galanter . . . . . . . . . . . . . . . . . . . .
2
4 Inspiration, Innovation & Interactivity
The ITP Winter Show 2003
By Kate Monahan . . . . . . . . . . . . . . . . . . .
33
Humanities Computing
Digitizing Chaucer’s Canterbury Tales
7
4 ITS Supports NYU Global Affairs
By John Bako and Ben Maddox . . . . . . . . .
A Look at Rocks Cluster Distribution for
HPC Researchers
. . . . 29
Social Sciences, Statistics & Mapping
4 Federal Census Files
By Frank LoPresti . . . . . . . . . . . . . . . . . . . .
11
4 The Wireless Arch
Handheld Devices & New Usability
Heuristics
By Joanna DiPasquale . . . . . . . . . . . . . . . . 13
.................
By Frank LoPresti . . . . . . . . . . . . . . . . . . . .
46
48
NYU Libraries
Preserving & Presenting an Online Journal
4 When Computer Viruses Strike
4 Protect Your Privacy When
Browsing the Web
4 SAS Analyst
31
4 Calabash
Computer Security
Based on a True Story—Don’t Let this
Happen to You!
By Tracey Losco . . . . . . . . . . . . . . . . . . . . .
4 Econometric Data Mining
with PcGets
By Robert Yaffee . . . . . . . . . . . . . . . . . . . .
Wireless Computing
By Joanna DiPasquale and
Jennifer Vinopal . . . . . . . . . . . . . . . . . . . . .
18
37
41
4 ARTstor
A Digital Archive of Art Images for
Study & Research
By James Viskochil . . . . . . . . . . . . . . . . . . . 44
Outreach
Network Services
4 NYU-NET 3
4 High Performance Computing
Rocks at NYU
Simplifying Statistical Analyses
Global Affairs
By Eduardo DeLeón
Research Technologies
By Will Wilson, Yingkai Zhange, and
David Ackerman . . . . . . . . . . . . .
4 The Clerk’s Tale
By Matthew Zimmerman, with Martha Rust,
David Hoover, and Carlos Garcia . . . . . . . .
4 What’s New in the ITS Student
Computer Labs
By Robyn Berland . . . . . . . . . . . . . . . . 26
4 The 2003 ITS Client Satisfaction Survey
Our Third-Generation Campus Network
By Jimmy Kyriannis . . . . . . . . . . . . . . . . . . 21
By Jill Hochberg, with Ken Fauerbach and
Jeffrey Lane . . . . . . . . . . . . . . . . . . . . . . . .
50
Spring 2004 • Connect: Information Technology at NYU
1
COMPU TING IN THE ART S
Rapid Prototyping
Additive Technologies That Will Reshape
Design & Manufacturing
By Philip Galanter
galanter@nyu.edu
W
hether invoked in the
may not be a prototype at all, but
creation of works of
rather the actual final object.
fine art or products
However, the traditional crefor mass consumption, the process
ation of prototypes, whether from
of design is a cycle of activity that
simple hand sketches or finely
remains the same—even as new
drafted plans, is both expensive
technologies and tools continue
and time-consuming. In practice,
to emerge. Each design cycle can
the designer often cannot afford
spawn dozens of sketches, all
the time or expense to create frecompeting for the designer’s attenquent prototypes, and thus many
tion and approval. Like a gardener
design cycles pass between physor animal breeder, the designer
ical models. Rapid prototyping
selects the best specimens from
technology offers the 3D designer
one design cycle, then transforms
a solution to this problem.
and combines them to create
Simply stated, rapid protoeven stronger designs among the
typing uses automated techprogeny. And so it goes, over and
nologies to provide substantial
over again, until the final design is
improvements in the speed and
completed.
When designing objects,
as opposed to flat images,
there is a need to create
‘three dimensional sketches’
in the form of physical
prototypes. As models,
prototypes provide the real
world sensory feedback
needed to make aesthetic
judgments. Prototypes can
also aid in the functional verification of a design, enable
an ergonomic evaluation, or
simply serve as tools of persuasion in a presentation.
And for some, especially fine
artists, the last prototype
The ZPrinter 406 rapid prototyping system.
2
Connect: Information Technology at NYU • Spring 2004
cost of prototype creation. Rapid
prototyping does not represent a
break with the tradition of cyclical
design by incremental improvement or successive approximation; rather, it speeds the design
cycle and increases the use of
prototypes to an extent that new
ideas, new results, and new techniques become possible. It’s also
worth noting that in a commercial
setting, rapid prototyping can often
provide a significant and demonstrable return on investment.
In many ways, rapid prototyping
is the natural result of two earlier,
converging technologies. For the
past several decades, Computer
Assisted Design (CAD) software has provided designers
with computer-based tools
for drafting, mechanical
drawing, architectural blueprints, and so on, offering
advantages similar to those
available to 2D designers
using desktop publishing
tools. Over the same period
of time, machine shops have
used Numerical Control
(NC) computers with milling
machines, allowing the
automation of their operation, and thus the creation
of parts at lower expense
and greater precision.
virtual creations and reconnecting
with the physical world by using
“high-tech” tools. A sampling
of currently available devices is
described below.
Z CORP. ZPRINTER SYSTEM
Sample objects created by a Z Corp. ZPrinter.
Rapid prototyping in a sense
marries these two technologies by
allowing designers to create plans
for real world objects in the virtual
world of the computer, and then in
a single step to create a physical
object directly from those plans.
However, there is an important
difference between CAD-driven
NC milling and rapid prototyping.
Traditional
shop
techniques,
whether manual or numerically controlled, are a subtractive
process. They start with a block,
sheet, or tube of raw material and
then, by drilling, cutting, lathing,
and grinding, material is removed,
yielding the desired object or
product. Rapid prototyping, on the
other hand, is an additive process:
the desired object is built from
bottom to top in very thin layers.
Whereas subtractive techniques
require hard-earned craft skills for
the complicated and unique setups
that vary with each job, additive techniques require no special
knowledge on the part of the prototype fabricator. In fact, some rapid
prototyping systems are called “3D
Printers” because it is as easy to
send a model to such a prototyping
system as it is to send a document
to a networked printer. Even complicated mechanisms with moving
parts, multiple enclosed parts, or
trapped volumes, bearing assemblies, and so on can be “printed”
directly, without the need for
further assembly.
This fundamental change from
subtractive to additive methods
has important implications for the
future of robotic manufacturing. It
will allow, for example, the mass
production of unique objects, a
subject that will be touched upon
towards the end of this article.
Rapid prototyping is important to artists because it allows
them to directly translate ideas
into physical objects. It contributes to the trend in the digital
arts of moving away from purely
http://zcorp.com/
The ZPrinter 310 System is one
of the most popular rapid prototyping systems in the university
sector, due to its ease of use, versatility, relatively low cost, and
office-friendly operation. Like the
larger systems from Z Corporation,
the ZPrinter 310 uses a starchor plaster-based powder and a
binding agent applied by an inkjetlike mechanism.
The mechanism passes over a
bin with a thin layer of powder,
applying the binding agent only
where the resulting object is
intended to be solid. Then, a fresh
layer of powder is added to the
top of the bin, and the mechanism
selectively applies another layer
of binding agent. This is repeated
many times until the entire object
has been built up out of many
thousands of layers.
The completed object is then
removed from the bin and any
excess unbound powder is blown
off with compressed air. As an
option, the prototype can then
be immersed in liquid infiltrants,
which saturate the object and have
a lasting effect upon drying. Some
infiltrants will harden and toughen
the relatively brittle ZPrinter prototypes, while others will result in
a flexible or rubbery material.
The ZPrinter 406 System operates in a similar manner, but
along with the binding agent the
inkjet mechanism also acts like
a traditional color printer, and
applies the four CMYK pigments
that combine to produce virtually any color (see the example on
Spring 2004 • Connect: Information Technology at NYU
3
the front cover of this magazine).
The resulting object can have any
number of arbitrarily colored sections, and the color permeates the
object, allowing for sanding of the
surface, if desired.
Recently, Z Corporation introduced the Zcast process for the
direct production of molds that
can be used to cast aluminum or
other non-ferrous metals. An artist
with a metal sculpture in mind
can create the (positive) model in
a 3D package such as Autocad or
Maya, directly create a (negative)
mold in a single step on a ZPrinter
310 or 406, then bring that mold to
the sculpture studio and create a
direct cast—all without the use of
intermediates. The Zcast process
can be used with a ZPrinter 310
or 406 and does not require additional special hardware.
While the Z Corp. systems
seem to be leading the pack, especially in the university sector, there
are some tradeoffs. Starting at
about $30,000, the cost is relatively low and competitive, but
the maximum size of the resulting
object is modest, with a so-called
“build envelope” of 8” x 10” x 8”.
Each layer is only about .003”
to .010” thick, but some competing
devices allow for even greater
laminar resolution. The surface
texture is also a bit rough relative to other processes. Finally, the
material is somewhat brittle in its
untreated form, and some feel that
the need to use infiltrants as a final
step is an unwanted hassle, while
others prefer the options various
infiltrants offer.
STRATASYS PRODIGY PLUS
http://www.stratasys.com/NA/
The Stratasys Prodigy Plus is
about as easy to use as the Z
Corp. systems, but it exploits an
entirely different mechanism and
4
material. Utilizing a fused disposition modeling process, the Prodigy
Plus creates prototypes out of
durable ABS plastic. Tiny dots
of ABS plastic are deposited and
fused in very thin layers, creating
a plastic object that is as strong as
an industrially manufactured part.
Trailing the Z Corp. systems a
bit, Prodigy Plus layers can be from
.007” to .013” thick, and parts can
be only a single color (the color of
the plastic used). The maximum
size of a Stratasys object is slightly
larger than is possible with Z Corp.
systems, with a build envelope of
8” x 8” x 12”.
As rapid prototyping
literally reshapes our
homes and even our
bodies, it will become
a basic technology
of interest to all.
One interesting problem any
rapid prototyping system must
solve is the support of the object
it is building while it builds it. For
example, imagine a model of a tree
being constructed from the bottom
up—any
downward
hanging
branches would initially have to
float in mid-air until the connection to the trunk was completed in
upper layers.
In the Z Corporation system,
this problem is solved by the
excess, unbound powder that surrounds the object and supports any
unattached parts. Other systems
have to create temporary supports
that are cut away once the prototype is completed. The Stratasys
uses the unique WaterWorks
system that creates supports out
of a second, water-soluble material that can be washed away once
the object is finished.
Connect: Information Technology at NYU • Spring 2004
The primary advantage of the
Prodigy Plus is the strength of
the ABS plastic material it uses
and, relative to some systems, the
WaterWorks removable support
system.
THE SOLIDSCAPE T66
http://solid-scape.com/t66.html
The Solidscape T66 is a specialized rapid prototyping device that
excels at the creation of small
parts with very fine details. These
parts can be used as “investment
casts” in a lost wax process for
casting metal such as jewelry.
The T66 allows a small build
envelope of 6” x 6” x 6”, and uses
only a single, somewhat soft, waxy,
thermoplastic material. This material, however, holds fine detail,
resists thermal expansion or other
distortion, and, when removed
in mold-making, leaves behind
virtually no ash or residue.
The T66 offers very high resolution, with layers from .0005” to
.003”, and the ability to produce
features as small as .01”. What the
Solidscape T66 lacks in generality,
it makes up for in resolution. For
those working with jewelry or the
casting of other very fine parts, it
is a uniquely powerful tool.
OTHER SYSTEMS
The systems noted above are
among those most often used by
artists, but there are many others:
• Industrial systems are available at greater expense from Z
Corporation and Stratasys with
build envelopes of nearly two
feet on each side.
• An older rapid prototyping
technology called stereolithography uses a vat of photoreactive liquid that solidifies at
the surface when struck by a
A sample prototype produced by a ZPrinter.
relatively cool scanning laser. A
system such as the 3D Systems
SLA 7000 offers high resolution layers from .001” to .005”
with a 20” x 20” x 23” build
envelope and very smooth surface textures. The resulting
objects are relatively strong, but
can also be used as patterns
for investment casting. (See
ht t p://w w w.3dsystems.com/
products/sla/sla7000/.)
• A large class of rapid prototyping machines use powdered
metal to create metal objects.
Selective Laser Sintering (SLS)
machines build up layers of powdered metal that are fused into
a solid object by a hot scanning
laser. SLS parts can serve as
prototypes, but are also directly used as short run products in
industries such as aerospace.
The 3D Systems Vanguard, for
example, can create arbitrary
metal objects within a build
envelope of 14.5” x 12.5” x 17.5”,
with features as small as .02”.
(See http://www. 3dsystems.com/
products/sls/vanguard/.)
• Metal objects can also be
created by a Direct Material
Deposition process where tiny
amounts of metal powder are
applied and immediately fused
to the part by a highly accurate tool—integrating the powder delivery system and a laser.
Such systems can dynamically mix different metal powders creating objects made of
alloys that vary in composition
across the object in a highly
controlled manner. AeroMet,
perhaps the largest of these
systems, can create objects
out of the usually difficult-tomachine Titanium, in a build
envelope of 10’ x 10’ x 4’. (See
http://www.aerometcorp.com/
theMachine.htm.)
THE FUTURE STATE OF THE ART
The current buzz among rapid
prototyping experts is the paradigm
shift from rapid prototyping
to additive manufacture. Most
objects now created by rapid
prototyping systems are standins for something that will later be
manufactured by other means. But
that practice is changing.
Some futurists imagine rapid
prototyping-inspired additive manufacturing factories that can laminate
all manner of materials, creating
finished products in a single pass,
allowing for personalization and
customization with each item, and
providing the ability to build all
sorts of different products without
having to reconfigure a production line. For example, imagine an
integrated car dashboard built as
a single piece on a single machine,
including all the needed switches,
displays, and mechanical indicators, or, for that matter, imagine an
entire car built this way.
The future, in fact, may not
be so far away. University of
Southern California Engineer
Behrokh Khoshnevis hopes to
create a robotic “house printer”
that can custom-pour arbitrary
cement structures as soon as
2005. Integrated with a design
system to drive the process, one
could custom-specify any number
of house designs, including
curving and irregular walls
that would be difficult to build
any other way, and then simply
“print” them out on-site. (See
http://www.newscientist.com/news/
news.jsp?id=ns99994764.)
Medical applications represent a burgeoning market for rapid
prototyping and additive manufacturing, and some products are
already available. An alternative
to braces, the Invisalign product
allows dentists to send traditional
x-rays and casts to the company’s
3D computer imaging facility.
Invisalign then uses the derived
data to drive a rapid prototyping
facility, which creates a series of
custom removable aligners made
from clear plastic. Each uniquely
fits the given person’s mouth,
and, over a period of months, the
patient’s teeth are slowly moved
into alignment. (A streaming video
about the product is available
at http://www.invisalign.com/US/
html/explore/MFGVideo.jsp.)
Spring 2004 • Connect: Information Technology at NYU
5
Envisiontec’s Bioplotter applies
rapid prototyping technology to
grow living tissue for implantation
into patient-specific shapes (e.g.,
an ear). In the future, shape information will be extracted from MRI,
CAT, or ultrasound scans, and
then used to drive the Bioplotter,
which will build replacement skin,
cartilage, or bone from biodegradable scaffold materials and
cell cultures from the patient.
Because the cells come from
the patient, replacement tissues
created via rapid prototyping
will be immune to rejection. (See
http://envisiontec.de/03hbiopa.htm
and http://www.e4engineering.com/
item.asp?id=48516.)
In the near term, rapid prototyping offers artists and designers
an extremely powerful tool. But, as
rapid prototyping literally reshapes
our homes and even our bodies, it
will become a basic technology of
interest to all.
For more information about
rapid prototyping, please see the
corresponding project page at the
Arts Technology Group website:
http://www.nyu.edu/its/atg/pages/
projects/rp/.
Philip Galanter is Associate Director
of the Arts Technology Group at ITS
Academic Computing Services.
Laser Cutting and Etching for
Artists at NYU
This spring, a new device was added to the Arts Technology
Studio at the ITS Multimedia Lab located at 35 W. 4th Street.
While not, strictly speaking, a rapid prototyping device, the
Universal Laser Systems X2-660 does allow artists to easily
cut and etch flat materials from digital plans. Just about any
flat material up to 32” x 18” other than metal can be cut or
etched, including plexiglass, acrylic plastic, vinyl, paper, matte
board, cardboard, cork, fabric, leather, rubber, and wood.
Glass, stone, and treated metal can be etched but not cut.
The Universal X2-660
Plans can be prepared using popular design packages such
as Adobe Illustrator or CorelDraw, as well as CAD-oriented
packages such as AutoCAD. The designer simply draws
lines or text with the standard tools, and uses colors to code
which lines are intended as cuts and which are intended as
etched lines. In addition, pixel-based graphics such as JPEGs
or Adobe Photoshop files can be burned into a surface as a
duotone or grayscale image. The system uses an extremely
thin laser beam and highly accurate X/Y plotter mechanism
allowing, for example, the creation of interlocking pieces or
inlay materials.
For more information about accessing this device, please send
e-mail to the author at galanter@nyu.edu.
6
Connect: Information Technology at NYU • Spring 2004
Jeff Bary of the ITS Arts
Technology Group, operating
the new laser system.
HUM ANITIES COMPU TING
The Clerk’s Tale
Digitizing Chaucer’s Canterbury Tales
By Matthew Zimmerman, with Martha Rust, David Hoover, and Carlos Garcia
matthew.zimmerman@nyu.edu; martha.rust@nyu.edu; david.hoover@nyu.edu; carlos.garcia@nyu.edu
F
or the past four months,
the Humanities Computing
Group within ITS’ Academic
Computing Services has been
providing technical support to
Professors David Hoover and
Martha Rust of NYU’s Faculty of
Arts and Sciences Department of
English in the development of an
electronic edition of Chaucer’s
“The Clerk’s Tale.” This edition
is part of the Canterbury Tales
Project, an international, multiuniversity endeavor based at De
Monfort University, Leicester,
England and directed by Dr. Peter
Robinson.
The Canterbury Tales Project is
working to provide new transcriptions of all the extant manuscripts
and early-print copies of Chaucer’s
Canterbury Tales on CD-ROM, with
the ultimate goal of determining
“as thoroughly as possible” the
textual history of the Tales.1 The
work undertaken to achieve these
linked goals may be divided into
four stages:
1. As the first step, each manuscript is transcribed and encoded. Transcription is done using
BBEdit and the Canterbury
Tales font, a character set
designed to accommodate latemedieval English manuscripts.
Encoding conforms to the guidelines of the TEI (Text Encoding
Initiative), which is the standard
for mark-up of electronic texts in
the humanities. Once completed,
each transcription is reviewed
by two separate readers.
2. Next, the transcriptions are
compared to each other using
a collation software program,
Collate, first developed for the
Project. This program creates
a record of the agreements
and disagreements among
the manuscripts and encodes
that record of variants in XML
(Extensible Markup Language).
3. Then, the body of variants is
analyzed using the “cladistic”
methods of evolutionary biologists; this type of analysis
yields a working delineation of
the “genetic” relations among
the various copies of the text
and facilitates queries against
the data in order to refine that
analysis further.
4. In the final stage of this process,
each tale is published on CD-
ROM in a format that allows
users to access black and white
images of every page of every
manuscript or early-print copy
of that tale as well as full-text
electronic transcriptions. The
CD-ROM editions also allow
users to compare differences
among manuscripts or print
copies at any given point in the
text. These comparisons are
facilitated by Anastasia, another software program that was
developed for the Canterbury
Tales Project. See figure 1 on
page 8 for an example from
Caxton’s Canterbury Tales.
To date, the Canterbury Tales
Project has published “The Wife
of Bath’s Prologue,” “The General
Prologue,” “The Hengwrt Chaucer
Digital
Facsimile,”
“Caxton’s
Canterbury Tales: The British
Library Copies,” and is working
on “The Miller’s Tale,” “The Nun’s
Priest’s Tale,” “The Franklin’s
Tale,” and “The Merchant’s Tale,”
in addition to “The Clerk’s Tale.”
The online editions are available at
http://www.cta.dmu.ac.uk/Caxtons/.
Since the scope of the Canterbury
Tales is so large—consisting of 24
tales in addition to the “General
1. “The Canterbury Tales Project: About the Project,” http://www.cta.dmu.ac.uk/projects/ctp/about.html. This web page is also
the source for the description of the Project’s stages of production and analysis.
Spring 2004 • Connect: Information Technology at NYU
7
Figure 1. The Canterbury Tales website at http://www.cta.dmu.ac.uk/Caxtons/.
Prologue”—Robinson has begun
to form collaborative partnerships
with scholars around the world to
produce editions.
The Canterbury Tales Project has
formed partnerships with Brigham
Young University, Virginia Polytechnic Institute and State University,
the Institut für Buchwissenschaft
und Textforschung at the University
of Münster, Germany, and now New
York University. NYU’s work on “The
Clerk’s Tale” marks the first time the
group at De Montfort University has
trained another group in the entire
range of skills and tools used in this
project—from first transcription,
collation, and analysis right through
to final electronic publication.
The completion of the edition
of “The Clerk’s Tale” should take
8
about two years. The first step is
to transcribe into electronic text
the 53 existing manuscript and
early-print copies of the “Tale.”
This task is currently being carried
out by a team of five transcribers,
including Professors David Hoover
and Martha Rust and three graduate students from NYU’s English
Department: Adam Coccaro, Mark
Hewitt, and Amanda Leff. (Funds
for graduate student stipends have
been supplied through a generous
grant from the NYU Humanities
Council.)
Initially, the transcribers are
working from digitized images
derived from microfilm copies of
the manuscripts. Upon completion
of the transcription process, one
or more members of the transcrip-
Connect: Information Technology at NYU • Spring 2004
tion team will travel to England to
consult the original manuscripts
to verify any readings that are in
question.
TECHNICAL CONSIDERATIONS
AND SOLUTIONS
While the transcription methods,
Collate software, and Anastasia
server were all developed by
Peter Robinson at DeMontfort,
the Humanities Computing Group
(HCG) has actively provided
technical support to the project.
Access to three computers in
the Studio for Digital Projects and
Research has been provided for
use as transcription stations. The
Studio, housed in Bobst Library, is
a joint project of the NYU Libraries
and ITS. The computers have large,
high-resolution monitors to view
the scanned manuscripts and all
of the software needed to produce
the electronic transcriptions. In
addition, the HCG provides server
space for storage of the manuscript
images and transcribed texts. This
allows the manuscripts and texts
to be accessed from any computer
with web access and also provides
data protection and backups.
Perhaps the most important
contribution the HCG has made
to the project, however, is the
implementation of a Concurrent
Versioning System (CVS) repository for version control of the transcriptions. CVS is typically used
by teams of computer programmers working on one project. It is
a client-server system that allows
a project member to “check out” a
file from a project, make changes
and additions to the file, and then
return that file to the server.
CVS keeps track of the changes
made and assigns a version
number to that file. At any time,
a user can go back and see previous versions of the file. Thus, if
a mistake was made in updating
or changing a file, the previous
version can be called up to replace
the updated version. Also, if two
people have checked out the
same file from a project at the
same time, they can work on the
files separately and both sets of
changes will be integrated into the
new version. If there are any conflicts (e.g., the same part of the file
has been edited), CVS notifies both
people before making any permanent changes.
The CVS repository has made
life a bit easier for “The Clerk’s
Tale” editors and transcribers.
Before this system was implemented, transcribers for previous
Canterbury Tales projects saved
files using a system of codes for
the tale name, manuscript name,
transcriber’s name and version
number. For instance, for a Caxton
version of “The Clerk’s Tale,” a
transcriber could create a file
called “CL-Cn-TS-1” where “CL”
stood for “Clerk’s Tale,” “Cn” stood
for “Caxton,” “TS” stood for the
transcriber’s initials, and “1” meant
it was the first version. Then with
subsequent changes to the file, the
transcriber would save it as “CLCn-TS-2”, “CL-Cn-TS-3,” etc.
Figure 2. BBEdit’s CVS Menu.
In theory this system is sound,
but in practice it is prone to problems. A transcriber might forget to
update the file name before saving
it, and therefore overwrite the previous version. Also, after months
of transcribing, there could be
hundreds of versions of one transcription, meaning hundreds of
files, usually stored locally on
the transcriber’s machine. Lastly,
there was no cataloging system to
track what changes were made in
each version of the file.
The CVS repository has solved
these problems. Typically, CVS
is run from a UNIX command
line, which is prohibitive for the
casual computer user, but for
the Clerk’s Tale project, the NYU
team is using the built-in CVS
menu in BBEdit version 7.0, a text
editor software program for the
Macintosh platform.2
Now, when an editor wants to
work on a file, he or she “checks
out” the project from the CVS
repository by choosing one of the
UNIX checkout scripts the HCG
has created, available directly
in the BBEdit menu. Files in the
project can then be opened, edited
locally, and “committed” to the
CVS repository as often as the
editor wishes.
Every time a file is committed,
it is saved to the CVS repository as
a new version of the file, thereby
preserving all previous versions.
If an editor wants to go back and
look at a previous version, he or
she can simply check that version
out of the system. These commands are all available in BBEdit’s
CVS menu (see figure 2). In addition to saving multiple versions of
the file, the CVS system also saves
certain administrative data about
each version: the username of the
person who committed the file, the
date and time it was committed,
and any comments about the file
the person may have added.
Each time a file is committed,
the person saving the file is given
an opportunity to make comments about the file or the changes
they have made (see figure 3). An
editor can also choose to compare
different revisions against one
another (see figure 4).
So now, instead of having
to save hundreds of files under
2. To access BBEdit’s CVS menu, Apple Developer Tools must also be installed (http://developer.apple.com/tools/download/ ).
Spring 2004 • Connect: Information Technology at NYU
9
work area and secure data backup.
CVS has proved to be a very successful tool for managing the large
number of files associated with the
transcription of “The Clerk’s Tale,”
and may be adopted by the other
partner universities working on the
project.
This project exemplifies how
ITS can collaborate with professors like Dr. Rust and Dr. Hoover
by providing the technical support
needed to allow them to focus on
the scholarly aims of a project and
free them from concerns about
day-to-day technical details.
RELATED LINKS
Figure 3. BBEdit’s CVS allows editors to add comments to a version.
different names and knowing little
about when those files were saved
or what changes were made, a
person can quickly see a list of all
the versions of a file, when it was
saved, whom it was saved by, and,
if comments were added, what
was changed or added to the file.
And he or she has access to any of
these versions at any time.
Although the real work of the
Clerk’s Tale project is the scholarly
editing and transcription being
done by Professors Hoover, Rust,
and their staff, the HCG has been
pleased to facilitate the project
through the technical assistance
it has provided. The transcription
stations and server space provide
the project with a dependable
• Anastasia: http://www.sd-editions.
com/anastasia/
• BBEdit: http://www.barebones.
com/products/bbedit/
• Canterbury Tales Project:
http://www.cta.dmu.ac.uk/
projects/ctp/
• Caxton’s Canterbury Tales: The
British Library Copies: http://
www.cta.dmu.ac.uk/Caxtons/
• The ITS Humanities Computing
Group: http://www. nyu.edu/its/
humanities/
• Studio for Digital Projects and
Research: http://www.nyu.edu/
studio/
• Text Encoding Initiative:
http://www.tei-c.org/
Figure 4. CVS makes it possible for editors to compare revision versions.
10
Connect: Information Technology at NYU • Spring 2004
Matthew Zimmerman is a Humanities
Computing Specialist in ITS’
Academic Computing Services;
Martha Rust and David Hoover are
professors in NYU’s FAS Department
of English; Carlos Garcia is a student
working with the ITS Humanities
Computing Group.
GLOBAL AFFAIR S
ITS Supports NYU Global Affairs
By John Bako and Ben Maddox
john.bako@nyu.edu; ben.maddox@nyu.edu
I
n 1958, New York University
created its first “Study Abroad”
program in Madrid, Spain, as
an initiative of the Spanish and
Portuguese Literature Department.
Since then, NYU has opened centers in Florence, London, Paris,
Prague, and Buenos Aires (suspended in 2001). Additionally, in
the fall of 2004, an academic and
research center on the western
coast of Africa, in Accra, Ghana,
will open to host students, faculty,
and staff.
On the subject of spending time
abroad as a student, former NYU
Vice-Provost Farhad Kami was
fond of saying that “no 21st Century
education is complete without a
global component to it.” He also
believed that the experience is “not
only about how we see others, but
knowing and understanding how
others see us.” NYU’s investment
in the Study Abroad program is a
demonstration of the University’s
commitment to diverse educational
opportunities for its students.
When NYU students study
abroad, they register for courses
using the SIS/Albert process that
is familiar to them, but the courses
are taught by international faculty
at one of the Study Abroad locations (known as Global Centers).
The Study Abroad program
allows NYU students to immerse
themselves in a different culture
and take classes consistent with
academic standards at NYU’s
Washington Square campus, while
avoiding the pitfalls often associated with studying abroad, such as
having to transfer course credit.
Each Global Center has a student
computer lab, a local network, and
local IT support ranging from fulltime staff to outsourced maintenance and service agreements. ITS
Telecommunications, ITS Network
Services and ITS Client Services
here at Washington Square provide
support as well. The Florence and
London Centers also offer a residential network (in two residence
halls) and telephone voice mail
service and support, similar to
what is provided at Washington
Square.
The other Global Centers house
their students away from the academic center, so students manage
their own “home” computing
needs, while using the computer
labs for e-mail, coursework, and
general correspondence. Students
at each of the Centers generally can
use the labs from 8:00 am to midnight, Monday-Friday, and from
8:00 am to 5:00 pm on weekends.
During academic year 2001/
2002, activity at the NYU Center
in Buenos Aires, a modern, vibrant
facility in the heart of the city, was
suspended due to political instability in Argentina. As a result,
NYU’s Office of Global Affairs
and ITS were unable to recover
network equipment and desktop
computing hardware at the location. This situation encouraged us
to take a more structured managerial approach to lab inventory and
policies regarding desktop computing at the Global Centers.
In the spring of 2002, ITS
Academic Computing Services (ACS)
and Global Affairs collaborated
towards this end by sending staff
to NYU in London and Prague for
assessment, upgrades, and installations. We also created an online
assessment tool and questionnaire
for collecting information about
inventory and individual computing
practices. Based upon helpful feedback from the staff at each Global
Center, we formed a project plan
that outlined the need for increased
training, more web-based services,
and standards and policies for
student, faculty, and staff desktop
computing.
GLOBAL ITS MANAGEMENT
STATEMENT
Over the years, a benchmark
statement to guide technology
Spring 2004 • Connect: Information Technology at NYU
11
planning for the Global Centers
was developed and refined:
• To provide, whenever possible,
continuity of services for students, staff, and faculty from
Washington Square to each
NYU Global Center.
• To create a system of managed
expectations for support and
services.
• To select equipment and strategies which are technically
secure and fiscally responsible.
By leveraging ITS expertise, under the leadership of
Associate Provost and CITO
Marilyn McMillan, Director of ITS
Academic Computing Services
Vincent Doogan and Director
of ITS Network Services, Doug
Carlson (with the support of ITS
staff members John Bako, Jamil
Hamilton, and Carlo Cernivani),
the groundwork for change was
laid. Some common needs were
identified for each site: regular
upgrades to equipment in the
student labs; the establishment of
standards for virus protection and
computer and network security;
and staff training. For instance,
with limited bandwidth, the lab
networks were continually clogged
by non-academic usage, such as
the downloading of images, music,
and movies for entertainment—a
development that site staff was not
trained or prepared to deal with.
IMPLEMENTING THE PLAN
Execution of the Global Centers
plan is a work in progress. In
fall 2003, ITS and Global Affairs
entered into an agreement to strive
to standardize computer replacement for student lab machines at
NYU’s Global Centers. The agreedupon approach roughly parallels
the 36-month lab replacement
cycle employed at ITS student
computer labs. The goals associated with this arrangement are
to provide improved academic
support, practicality, and consistency: by giving the Centers the
tools and practices they need; by
standardizing equipment and the
approach to management; and
by offering continuity of services,
wherever possible, for students,
staff, and faculty traveling between
Washington Square and the
Centers abroad.
The first visit in support of this
new initiative was made in early
2002 to the London Center. There,
Jamil Hamilton and Ben Maddox
addressed outstanding problems
with existing equipment that negatively affected lab operations, by
sharing ITS lab management best
practices used in our Washington
Square student labs. Then, in the
summer of 2002, the Prague Center
purchased new student lab and
faculty computers. Jamil Hamilton,
John Bako, and Ben Maddox
visited the site to provide technical
support and staff training.
In 2003, ACS, given budget and
time constraints, set the goal of
upgrading one third of the oldest
computers at the Centers each
year. The decision was made to
initially focus on the Florence,
London, and Prague Centers, and
then share successes with Madrid
and Paris (currently managed
by NYU’s Faculty of Arts and
Science).
New
equipment—
including 14 computers in London
and 22 in Florence, plus one computer at each location to serve
as a server for Symantec Ghost,
Symantec AntiVirus, and Microsoft
Software Update Services (SUS)1—
was acquired by ACS. Between
January 5 and January 15, 2004,
Global Affairs and ACS staff visited
the London and Florence Centers
to install the equipment and train
local IT support staff on ITS lab
management best practices. The
staff, directors, faculty, and students at the Global Centers could
not have been more appreciative
of the equipment, training, and
support.
Plans to support the Centers
with the same kind of service provided to the Washington Square
community is an ongoing process,
full of opportunities for creativity,
as well as unique challenges, such
as how to best manage the support
needs of locations in seven time
zones, and how to find the best
financial and human resources.
By working together to listen
to the needs of the Centers,
identifying those needs which
we can address, and striving to
provide solutions, ITS is making an
impact everyday on the experience
of our students, faculty, and staff
abroad. Collaboration, creativity,
and action are the cornerstones
of our approach to supporting the
Global Centers, and the work is
flourishing. For more information
about NYU’s Global Centers,
please visit http://www.nyu.edu/
global/.
NYU Global Affairs would like
to express special thanks to the
following ITS staff for their help
involving the Global Centers:
John Bako; Doug Carlson; Jane
DelFavero; Joe DiMeo; Vincent
Doogan; Jodi Goldberg; Michael
Hocke; Marilyn McMillan; Jorge
Najera-Ordonez; Yoni Radzin;
Catherine Trejo; and Laura
Tretner.
John Bako is the manager of the ITS
Tisch Hall computer lab; Ben Maddox
is Associate Director of Global
Information Technology at NYU.
1. See http://www.symantec.com/ghost/;
http://www.symantec.com/ghost/ http://www.symantec.com/nav/
http://www.symantec.com/nav/; or http://www.microsoft.com/windowsserversystem/sus/.
12
Connect: Information Technology at NYU • Spring 2004
WIRELESS COMPU TING
The Wireless Arch
Handheld Devices & New Usability Heuristics
By Joanna DiPasquale
joanna.dipasquale@nyu.edu
D
o you have a hand-held
wireless device, such as
a Pocket PC or Palm organizer, that has a web browser? Are
you glad to have web access, but
frustrated that some sites don’t
seem to display properly or work
well on your device? You’re not
alone: while an estimated 10%
of the US workforce “currently
use[s] some sort of personal digital assistant (PDA) or handheld for
business purposes” and universities introduce innovative ways to
use handhelds in the classroom,
few websites are “small screen”
enabled.1,*
This deficit certainly isn’t for lack
of users of handhelds or due to low
popularity of these devices: by June
30, 2002, cell phone subscribers
had surpassed the 130 millionmark, wireless “hotspots” for IEEE802.11b-compliant devices (such as
a Pocket PC with wireless card) had
fanned out across New York City,
and sales of mobile digital devices
had simply exploded.2 Yet, usability
guru Jakob Nielsen recently found
that much of the mobile Web consists of less-than-useful, restructured pages.
Rather than scaling back sites
and providing easy menus, web
designers seem to have been dis-
tracted by the novelty of the technology. “Putting them [i.e., traditional sites] on a small screen is
like the dog that sings: the miracle
is that it does so at all,” Nielsen
wrote in August 2003 (see inset
on p. 16). “While a technical
feat, usability is never going to
be good.” 3 The traditional Web,
which often uses column-structured layout and graphic-intense
screens, simply doesn’t scale down
very well. Web designers need to
look carefully at the application
and the function of each screen to
make their sites PDA-ready.
Figure 1. A sample page from the Wireless Arch, the NYU Libraries’
mobile electronic gateway to online resources
(http://library.nyu.edu/mobile/ from your handheld device).
* Endnotes for this article are located on page 17.
Spring 2004 • Connect: Information Technology at NYU
13
When NYU Libraries examined its website for redesign4 and
released a more user-friendly
interface for researchers in fall
2003, we also began discussions
about various types of Internetready devices. Could we adapt
some of our pages for small
screens? What types of usability
obstacles would we meet, and
how could we overcome them to
make PDA-ready information?
Would we have a “singing dog,”
or a gateway that mobile users
could…well, use?
BACKGROUND OF THE PROJECT
Although the Libraries completed
extensive user testing, we were
unsure if this testing actually
applied to “reading in the small,” as
researchers Catherine C. Marshall
and Christine Ruotolo dubbed
traditional applications fitted to
PDAs.5 Usability testing of our
“large” site had demonstrated that
we needed an easy-to-use way to
deliver electronic resources (such
as journal articles), and that this
function had to rest at the forefront
of any new design.6 This was the
area of the site that we wanted to
adapt to the small screen.
In fall 2002, I spoke with
research scientist (and mobile Web
usability guru) Dan Moss at the
Center for Advanced Technology
at NYU about making this idea
a reality.7 Dan and I worked to
develop new guidelines for the
Libraries’ small-web interface;
the result is the Wireless Arch, a
component of the Libraries’ new
website specifically designed for
PDAs and other pocket computers.
Along the way, we learned that
many usability principles adapted
well to a smaller medium, while
others needed a new philosophy
(as Nielsen had suggested) before
a usable interface could emerge.
14
THE WIRELESS ARCH
http://library.nyu.edu/mobile/
The Wireless Arch—as the name
suggests—is a specially-tailored
mobile gateway for a more robust
system of electronic resources at
users’ fingertips: the Arch. The
Arch, available on the Libraries’
standard-sized website, provides
access to high-quality electronic
resources, and delivers lists of
items such as electronic journals,
research databases, and other
librarian-selected resources by
subject, updated in real time. 8
However, it is designed with the
large screen in mind. Thus, the
Wireless Arch provides the same
resources, but in “the small”
(figure 1). Its extensive resource
database includes items such
as the Oxford English Dictionary
Dictionary,
ProQuest, Lexis-Nexis, and Ovid.
The Wireless Arch interface has
two major search components:
(1) a comprehensive search engine
for all electronic resources, divided
by subject and type of resource
(like journals, image databases,
or subject encyclopedias), and
(2) the ability to search for an
electronic database by title. The
Arch also allows users to access
information about Bobst Library’s
Figure 2. The Wireless Arch interface was designed with usability in mind.
Connect: Information Technology at NYU • Spring 2004
match between the system and the
“real world” by employing a tactic
familiar to users.9
We also added a brief “help”
section (figure 3) to give users
a place to learn more about the
Wireless Arch, and how to connect,
resolve password/authentication
problems, and set screen resolution.
DESIGNING-IN-THE-SMALL:
SOME THINGS WE LEARNED
ALONG THE WAY
Figure 2. A sample Wireless Arch results screen.
hours through their PDAs; pending
development includes the ability
to renew a book from the “small
screen.”
Within the interface, users
can type a few search terms,
or research by subject in three
clicks—select a subject, select a
material, and (if desired) set the
number of results per page (see
figure 1). This latter option seemed
appropriate, even if it meant one
more click for the user, because
it gave him or her ultimate control
over the display. Once a user
makes his/her selections, results
are displayed page by page (the
default is up to ten results at a
time), with the URLs needed to
connect (figure 2).
Each page has internal “back,”
“forward/next,” and “home” buttons.
We believed this internal navigation
was a high priority for our interface
design—it provided an experience
similar to a large-screen Internet
browser, no matter what operating
system a user’s handheld might
employ. This is another heuristic
adapted to wireless; it represents a
To develop the Wireless Arch,
Dan and I worked at Bobst Library
and the Center for Advanced
Technology to design an interface
that would be easy to use on any
handheld computer. We needed
to design for the “wireless Web,”
that part of the World Wide Web
“whose design is impacted by the
concern for smaller devices and
less sophisticated displays…[such
as] reduced bandwidth, limited
display sophistication, and most
intractably the limited screen ‘real
estate’ of PDAs as compared with
desktop and laptop computers.”10
Figure 3. An example from Help for the Wireless Arch,
which includes information on how to use the interface
and on technical problems and troubleshooting
(http://library.nyu.edu/mobile/ > “Help” or
http://library.nyu.edu/mobile/help.html).
Spring 2004 • Connect: Information Technology at NYU
15
The Mobile Web:
One Generation from Useful?
“Information browsing also needs to change [to become
mobile]. Currently, the best we can hope for are websites
that are basically scaled-down and redesigned to eliminate
graphics and multi-column layouts. At worst, websites offer
no mobile version, so you get crunched images and skinny
columns that are almost impossible to read.
“Clearly, traditional websites are intended for a big-screen
user experience. Putting them on a small screen is like the
dog that sings: the miracle is that it does so at all. While a
technical feat, usability is never going to be good.
“To cater to mobile devices, websites and services should
offer:
• much shorter articles,
• dramatically simplified navigation, and
• highly selective features, retaining only what’s needed in
a mobile setting.”
Jakob Nielsen, “Mobile Devices: One Generation from Useful.” Alertbox, 18
Aug 2003. http://useit.com/alertbox/20030818.html, accessed 19 Aug 2003.
This approach required stripping away most of the elements
that make the Web pleasing—
for example, color, tables, and
graphical elements—to ensure a
fast-loading, readable screen. We
needed to scale down the largescreen Arch, while providing the
same level of service. Right away,
the necessity of two interface
adaptations became clear: color
and size.
We adopted a dichromatic color
palette—maroon, gray, and blue—
which provides an interface that
is very easy on the eyes of a user
whose distance between face and
screen may be much smaller than
when using a desktop computer.
We scaled down our graphics
and, in case the device does not
read graphics, ensured that they
16
are completely unnecessary to the
execution of a search.
Additionally, we chose a vertically-based layout: point-and-click
navigation and “thumb scrolling”
(literally, using a thumb-controlled
wheel on the PDA to navigate up
and down a page) met the general
pattern of user behavior, for it is
much easier to scroll vertically
than horizontally, and useful to
“jump” to a relevant area on the
page in one click.
We also needed to tailor the
functions of the Wireless Arch to
work with other basic behavior
patterns of handheld computer
users. Bobst Library had quite
a lot of usability data indicating
that users believed more strongly
in a “data mining” approach than
a “full overview” map. Our users
Connect: Information Technology at NYU • Spring 2004
often wanted to quickly search
for an item and generate a list of
results relevant to their topic.11
This approach worked well for
a larger medium with an external
keyboard, but fell short when measured against a handheld device.
Handheld computers lend themselves to a literal “point-and-click”
scheme: armed with a stylus (or
electronic pen that functions similarly to a mouse), our interface
had to obtain results in five clicks
or less.
We chose organized dropdown menus and divided the site
into two major sections: known
items (e.g., “I need to use LexisNexis”) and unknown items (e.g.,
“I’d like to see all of your encyclopedias in Italian Literature”). This
division made our job much easier:
by grouping the page by function,
we were able to create a scaleddown, easy interface with minimal
options but maximum power.
ACCESSING THE WIRELESS
ARCH: CURRENT AND FUTURE
FEATURES
Members of the NYU community
with a PDA and a wireless card
can access the Wireless Arch over
standard HTTP protocols using
NYURoam wireless access points,
like those located at the Kimmel
Center and on Bobst Library’s
A and B levels and 6th floor. To
connect via these access points,
users must configure their wireless
cards (on the IEEE-802.11b or
802.11g standard) to work with
NYURoam (instructions and access
location information available at
http://www.nyu.edu/its/wireless/ ).
As the Arch grows, we hope to
provide substantial increases in
records and more comprehensive
searches throughout spring 2004.
To receive updates about new
library resources, and learn more
about the Wireless Arch, subscribe
to LIBLINK, the library e-mail
newsletter for the NYU community (http://forums.nyu.edu?enterliblink). To access the Wireless
Arch, point your handheld at:
http://librar y.nyu.edu/mobile/
y.nyu.edu/mobile/.
Answers to frequently asked questions, as well as further information on how to connect, are available by clicking “help,” or going
directly to: http://library.nyu.edu/
mobile/help.html.
The development of the
Wireless Arch has brought up
many issues that libraries and
other information repositories will
face as this medium gains its predicted market share. As we adapt
our interfaces and increase the
functionality of the NYU Libraries’
websites to serve this growing
trend, the URL above will point
mobile users to more tasks that
they can do “on the go.” We also
hope to provide some functions via
cell phone in accordance with the
wireless markup language standard (WML).
Though it may have seemed
absurd only five or six years ago
for us to think that we could carry
our computers in our pockets,
clearly we can—and now we can
even read a peer-reviewed journal
on its tiny screen! As the needs of
NYU researchers grow—and their
computer devices shrink—we hope
that the Wireless Arch will be their
gateway to thousands of online
resources.
If you are interested in future
developments, or would like provide
feedback about these services,
e-mail feedback@library.nyu.edu.
Joanna DiPasquale is Web
Administrator at NYU’s Bobst
Library.
ENDNOTES
1. Delia MacMillan, William
Clark, “Client Issues for
Mobile Applications,” Gartner
Reports, 30 Oct 2003. http://
www.nyu.edu/its/pubs/gartner/
research/118200/118215/
118215.pdf, accessed Feb.
118215.pdf
22, 2004. Thomas, Karen,
“Handheld, No Hand-Holding:
Students Gain Computing
Power, Get Organized with
Help of PDAs,” USA Today
Today, 8
May 2001, p. D3.
2. Karen Alexander, “Solving the
Cellphone Maze One Twist
at a Time,” New York Times, 2
Feb 2003, Sec. 3, p.11; John R.
Quain, “Tapping Into Public
Wireless Networks,” New York
Times, 12 Dec 2002, sec. G, p.
5; Claire Tristam, Technology
Review, 105:3 (Apr 2002), 34-40.
Review
For an interesting survey
gloss on the telecommunications industry in general, and
handheld computers specifically, see TelecomWeb’s précis
at http://www.telecomweb.com/
wirelessdata/studies/
1015370659.htm (accessed 17
Feb 2003).
3. Jakob Nielsen, “Mobile
Devices: One Generation from
Useful.” Alertbox, August 2003.
http://www.useit.com/alertbox/
20030818.html, accessed
August 19, 2003.
4. See Mary Jean Pavelsek, Gloria
Rohmann, and Nadaleen
Templeman-Kluit, “Web
Usability Testing: Three Cases
from NYU Libraries,” Connect
Magazine (New York: New
York University ITS, Spring
2002).
5. Catherine C. Marshall and
Christine Ruotolo, “Reading in
the Small: A Study of Reading
on Small Form Factor Devices.”
JCDL 2002: Proceedings of the
Second ACM/IEEE-CS Joint
Conference on Digital Libraries,
July 14-18, 2002 (Portland, OR:
ACM, 2002), p. 56ff.
6. Pavelsek, Rohmann,
Templeman-Kluit, Ibid.
7. http://cat.nyu.edu/
8. See James Visokochil’s article,
“ARTstor: A Digital Archive
of Art Images for Study and
Research,” on p. 44 of this
issue.
9. Nielsen, “Ten Usability
Heuristics,” http://www.useit.
com/papers/heuristic/heuristic_
list.html (accessed 09 Feb 2003).
10.John McCullough, “Redesigning
Library Applications for PDAs:
ILS Vendor Perspective.” Library
Hi Tech, 21:4 (2003), p. 396.
11. Pavelsek, Rohmann,
Tempelman-Kluitt, Ibid. For
example, a “data mining”
approach—defined in web
terms—would be a “Search
this Site” feature, where users
can explore a site based on a
keyword query. In contrast, a
“full overview” would be a web
site map, giving users all the
options on one page. An
excellent discussion of these
and other methods can be
found in Ben Shneiderman,
Designing the User Interface:
Strategies for Effective HumanComputer-Interaction, 3rd ed.
(Boston: Addison-Wesley
Longman, 1998).
Spring 2004 • Connect: Information Technology at NYU
17
COMPU TER SECURIT Y
When Computer Viruses Strike
Based on a True Story—Don’t Let this Happen to You!
By Tracey Losco
tracey.losco@nyu.edu
N
ora-yin Ulysses is a typical student at NYU: she’s
a good student, belongs
to a sorority, has a part-time job,
and surfs the Web—a lot. One
day, Nora came home from her
job, turned on her computer and
started a search on Google, when
suddenly, to her surprise, her computer automatically rebooted. She
hadn’t done anything that would
have caused this—it was almost
as if the computer had a mind of
its own.
When her computer came
back up again, Nora resumed
her search, only to find that once
she started typing, her computer
rebooted again! At this point, Nora
started feeling frustrated because
she had a really important project
due for one of her classes, and she
needed access to the Web to do
research.
Nora picked up the phone
and contacted NYU’s computer
support people at the ITS Client
Services Center (1-212-998-3333).
When she explained her situation to Joe, the support person
who answered her call, he said
that it sounded as if her computer
had been infected with a virus or
someone had broken into it. At this
point Nora went into panic mode.
“I have important information on
18
my computer! What am I supposed
to do now?”
“Do you have backups of your
hard drive?” asked Joe.
“What’s that?” said Nora.
Joe cringed and said, “That
sounds like a “no” to me. Do you
make copies of all of your important information onto another
computer or onto a disk or CD
every month or two?”
Nora answered, “No, why
would I do that?”
Joe explained, “So that you
would be able to get back your
important information if something happened to your computer.”
At this point, Nora became even
more agitated. “No,” she said, “I
don’t have copies of anything!”
“OK,” Joe said, “let’s move on.
Do you run anti-virus software on
your computer and do you keep it
up to date?”
“Of course I have anti-virus
software,” exclaimed Nora, “NYU
gives it out for free through
NYUHome. I installed it, so how
could I get infected?”
“Well,” responded Joe, “just
installing it isn’t enough. You have
to keep it updated. And, to do that,
you have to set it up to automatically check for and download those
updates, called “virus definitions.”
Otherwise the software is useless.
Connect: Information Technology at NYU • Spring 2004
New viruses come out daily, so if
you have never updated your software, you aren’t protected from
any of the new viruses. That’s
important to remember: your software is only useful if the virus definitions are up to date.”
Nora, now both frustrated
and scared, replied, “Why didn’t
anyone tell me this? I never
updated the software. I thought
that all I needed to do was just
install it!”
“OK,” Joe said gently, “the Read
Me file that comes with the software actually explained this, and
we also have it on the ITS website
and in our publications, but the
important thing right now is that
we can get your computer running
normally again. Let’s check a
few other things. What operating
system are you using?”
Nora replied, “I’m using a PC
with Windows ME.”
“OK,” said Joe, “When was the
last time that you checked for a
Critical Update to your operating
system?”
“What’s a Critical Update?”
“Uh oh,” said Joe. Nora’s
answer told him exactly what had
happened. He explained, “Critical
Updates are important fi xes and
patches for your operating system
that are released by Microsoft
when a new security risk is discovered. You need to check for
them and install them on a regular
basis. I’m sorry to say it, but it
does sound like your computer
was attacked by either a virus or a
worm. If you didn’t have the most
recent virus definitions or any of
the Critical Updates installed, your
computer was basically an open
target.”
“Wait,” Nora exclaimed, “I
thought I heard that NYU scans all
the University’s e-mail to remove
any viruses before they get to
us? I’ve seen some of those messages in my inbox that say that ITS
caught and removed an infected
message. So, how did this virus
get to my computer? Is this NYU’s
fault?!”
“No,” said Joe, “let me explain
how NYU checks for viruses.
When messages arrive at NYU,
before they are forwarded to your
account, they are sent through
a virus filter which catches most
infected messages.1 That virus
filter is updated with new virus
definitions when they are released,
in the same way that you would
update your own anti-virus software. So, just as new viruses may
slip past your desktop anti-virus
software, some mail infected with
extremely new viruses may slip in
past the NYU mail filter without
being detected.”
“Okay, then my main question
is, what do I do now?!” asked Nora
desperately.
“Well,” replied Joe, “first we can
try and have you download the
most recent virus definitions. You’ll
need to restart your computer in
Safe Mode with Networking, and
then you should be able to get the
definitions and scan for viruses. In
order to restart in Safe Mode you
will need to go to the “Start” menu,
select “Turn Off Computer,” and
then select “Restart”. This will initiate the restarting process. Then,
while your computer is restarting,
hold down the F5 key. This will
cause the computer to display
a list of choices. Use the cursor
keys to move up through the list
in order to select “Safe Mode with
Networking.”
You should then be able to
download the latest virus definitions for your anti-virus software
from the Internet and then scan
your computer. If your software
does find a virus, be sure to have
it remove the virus and repair your
computer.
“Then, once you finish with
that, you’ll need to restart again to
get out of Safe Mode so that you
can access the Windows Update
website to download all of the
Critical Updates that are available
for your computer. This may take
a while because, from what you’ve
already told me, it sounds as if you
don’t have any of these updates.
Start this by opening Internet
Explorer and selecting “Windows
Update” in the “Tools” menu. Your
computer will be scanned, and
then you’ll see a list of Critical
Updates that have been released
for your operating system. If a
lot of updates appear, select only
three or four at a time to install,
otherwise you may run into problems. Keep installing updates and
rescanning your computer until
no more Critical Updates appear.
If your computer is a laptop, make
sure you have it plugged into the
power outlet when you’re doing
this because these downloads can
sometimes take a while.”
Nora asked, “So, does this
mean that everything is going
to be the way it was before I got
infected?”
Joe replied, “Unfortunately, no.
What this will do is protect you
from any new viruses or worms
that may be released. The steps
we just talked about might fix the
problem, but they might not.”
Nora asked, “What if my computer keeps acting strange?”
“Well,” Joe replied sadly, “you
may need to reformat your computer and start from scratch.
Sometimes computers are so badly
infected that this is necessary.”
“What could I have done to
prevent this?” asked Nora.
“Everything that we went over
earlier,” said Joe, “and be sure to
set your anti-virus software to
automatically check for new definitions and set your computer to
automatically check for Critical
Updates. We have instructions for
doing that on our website at http://
www.nyu.edu/its/faq/security/.
“But even if you keep up with
your virus definitions and Critical
Updates, there is still a chance
that you might get infected. With
viruses, it’s a constant game of
‘leap frog.’ A new virus is released
and computers get infected. Then,
anti-virus software manufacturers
create a new definition to detect
and clean this virus, and, if necessary, Microsoft releases a Critical
Update to protect your computer. Then, a new virus or a new
strain of the virus appears and the
process starts all over again.”
“Wow,” replied Nora, “I never
realized that I needed to keep track
of all these things. Is there anything else that I can do?”
“Absolutely,”
replied
Joe.
“Don’t open any e-mail attachments that you receive unless you
are expecting them. Even if you
know the sender, give him or her
a call and ask if the attachment is
legitimate before opening it. Some
1. The graphic on page 20 shows recent NYU virus filter statistics.
Spring 2004 • Connect: Information Technology at NYU
19
viruses are very clever in that they
have their own mailing capabilities
and they send infected messages
to everyone in a person’s address
book…so other people will think
it’s coming from someone they
trust. You should also keep an eye
on the Security Alerts channel on
the main page of NYUHome; that
will tell you about new viruses to
watch out for.”
Nora sighed, then said, “Okay,
thanks for all of your help, Joe; I’ll
get started on this right away.”
Joe said, “Thanks for your
understanding, and take care.”
Nora spent the next few hours
disinfecting and patching her computer, then setting it up to protect
it from getting infected again in the
future. In the end, she was one of
the lucky ones—she didn’t have to
reformat her computer and none of
her important files were lost.
The moral of this story is
that no matter whether you’re a
student, a staff or faculty member,
20
or an administrator at NYU, or a
computer owner anywhere, if you
haven’t taken the steps explained
above, it’s only a matter of time
until you find yourself in Nora’s
predicament…and you might not
be so lucky! For more information
about how to protect your computer and NYU’s network, see the
resources listed below.
•
ADDITIONAL RESOURCES
• The ITS Computer and
Network Security website:
http://www.nyu.edu/its/security/
• Computer security FAQs,
including instructions on how
to help secure your Windows
computer: http://www.nyu.edu/
its/faq/security/
• ITS Computer and Network
Security Awareness Month:
http://www.nyu.edu/its/
securityawareness/
• Most NYU community members can download a copy of
Symantec AntiVirus through
Connect: Information Technology at NYU • Spring 2004
•
•
•
•
•
the Files tab of NYUHome. Log
in with your NetID and password at http://home.nyu.edu,
click the Files tab, then select
the correct version for your
computer.
The Security Alerts
Channel in NYUHome
(http://home.nyu.edu/): the
channel appears under the
E-mail channel on the main
page that opens.
ITS classes on viruses and
security: http://www.nyu.edu/
its/classes/
Windows Update: http://
windowsupdate.microsoft.com
Symantec:
http://www.symantec.com/
Center for Internet Security:
http://www.cisecurity.org
Stay Safe Online:
http://www.staysafeonline.info/
Tracey Losco is a Network Security
Analyst in ITS Network Services.
NE T WORK SERVICES
NYU-NET 3
Our Third-Generation Campus Network
By Jimmy Kyriannis
jimmy.kyriannis@nyu.edu
NYU-NET: WHERE WE WERE
& WHERE WE’RE HEADED
NYU-NET, the campus-wide data
communications network of New
York University, was created in
the early 1970s to support the
computing and networking needs
of the entire University community.
NYU's network originated with
a connection to the ARPANET,
the predecessor of the modernday Internet. A decade later, NYU
was among the first institutions
to implement Ethernet (a type of
Local Area Network [LAN] architecture), and, by 1983, fiber optic
technology was first used on
campus for data communications,
interconnecting two computing
facilities via Ethernet, representing
the first-generation NYU campus
computer network.
As it grew over the following
decade, additional departments—
and, ultimately, entire buildings—
were brought onto NYU-NET
through the use of 10base5 (thick
Ethernet), 10baseFL/FOIRL (fiber
Ethernet point-to-point links),
“5broad36” (5Mbps Ethernet over
cable TV-based broadband technology) and Ethernet bridging
technologies.
With
approxi1
mately 8,000 nodes attached to
the campus network in the early
1990s, a bridged Ethernet approach
to cross-campus networking was
reaching its limits, and in 1994, the
NYU-NET II project was begun. By
the time of its completion, NYUNET II had improved the University
network in a variety of respects,
including performance, resiliency,
and security, through the replacement of the bridged Ethernet backbone with a router-based FDDI
(Fiber Distributed Data Interface)
ring which could automatically
recover from link failures, in combination with a switched FDDI
backbone focused on the highperformance needs of those using
NYU-NET.
The NYU-NET II FDDI ring—a
ring of fiber optic cable spanning
the campus to interconnect routers
located at POPs (points of presence, where departmental networks converge)—never experienced a single failure in its decade
of operation, and has carried an
estimated 2.5PB (1 Petabyte =
1,048,576 Gigabytes) of data to
date. However, as usage of NYUNET II has skyrocketed over the
past decade, an upgrade of the
100Mbps FDDI backbone has
become increasingly necessary to
meet the greater demands that are
being placed on the network.
There have also been increasing
concerns that due to NYU’s urban
location, routine emergencies and
failures, such as steam pipe bursts,
construction work accidents, or
power outages, could wreak havoc
on the campus network, which now
serves more than 100 buildings
and supports a variety of essential
subnetworks and systems.
To address these issues, the
NYU-NET3 project (pronounced
N.Y.U.-net-three) was begun in
early 2001 to design a next-generation campus network that sought
to meet the following criteria:
• meet or exceed the automatic
resiliency features of ring-based
FDDI technology;
• leverage four locations of fiber
optic cabling convergence on
campus for redundancy and
failure protection;
• increase the performance capabilities of the University network;
• upgrade the dated router infrastructure which operated the
network;
• bring new networking technologies to bear to allow for new
services (such as the campus-
1. A “node” can be a computer or some other device, such as a printer.
Spring 2004 • Connect: Information Technology at NYU
21
wide NYURoam 802.11 wireless
service);
• allow for greater access to
high-bandwidth applications
and services, such as those
related to Internet2.
As the NYU-NET3 project
progressed over the past three
years, the need for a vital campus
network that is able to adapt to
and evolve with the needs of the
University community became
increasingly evident. There are
now approximately 35,000 active
nodes attached to NYU-NET (representing more than a four-fold
growth in the past ten years) and
as this number continues to grow,
NYU-NET3 will be there to meet
the demand.
A NEXT-GENERATION CAMPUS
NETWORK: DESIGN CRITERIA
A variety of technologies and
network architectures were considered when designing the nextgeneration University network.
Unfortunately, ring-based technologies such as FDDI fell out of
favor in the industry, and their use
within campus networks has all but
disappeared. Ethernet continues
to be the prevailing technology
in use, though it offers no failure
recovery inherent within its technology. To address this problem, a
rather challenging approach was
developed, by which the resiliency
of FDDI could be matched through
the use of a high-speed gigabit
Ethernet backbone.
One focal point of the new
network design was the replacement of the existing FDDI backbones with a “core network”
which would accept high-speed
gigabit Ethernet connections for
new routers2 located in campus
POPs and server data centers.
Another was that the design had
to be downwardly compatible with
existing NYU-NET II routers that
continue to adequately serve the
needs of the departmental LANs
connected to them. (Such routers,
which provide departmental and
server network access, we call
“Access Routers” or “Distribution
Routers.”) Additionally, given the
critical nature of this new core
network, it was essential to avoid
the possibility of a single point
of failure, so that a single outage
could not disrupt all connectivity
on NYU-NET.
The goal of combining a single
unified core network with redundancy and resilience, distributed across four discrete physical
locations many city blocks away
from one another in downtown
Manhattan, posed some unique
challenges. To satisfy this goal,
given the primary building blocks
of gigabit Ethernet switches and
routers, the architecture of the
new core network depended upon
a combination of network hardware specification and implementation (i.e., how the switches
and routers were assembled and
configured) and physical network
topology (i.e., how they were
interconnected).
Working very closely with
hardware designers and network
engineers from Cisco Systems,
Inc., we validated our hardware
specifications to confirm that we
were able to address the redundancy, performance, and feature
requirements of our project.
This was achieved through the
use of several levels of redundancy within each Core Router
that made up the new network
core. This included features such
as redundant power supplies (to
protect each Core Router from
a single power circuit failure),
redundant primary routing processors (to protect each Core Router
from a primary CPU3 failure),
and redundant interfaces distributed across four interface boards
(to protect each Core Router from
an “interface processor” failure,
and from the possibility of such
an outage causing that router to
become completely disconnected
from the NYU-NET Core).
At the topological level, ultimately, concepts were drawn
from parallel processor computer
research to develop a means by
which four Core Routers—each
located at a point of fiber optic
cabling convergence on campus—
could be interconnected in a
manner to meet the project criteria of redundancy and resilience,
while maximizing the number of
connected paths between them to
offer the greatest amount of available bandwidth within the Core.
Though some basic topologies
such as a square encompassing
all four Core sites, or a full-mesh
(square with a criss-cross mesh
connecting opposite corners), met
the criteria with some success, a
“partial-mesh” network topology
did a better job.
In a partial-mesh network, only
select nodes are interconnected,
rather than all possible nodes, as
they are in a full-mesh design. The
key to achieving a partial-mesh
network topology between our
four Core locations, while maximizing the number of equal links
between them, was to abandon
two-dimensional designs such as
“flat” squares and consider threedimensional models. The additional “space” offered by three
2. Devices that forward pieces of data along a network.
3. The Central Processing Unit (CPU) is essentially the “brains” of the computer, where most calculations take place.
22
Connect: Information Technology at NYU • Spring 2004
Figure 1. One face of the NYU-NET3 Tetrahedron design.
dimensions presented many different ways in which four redundant Core Routers in four different
locations could be connected,
similar to how 4, 16, 64, or more
CPUs could be interconnected
to create a parallel processing
computer. Ultimately, the model
adopted was the Tetrahedron: a
four-cornered equilateral polyhedron.
NYU-NET3: A THREEDIMENSIONAL APPROACH
With a tetrahedron-style network,
each of the four Core Routers is
located on a corner, with three
Core Routers interconnecting
to establish each “face” of the
Tetrahedron, with four faces in
total (see figure 1). This interconnection occurs at the center of each
face. The solid lines in the diagram
represent fiber optic connections
that converge in the center of each
Tetrahedron face.
These connections can operate
at any speed (even with simple
modem-style PPP connections, if
one were inclined to do so), which
Figure 2. The Tetrahedron Core Network structure.
means that this approach is highly
scalable to any amount of bandwidth. The only requirement is that
all links on all faces operate at the
same speed, so as to ensure that
the entire network is balanced and
entirely symmetrical. The dashed
lines in figure 1 do not represent
fiber optic connections, but simply
serve to give the perspective of the
Tetrahedron face itself.
The four faces of the
Tetrahedron, when assembled,
exhibit the final three-dimensional
network architecture (see figure
2). Once again, solid lines represent fiber optic connections, while
the dashed lines simply provide a
reference to the overall structure.
The center of each face, called
a TAP (Tetrahedron Attachment
Point) marks the point on each face
where the three constituent Core
Routers interconnect.
For a substantially greater
level of redundancy and performance, rather than using a single
fiber optic connection from each
Core Router to a TAP, each Core
Router/TAP link operates at 8Gbps
full-duplex4 and consists of eight
redundant connections, each
operating at 1Gbps full-duplex,
distributed across four interface
cards on each device. Using a
technology called “802.1ad Link
Aggregation”, the eight redundant
connections act as one single connection between a Core Router
and a TAP, with network traffic
load-balanced across all eight
fiber optic members. Once again, a
single fiber optic link failure or an
interface card failure will result in
no loss of connectivity within the
Tetrahedron Core Network.
Internally, within the Core, an
Internet Protocol (IP) routing protocol called OSPF (Open Shortest
Path First) is used, which, among
other things, monitors the state
of all Core connections. If one of
the eight 802.1ad links between a
single Core Router and TAP should
fail, the amount of bandwidth on
that link will be reduced, but OSPF
will automatically adjust for that
reduction by favoring the other
higher speed Core Router/TAP
links until the failure is repaired.
4. A mode that allows the transmission of data in two directions simultaneously.
Spring 2004 • Connect: Information Technology at NYU
23
If a complete failure of a
the project, it has taken
Core Router/TAP link on
some time to develop,
any particular Tetrahedron
test, and begin impleface should occur, once
menting the Tetrahedron
again, OSPF will automatiCore. Following the original
cally favor the other availdesign specification of
able links. In any of the
NYU-NET3 in early 2001,
above failure conditions, or
the
author
developed
when the Tetrahedron Core
detailed hardware speciis fully functional, network
fications and finalized the
traffic is load balanced over
architecture design, which
all available links to offer the
were then modeled in the
greatest amount of total Core
ITS Network Services netbandwidth. The Tetrahedron
working lab and tested on
Core contains 12 Core
a production basis for six
Router/TAP links. When
months without failure. The
implemented with each link
final design was presented
operating at 8Gbps, as is
to and certified by network
the case on NYU-NET, a
architecture and hardware
Figure 3. A two-dimensional representation
fully-loaded
Tetrahedron
engineering experts at
of the Tetrahedron Core with Distribution
Routers attached at TAPs.
has the bandwidth-carrying
Cisco Systems. Catalyst
capacity of 96Gbps full6500 Layer-3 switches/
duplex, nearly .2Tbps (terabits
with all four Core Routers. As a
routers were then procured for the
per second) in total. Thus far,
result, a failure of any fiber optic
project and installed in our nethowever, this Tetrahedron design
link will not result in any disrupworking lab, where they were put
represents only the Core of the
tion of network connectivity for a
through a grueling set of tests and
campus network itself. The predepartment or service.
certification steps that lasted for
viously mentioned Distribution
To offer yet another level of
another six months (see figure 4).
Routers, which provide network
redundancy, each dual connecIn the meantime, as network usage
access to multiple local departtion of a Distribution Router is,
continued to climb on the NYUmental subnetworks (subnets),
once again, established through
NET II FDDI backbones, the Friday
must then connect to the Core
the use of two different interface
night scheduled maintenance
in order to provide network concards on both the Distribution and
periods established by ITS 5 were
nectivity to departments, servers,
Core Routers, so that a single fiber
used to develop and implement a
various network services, the
optic or interface hardware failure
temporary switched fast Ethernet
Internet, and Internet2.
will not result in a disconnection
backbone network to relieve
The TAP on each Tetrahedron
of a Distribution Router (and the
network congestion problems.
face provides the interface to which
departments and services conSenior Network Engineer Keith
a Distribution Router can attach to
nected to it) from NYU-NET. If a
Malvetti and Network Engineer
the Tetrahedron Core. Since the
connection diagram of the threeYoni Radzin from the Network and
Tetrahedron provides four redundimensional Tetrahedron Core
Systems Engineering Group within
dant interfaces for attachment to
were adapted to lie flat on a sheet
ITS Network Services provided
the Core, each Distribution Router
of two-dimensional paper, it would
critical assistance in enabling
is redundantly connected to a pair
appear as shown in figure 3.
NYU-NET II to operate smoothly
of TAPs. Since each Distribution
during this time, and were also
Router can “see” or “peer with”
CURRENT PROJECT STATUS
involved in the testing of the
three out of the four Core Routers
Due to the broad scope of the NYUTetrahedron Core in its final stages
with each TAP connection, linking
NET3 project and the demands
(see figure 5).
each Distribution Router to two
of running the existing NYUAs the final step before moving
TAPs ensures that each one peers
NET II network while working on
the Tetrahedron Core into public
5. See http://www.nyu.edu/its/policies/maintenance.html.
24
Connect: Information Technology at NYU • Spring 2004
Figure 4. A pair of Catalyst
6500 Core Routers located in our
networking lab during testing, with
their single mode fiber optic cable
connections active.
production service, several departments within ITS were connected
to the new Core and participated
in the testing of their applications
and services on this new network,
to ensure that it would perform as
well as expected. Much to our satisfaction, tests of a wide variety of
applications and services, such as
NYUHome, NYURoam, fame, and
SIS, all ran very smoothly. The
Tetrahedron Core was then fully
disassembled in our test lab, and
the four constituent Core Routers
were installed in their permanent
locations at the four discrete Core
sites. Mario Clagnaz, Manager of
Infrastructure within ITS Network
Services, and Manny Laqui, also
in that group, then implemented
the Tetrahedron Core reconstruction on-campus, which included
physical installation of the Core
Routers, establishment of electrical
power services for them, and completion of the fiber optic connections to recreate the Tetrahedron
structure.
When completed, 128 fiber
optic connections had been tested
and established in the Core itself,
with a total fiber optic cable
length—if laid end to end—of
approximately 39 miles. Finally,
after a few more weeks of testing
the Core and confirming our
results to ensure that the network
behaved exactly as it had in our
lab, we reached the beginning of
the fall 2003 semester and were
ready to launch NYU-NET3.
Since September 2003, Malvetti
and Laqui have been busy using
the ITS scheduled maintenance periods to both upgrade
existing NYU-NET II Distribution
Routers (in terms of software
and in some cases, hardware)
and connect them to the NYUNET3 Tetrahedron Core, one by
one; Radzin has been busy rolling
out new networks such as those
recently installed in Bobst Library
and the Kimmel Center; and the
author has been working on the
network design and implementation of the campus-wide 802.11
wireless network, NYURoam—all
of which has been made possible
by the Tetrahedron Core network.
MOVING FORWARD…
Looking to the future, NYUNET3 will support a variety of
services not previously possible,
at levels of high-performance.
Some new services have already
been implemented, such as MPLS
(Multiprotocol Label Switching),
in conjunction with 802.1q VLAN
tagging, to make ResNet and
administrative staff networks
simultaneously active in student
residence halls, and NYURoam
services available to remote offices
and buildings connected to NYUNET via leased line T1 and T3
services. MPLS may also provide
us with the ability to offer even
Figure 5. Yoni Radzin and Keith
Malvetti prepare a Core Router
for deployment.
greater levels of network security
in the future. In addition, the
Tetrahedron Core eliminates any
bottlenecks on the NYU-NET
backbone network, providing
computers with modern, switched,
fast Ethernet connections, and very
high-speed access to the Internet
and Internet2 research networks.
Testing of high-speed IP multicast
services is under way as well.
With NYU-NET’s roots in academic research, it seems only
fitting that the design of this innovative third-generation campus
network has drawn upon computer
processor research to solve the
rather challenging problems associated with building a data communications network in support
of the largest private university in
the United States. NYU-NET3 has
achieved all of the goals specified
at the outset of the project and
will continue to evolve to meet
the needs of the NYU community,
acting as an enabler and facilitator
of academic, research, administrative, and business applications and
functions.
Jimmy Kyriannis is Network Manager in
the Network and Systems Engineering
Group of ITS Network Services.
Spring 2004 • Connect: Information Technology at NYU
25
IT S COMPU TER L ABS
What’s New in the ITS Student
Computer Labs
By Robyn Berland
robyn.berland@nyu.edu
The ITS Video Editing Lab
The all-digital Video Editing Lab
at the ITS Third Avenue North
Computer Lab, 75 Third Avenue,
doubles as a teaching lab when
a hands-on session is required.
When not in use as a teaching
space, the ITS Video Lab is used
by students to post-produce their
video projects, often overnight. Inperson reservations are required
(call 1-212-998-3500 for information), but the 15 Video Editing
stations provide adequate timeshares on a 24 x 6 schedule.
This lab has a new look. ITS
Academic Computing Services
redesigned the Video Lab to meet
the dual requirements of this
teaching and experiential space.
The new workstations are oriented toward an instructor’s
station—an interactive whiteboard (SMARTBoard) and lectern.
New lighting controls provide
choices between incandescent and
fluorescent lighting to enhance
video viewing. Faculty can play
VHS, DVD, CD, and DV content
from the instructor’s station. Each
student workstation measures 48”
x 48”, with a cutout that provides
26
room for a swivel chair (see figures
1 and 2). The work surface includes
a leaf that faces the Instructor’s
domain, providing a convenient
writing surface for note taking.
The leaf also provides additional
space for books, video-editing supplies, and the other paraphernalia
students carry around. The leaves
form natural shared workspaces
between students who wish to
work in a team and natural barriers for students who prefer to be
in their own space.
Each Video Editing workstation
contains an Apple G4 Dual GHz
computer, NTSC Monitor, Cinema
Display, and Sony DSR-11 DV deck,
all of which fit snugly but comfortably in the workspace. The operating system has been upgraded
to OS 10.2.8, and new applications have been added to the video
editing software suite, including
but not limited to Combustion, for
applying special effects to video;
DVDStudio Pro, a sophisticated
authoring tool; and FinalCut Pro 4.
Photo by Mitch Shultz.
THE ITS THIRD AVENUE
NORTH COMPUTER LAB
Figure 1. The new workstations at the ITS Video Editing Lab.
Connect: Information Technology at NYU • Spring 2004
Windows Training Room
The
hands-on
Windows
Training Room at the ITS Third
Avenue North Computer Lab
accommodates 17 student workstations positioned along the
two long walls of the room. An
instructor’s station at the end of
the room is equipped with a Dell
Optiplex 270 computer. A new
ceiling-mounted projection unit
and a wall-mounted screen enable
ease of use and clear viewing. The
computer workstations have a
robust suite of software installed,
reflecting the course requirements of our faculty and students.
Each workstation includes a Dell
Optiplex 270 Pentium 4 2.4GHz
computer.
Faculty requests for the installation of additional software on
the computer workstations in
either the Video Editing Lab or the
Windows Training Room can be
made by sending e-mail to Robyn
Berland at robyn.berland@nyu.edu
or John Bako at john.bako@nyu.edu,
respectively. Of course, software
must be appropriate to ITS Lab and
classroom environments and meet
licensing requirements.
THE ITS MULTIMEDIA LAB
The ITS Multimedia Lab at 35
West 4th Street, 2nd floor, has new
Apple G5 1.85 GHz computers. The
computers have a large footprint,
creating natural aluminum divides
between workstations (see figure
3). What’s really new and surprising about the G5s is the
absence of troublesome floppy
and Zip drives. Zip drives can be
borrowed, if needed, for 100MB,
250MB and 750MB disks. However,
if a file is small enough to fit on a
floppy disk, it can be transferred
using the file storage capabilities of
NYUHome, or it can be stored as
an e-mail attachment.
The StuffIt Standard suite of
applications has been added, to
enable our clients to compress
larger files, which further facilitates
the use of NYU-NET as a personal
communication and transportation
medium. The “Dropbox” feature in
NYU Blackboard is also available
to students for communicating
Photo by Mitch Shultz.
Photo by Mitch Shultz.
Figure 2. Students at work in the ITS Video Editing Lab.
and storing their work. Using
the Internet in this way makes it
simple for students to dynamically
store and retrieve their work from
anywhere…in the labs, at home, or
on a laptop connected to NYU’s
wireless network, NYURoam. (For
information on NYURoam access
locations, e.g., @ the Square, 80
Washington Square East, visit
http://www.nyu.edu/its/wireless/.)
The Apple G5s have a
SuperDrive and, like the Apple G4
computers at the ITS Third Avenue
North Lab, can write data to CD
and DVD media. The recent addition of Toast Lite to our application suite allows multiple sessions
to be written to a CD, providing
an inexpensive and relatively reliable way for students and faculty
to submit their work. For larger
storage needs, Toast Lite can be
used to store data files on DVD.
Articles and information found
on the Internet do not have to be
printed and carried from place to
place. Using the software tools
available in the ITS Labs, research
information can be saved in
Adobe PDF format, or collected
in a text document, then archived
to a CD-R or CD-RW, stored in
NYUHome or transferred via
e-mail. An added perk: since this
information remains in electronic
form, it can be cut and pasted into
Figure 3. The New Apple G5
computers at the Multimedia Lab.
Spring 2004 • Connect: Information Technology at NYU
27
research papers without retyping,
making students’ data less cumbersome to carry and easier to
store. NYUHome provides 50MB
of storage (http://home.nyu.edu/
help/files/fileupdownload.nyu),
and e-mail attachments (http://
home.nyu.edu/help/mail/ ) can be
up to 20MB in size.
When preparing documents
for print, use text formats such
as .rtf (rich text format) or .doc
(Microsoft Word document format)
or .txt (text format). Documents
saved in .rtf preserve formatting
across word processing applications. Use a .txt file when building
a collection of information that
does not require special formatting. Printing PowerPoint presentations and PDF documents (graphic
formats) is slow in comparison to
the text formats mentioned above.
Providing course materials in both
view and print formats will help
students work more efficiently
across environments.
ITS
Academic
Computing
Services is introducing new help
documentation on the Macintosh
computers at both the ITS
Multimedia and Third North Labs
to help students and faculty use
our computer resources more
productively. The new documentation, “ITS Multimedia Lab Help
and Information,” is located on the
Macintosh Dock. This documentation is tailored to the lab environment. For help using additional
ITS resources, go to http://
www.nyu.edu/its/faq/. Faculty and
student feedback is integral to producing good documentation; we
encourage you to use the suggestion boxes posted in each facility.
EXTENDED HOURS AT THE ITS
COMPUTER LABS
The ITS Multimedia Lab’s hours
are now extended at the end of
each semester to accommodate
the additional student workload.
Through May 9, the ITS Multimedia
Lab at 35 W. 4th Street will be open
on Sundays from noon to 11:30 pm
and will remain open for an additional two hours on Saturdays,
from 8:30 am until 7:30 pm.
This extension includes access
to the ITS Faculty Technology
Center Drop-In Areas, the Arts
Technology multimedia, rendering
and imaging stations, and the
Multimedia Lab workstations. The
ITS Third Avenue North Lab will
be open from noon on Sundays
to 7:30 pm on Fridays (a twohour Friday extension) through the
end of the spring 2004 semester.
The Tisch Hall Lab will extend its
Saturday hours to 7:30 pm through
May 8.
For details about the ITS labs,
including locations, complete
hours, and equipment, please see
http://www.nyu.edu/its/labs/.
Robyn Berland is the Computer Lab
Manager of the ITS Multimedia Lab.
A Day in the Life of NYUHome
NYUHome, the University’s web portal to a wide variety of information and services, is
being used by NYU students, faculty, and staff on an ever-increasing basis. For example, on
March 10, 2004, a typical recent day in the life of NYUHome, the portal received more than 12
million “hits” across the day. During the peak period of this average day, NYUHome accommodated 722 hits per second, with 1,464 community members using the site concurrently! As we
anticipate that this trend of increased usage will continue, ITS is in the process of engineering
the portal to handle a capacity of ten times that amount: up to 7,200 hits per second.
We are pleased that the ever-evolving NYUHome portal has proved to be so popular with
the University community, and are committed to continuing to meet your needs—both by
expanding and adapting the services NYUHome offers, and by delivering those services to you
with speed and convenience. We encourage you to help us guide the future of NYUHome by
sharing your feedback with us. Please send e-mail to home@nyu.edu, or submit your comments
through the Feedback channel of NYUHome.
28
Connect: Information Technology at NYU • Spring 2004
RESE A RCH T ECHNOLOGIES
High Performance Computing
Rocks at NYU
A Look at Rocks Cluster Distribution for HPC Researchers
By Will Wilson, Yingkai Zhang, and David Ackerman
will.wilson@nyu.edu; yingkai.zhang@nyu.edu; david.ackerman@nyu.edu
A
Linux cluster is composed
of two or more computers,
each running the Linux
open source operating system and
connected in such a way that they
collectively perform like a more
powerful computer. This flexible, scalable, and cost-effective
configuration is rapidly becoming
the dominant system employed
by researchers requiring high
performance computing (HPC). In
an article entitled “Linux Clusters
for the Mainstream Manager,”1
Sean Dague of the IBM Linux
Technology Center says Linux
clusters are “like 1,000,000 ants
vs. one elephant.” But keeping a
million ants in lock step can be a
trying task if not done properly.
To simplify the process, the NPACI
Rocks Cluster Distribution, based
on Red Hat Linux, pulls together
the best of open source software
to make clusters easy to “deploy,
manage, upgrade and scale.” 2
The Rocks Cluster Distribution
delivers a stable HPC platform by
uniting Linux with low-cost commodity hardware. The growing
benefit of using such hardware
to tackle HPC tasks is due to a
price/performance advantage over
more expensive shared memory
machines. That advantage, however,
can disappear quickly if system
administrators get bogged down
with maintaining a large number
of nodes. Rocks employs a clever
technique to avoid this situation
by making a complete operating
system installation the basic management tool. An automated installation process is far more efficient
and effective than an alternative
process that, for example, involves
tracking down nodes that are out
of synch and require patching.
Rocks leverages the automated
installation methods of Red Hat’s
kickstart to install nodes and
allows systems administrators to
bring up a cluster in a relatively
short time.
The physical assembly of a
Rocks cluster requires network
connectivity, two or more computers—a front-end node and
at least one dedicated compute
node—and a sturdy rack (or
racks) to house the cluster. NYU’s
Information Technology Services
is currently running two Rocks
cluster installations, one built
around 16 Dell Xeon servers with
GB Ethernet (see inset on next
page), and the other running on
eight dual processor AMD Opteron
servers with both GB Ethernet and
low latency Myrinet. Each of our
Rocks clusters is configured with
a single front-end node (where
cluster users login, submit, and
monitor their jobs) and several
compute nodes.
The many services required to
manage a Linux cluster—NFS, NIS/
411, DHCP, NTP, MySQL, HTTP, to
name a few—are run on the frontend node. This node is also responsible for kickstarting or automatically installing the compute nodes.
By default, the front-end also acts
as the gateway to the outside,
since it is the only node with an
active external interface. The
front-end node requires an experienced systems administrator to
maintain the required services and
to perform the administrative tasks
that multi-user systems typically
require—e.g., assigning accounts,
performing software installs and
configurations, and so on.
The compute nodes are the
“workhorses” of the cluster.
1. Jacqueline Emigh, EarthWeb, September 25, 2003, http://networking.earthweb.com/netsysm/article.php/3083551.
2. http://rocks.npaci.edu/papers/rocks-documentation/preface.html
Spring 2004 • Connect: Information Technology at NYU
29
The CPU-intensive calculations
researchers submit are run on the
compute nodes. The data from
compute node calculations is
collected on the front-end by way of
an NFS auto-mounted file system.
Rocks maintains a MySQL
database for the cluster configuration files. Changes made to the
database are used to generate
Linux configuration files, and these
files are pushed out to the compute
nodes during the kickstart process.
An Apache server on the front-end
gives a system administrator easy
access to the MySQL database
and the Ganglia cluster monitoring
software. To access the management or monitoring services, a
system administrator can simply
start a Mozilla browser on the
front-end node.
The key to the Rocks Cluster
Distribution is its ability to
rapidly deploy numerous nodes
with quick, automated installations (less than ten minutes per
node). This method helps maintain
stability among the nodes, and
scales very well when expanding
the cluster. See the inset below to
learn more about how ITS can help
you use a Linux cluster and Rocks
to facilitate your research. For
more information about Rocks, see
http://rocksclusters.org/.
Will Wilson is a Senior Systems
Administrator in ITS eServices;
Yingkai Zhang is a professor of
Chemistry in NYU’s Faculty of Arts
and Sciences; David Ackerman is
Executive Director for ITS eServices
and Digital Library Initiatives.
ITS Offers HPC Services to NYU Researchers
If your research requires High Performance Computing,
Information Technology Services can help you. If you are
writing a grant proposal, we can advise you on the infrastructure aspects of the grant. ITS can help you architect,
select, and negotiate the price for your computational platform and network.
We have extensive experience with both clusters and large
memory systems and can host, set up the hardware, and
configure your software and application. We handle the
day-to-day management of the system, including daily
backups and security monitoring, and will perform maintenance during scheduled off-hour periods that will be
announced to you well in advance.
We work 24x7x365 to ensure the highest possible levels
of system availability. ITS will supply you with a service
level agreement (SLA) that will spell out the services we
provide, including our system availability guarantee.
We think you will enjoy working with ITS’ highly professional and knowledgeable staff. By availing yourself of ITS
HPC services, you will be free to spend more time on your
research!
For more information, please contact hpc@nyu.edu.
30
Connect: Information Technology at NYU • Spring 2004
Case Study
In December 2003, ITS successfully
used the Rocks Cluster Distribution
to collaboratively set up a Linux Xeon
cluster (16 nodes, 32 processors) with
NYU Chemistry Professor Yingkai
Zhang, whose research involves
the computer simulation of enzyme
reactions.
Inadequate computational power has
been the major bottleneck for his
group’s research productivity. With
the Rocks Distribution, this cluster
becomes an attractive option because
of its excellent price/performance
ratio.
The cluster is now managed by ITS
with the Rocks Distribution, and is
stable and productive.
S O C I A L S C I E N C E S , S TAT I S T I C S & M A P P I N G
Federal Census Files
By Frank LoPresti
frank.lopresti@nyu.edu
T
he first Federal Census was
taken in 1790 under the
auspices of Secretary of
State Thomas Jefferson. The predominant need for this poll of the
population was, and still is, to create and manage Congressional districts. Every state gets to send two
senators to Congress—no more,
no less…no need to count. On the
other hand, the number of persons
each state sends to the House of
Representatives is proportional to
its population. To this end, Article
I, Section 2 of the US Constitution
mandates an “actual enumeration”
of the population. This requires a
periodic physical headcount of the
country’s residents, and prohibits
statistical guessing or estimation
of the population. For this purpose, Congressional redistricting
committees use the Redistricting
File and Summary Files 1 and 2
(SF1 and SF2) from the Federal
Census report.
COLLECTING THE DATA: THE
LONG AND THE SHORT OF IT
Each decade, about one sixth of the
“households” in the United States
fill out a long Census form. This
data is compiled into Summary
Files 2, 3, and 4 (SF2, SF3, and
SF4). The remaining five-sixths of
the households are given the short
form. The basic data common to
both forms yields the total counts
compiled in file SF1. To reapportion Congressional seats, these
counts are quickly released in the
Redistricting File. No statistical
sampling is used there.
The short form collects personal data (“P” variables, including
household size and occupants’
relationships, sex, and age) and
household data (“H” variables,
including location, occupancy,
and tenure of occupancy). The
long form asks many valuable but
invasive questions about each resident’s race, education, military
service, income, health, employment, and the residence’s utilities,
insurance, number of rooms, etc.
ANONYMITY: WE INSIST
UPON IT EVEN IF WE CAN’T
PRONOUNCE IT
When this sensitive data is
collected, it goes into files where
it becomes a P line if it relates
to a person, or an H line if it
relates to a residence. Several P
lines and one H line containing
the person’s address make up a
household group of data in the
original, “secret” database. Since
this database contains peoples’
addresses, it will never be released
to the public.
The issue is how to distribute
useful data without compromising people’s personal information, since without some geographic information the Census
files would be useless. To address
this problem, Census workers identify households geographically
using Blocks, Tracts, Zip Codes,
Counties, and PUMAs (described
below).
A Census Tract is usually
defined to include around 1,500
households. A Block group will
usually be about one half or one
third of that size, or even smaller,
depending on the local geography
and other logical dividing lines.
In NYC, for instance, a Block will
sometimes be a single apartment
building. If people’s addresses
were removed from a Census file
but Block location (within 500
households) remained available,
that information would still be
insecure. If someone could identify your Block, the type of house
you live in, the number of rooms
in your house, and whether you
rent or own, they could probably
figure out exactly which residence
in a given Block was yours. This
is potentially very bad business.
Imagine, for example, the opportunities for a criminal seeking likely
victims for a robbery or scam.
Spring 2004 • Connect: Information Technology at NYU
31
To avoid this, the Census
aggregates data, showing only
tables of information at the small
Block level to protect the individual
identities of you, your neighbor,
and the entire Block population.
Since the Block-level Census files
provide only certain cross-tabulated tables—age by race, race by
income, etc., they do not provide
the kind of detailed information
that a “bad guy” might need.
In this way, Summary Files (SF1
to SF4) protect privacy by summarizing the information into tables.
The richest data, however, is the
raw data from the H lines and P
lines of the long form, which the
Census releases as Public Use
Microdata Samples (PUMS) data
files. This raw data is stripped of
all geographic variables except an
identifier called the PUMA (Public
Use Microdata Area). The PUMA
groups include about 200,000
households. Since that comprises
only about 1/6 th of the total
households in the United States,
the PUMA data are weighted,
which allows for statistical replication of the entire population.
The data can then be used for any
statistical purpose.
HOW TO FIND AND USE
CENSUS FILES
Many repositories and CDs containing Census data are available.
NYU is a member of the data archive
at the Inter-university Consortium
for Political and Social Research
(ICPSR). ICPSR’s Census collection
(http://www.icpsr.umich.edu/topical.
html#CENSUS2000) is available free
of charge to researchers at NYU
and includes SAS and SPSS code to
format these files. We recommend
that you use a high-speed connection such as that provided at NYU
to download these large files.
GeoLytics (http://www.censuscd.
com/ ) is also a very impressive resource. Used by many
researchers, these value-added
CDs are available for a fee. They
offer a Windows-based program
for downloading subsets of the
various files, spanning the decades
from 1970 to 2000. An application
is included which allows variables
(where it makes sense) to be taken
across several decades using year
2000 geographical boundaries.
Help and additional information about using Federal Census
data is available through the
ITS Social Sciences, Statistics &
Mapping Group. Contact Frank
LoPresti at 1-212-998-3398 or
frank.lopresti@nyu.edu for more
information.
Frank LoPresti heads the Social
Sciences, Statistics & Mapping Group
of ITS Academic Computing Services.
The First Annual ITS Staff Art Show
In March 2004, ITS held its first annual staff art show, providing ITS employees the opportunity to share
their talents with their colleagues. This informal show featured an impressive variety of work, including
photography, illuminated digital art, sculpture, and painting. The exhibit was on display for the entire
month, enlivening the halls of our facilities at 10 Astor Place. For a busy department focused on providing for the technical needs of the NYU community, this fun show was a welcome opportunity to learn
more about the artistic talents of our colleagues, and is sure to become an annual tradition.
David Ackerman and Eduardo DeLeón appreciate
a series of multimedia paintings by Callie Hirsh.
32
Connect: Information Technology at NYU • Spring 2004
A detail of a back-lit digital print
created by Philip Galanter.
COMPU TING IN THE ART S
Inspiration, Innovation &
Interactivity
The ITP Winter Show 2003
By Kate Monahan
kate.monahan@nyu.edu
C
elebrating its 25th anniversary in 2004, NYU
Tisch School of the Arts’
Interactive
Telecommunications
Program (ITP) is dedicated to “the
study and design of new media,
computational media, and embedded computing under the umbrella
of interactivity”.1 At the end of each
semester, this pioneering graduate
program hosts an impressive public exhibition of its students’ recent
work. The ITP Winter Show 2003,
held on December 16th and 17th,
featured more than 80 student
projects and attracted a crowd of
more than a thousand.
The event was a bustling playground of sounds, images, movement, and people that filled almost
an entire floor of the ITP facilities
at 721 Broadway. The projects
showcased the students’ skills in
virtual space and 3D design, physical computing, interaction design,
video and audio installations,
visual art, and much more. The
works were created—some individually, some collaboratively—by
students in 13 different ITP courses
with such evocative titles as “The
Poetics of Virtual Space,” “Kinetic
Structures & Eco-Design,” and
“Mediated Urban Spaces.”
Each project, though distinctly
unique, employed some combination of technology and art to
investigate what happens when
viewers can affect and be affected
by the work they’re viewing.
Beautiful, provocative, inspirational, entertaining, political, or
practical, each project was continually surrounded by crowds
of fascinated attendees awaiting
their turn to—quite literally—get
their hands on it. Though it would
be impossible to do justice to all of
the projects here, a representative
sampling is described below.
“Truly Interactive TV,” described
by its creator James Robinson as “a
chat client for frustrated screenwriters,” invites participants to
repurpose quotes from television
shows into meaningful conversation. Choosing from tens of thousands of actual TV lines stored in a
database, two participants create
an often amusing exchange on the
screen in front of them (figure 1). As
one person’s choice is displayed,
Figure 1. “Truly Interactive TV”
1. http://www.itp.nyu.edu/PROGRAM/overview.html
Spring 2004 • Connect: Information Technology at NYU
33
Figure 2. “Inter-whactive TV”
the other person uses a controller
to select a response either from
the entire database or from a small
collection of responses suggested
by the software.
“23 Cent Stories,” by Lian
Chang, Michael Sharon, and
Manlio Lo Conte, uses the tradition of postcards to experiment
with interactive narrative. Using
an impressive web-based interface (http://www.23centstories.com),
a person can select a virtual New
York City postcard, write a brief
story or message, and save it to an
online database. From the website
(or from a selection of actual postcards affi xed with bar codes that
were available at the show), the
person can also retrieve existing
messages written by others for a
given postcard.
Joon Seo Lee created “Interwhactive TV” as “a digital homage
to the analog.” This fun installation presents the audience with
an old rabbit-eared television that
displays nothing but static (figure
2). Following their instincts (if
they’ve ever owned such a television) and the instructions placed
next to the piece, participants
bang on the television and twist
the antennae to make it work. The
reward? A series of crystal-clear
video images.
“WeBe” is a practical web
application that empowers individuals to collaborate in group
purchases. The goal of the creators, Brandon Brown, Olivier
Massot, Yoonjung Kim, and Megan
Phalines, is to facilitate the coordi-
Figure 3. “Silhouette Play”
34
Connect: Information Technology at NYU • Spring 2004
nation of groups of diverse, physically distant people “so that they
can benefit from both the purchasing power of a group and from
the social effects of forming group
ties.”
Jungeun
Yoo’s
addictive
“Silhouette Play” uses an IR
sensor, a webcam, and Jitter software to create a soundscape and
display a participant’s silhouette
surrounded by multiple colorful
outlines on a large screen (figure
3). As they move or interact with
their silhouette, the sound and the
number and color of the outlines
change based on the participant’s
distance from the screen.
“Belonging,” an interactive
documentary about women who
move to New York City on their
own from another country, allows
participants to choose from among
six interviews with such women,
and to access additional information about them. The work focuses
on the women’s positive and negative experiences of being alone in
a foreign country, what they miss
about their home country, and what
special objects they brought with
them. The creators, Idit Kobrin,
Maria Michaelides, Pei-Chen Chen,
and Catherine Boelhauf, chose the
title “Belonging” based on their
shared experience that “a person
can belong somewhere, but also
can be longing for a particular
place.”
Daniel Hirschmann’s pleasing
creation, “Sculpticles,” consists of
a grid of luminescent orbs on metal
stalks that change color as people
move them up or down. “Born out
of a frustration with the passive
experience of viewing artwork on
a monitor,” Hirschmann’s goal is
to allow people the opportunity to
change the work they are viewing
through their interaction with it
(figure 4).
Figure 4. “Sculpticles”
Figure 5. “Spider Plant”
A powerful video installation by
Geraldine Chung and Vivian Wenli
Lin, “Holler!” exposes participants
to the harassment from men (whistles, stares, comments) that many
young women have experienced in
public spaces. In the installation’s
enclosed room, a sensor detects a
participant as he or she enters and
sends data to a computer that triggers a projection of various men
“hollering” onto the wall in front of
the participant. If the participant
“confronts” the images by walking
closer, the system replaces the
projection with videotaped interviews of women who are regularly confronted with this type of
unwelcome attention.
“Spider Plant,” by Ian Curry,
is a hybrid organic/digital system
consisting of a living plant that
obtains water through prosthetic
“roots” made up of a software
spider that searches the Internet
for the word “water”. When the
Java spider encounters the word,
actual water is released to the
plant and the context of the word’s
usage on the Internet is displayed
on an accompanying screen (figure
5). Curry was inspired by the idea
that “the Internet has the same kind
of fluidity as an ocean—with tides
of usage, currents, chasms and
beaches.”
“ S id e - by- S id e — Relat ional
Musical Chairs,” by Rikayo
Horimizu, invites the passerby
to sit in one of several grouped
rocking chairs. A sensor (accelerometer) embedded in each chair
is linked to a computer music
program (MAX/MSP) that generates a pleasant, ambient sound as
the participant sitting in the chair
rocks back and forth. The project
aims to connect strangers in public
“waiting” spaces such as subway
stations or airport lounges by providing the collective experience of
composing music together.
“Pixiebox,” by John Geraci,
merges the live video images
of two participants into a fluid
and evolving “organic whole” on
an LCD screen that hangs suspended between them (figure 6).
The project is an exploration of
Geraci’s notion that “real sharing
is more than simple trade—it
involves combining our resources
with others, with the anticipation
that the result will be better than
the original parts.”
Conceptualized as “a metaphor for the world as seen through
public web cameras,” “Earthsee,”
by Yoonhee Moon and Liubomir
Borissov, is an interactive map of
the world composed of “pixels”
of continually updated webcam
images from each region (figure 7).
The viewer uses two movable light
sources on a clear table in front of
the map to navigate or to zoom in
Figure 6. “Pixiebox”
Spring 2004 • Connect: Information Technology at NYU
35
Figure 7. A detail from “Earthsee”
on a specific image in the dazzling
array of options. More information is available at http://earthsee.
dadastream.com.
“Catalyst,” by Diego Bauducco,
Michael Sharon, Ron Goldin, and
Andrea Roscoe, is a collaborative
software program for artists and
designers working on multimedia
projects. “It provides a centralized environment for storing and
sharing resources, giving feedback,
and visualizing the development of
a project in a number of different
ways.” As an example, the creators describe a scenario in which
an artist working on a logo design
could upload a rough version to
the server and then invite other
collaborators to submit comments,
refined versions, or entirely new
ideas.
“The Grab Pipe,” a multipurpose instrument developed by
Evan Raskob, “combines the form
of a classic woodwind (saxophone,
oboe) with modern DJ techniques
(crossfader, rotating neck) and
tilt/shake sensing.” Participants
are encouraged to pick up this
ingenious instrument and manipulate it in a variety of ways to
create sounds on a synthesizer
and images on a computer screen
(figure 8).
These and the many other
fascinating projects at the ITP
Winter Show 2003 illustrate the
wide range of inventive ideas
and technologies being generated
and implemented by ITP students
and faculty. For more information about all of the projects displayed at the Winter Show 2003,
visit http://stage.itp.tsoa.nyu.edu/
projects/show/cgi/view.cgi.
Also
be sure to keep an eye on the
ITP website (http://itp.nyu.edu) for
news about the Spring Show 2004,
coming in May.
Figure 8. “The Grabpipe”
ACKNOWLEDGEMENTS
The author is grateful to Josh
Nimoy for providing photographs
of this event: http://jtnimoy.net/
itpwintershow03/. Thank you to all
the organizers and participants
of the ITP Winter Show 2003,
and especially to Midori Yasuda,
George Agudow, and Red Burns.
Kate Monahan is a Technical
Writer/Editor in ITS Client Services’
Publications Group.
NYU Voice Mail
NYU’s voice mail systems provide an easy-to-use
messaging service for recording and distributing
voice messages via the telephone. The voice mail
systems are available 24 hours a day, 7 days a week.
Messages can be retrieved via touchtone phone
from anywhere in the world. Each user is provided
with a voice mailbox which is protected by a unique
password.
Printed brochures containing instructions on using
NYU’s voice mail systems are available upon request
(send e-mail to its.telecom@nyu.edu), and the information is also available on the ITS website at:
http://www.nyu.edu/its/telephone/voicemail.html.
36
Connect: Information Technology at NYU • Spring 2004
COMPU TER SECURIT Y
Protect Your Privacy When
Browsing the Web
By Eduardo DeLeón
eduardo.deleon@nyu.edu
W
hen you use an
Internet browser such
as Internet Explorer
or Netscape to explore the Web,
there is the potential risk that
your private information could be
captured by websites you visit, or
by other ill-intentioned people on
the Internet. While many websites
collect data that cannot personally
identify you, you still may not wish
to share it. This information can
be captured in a variety of ways,
including cookies, your browser’s
history and cache, and web forms
you complete.
HOW WEBSITES OBTAIN YOUR
INFORMATION
Certain websites require you to
sign up before you can use their
services. The online version of The
New York Times is one example.
Before you can read any articles,
the website requires that you
register by answering a number
of questions about yourself.
Alternately, sites that offer you
free things often require that
you fill out a form or complete a
survey that can potentially collect
personal information. “Personality
tests” and other novelty tests and
polls are another method. Many
websites also collect information
based on the choices you make
on a website and store the data in
cookies.
Most reputable websites (and
some not so reputable) post their
privacy policies for the public to
view. This type of policy generally outlines what kind of information is collected and how that
information is used. It may also
state the conditions upon which
any service is rendered (terms of
service). Some websites will share
information they collect from you
with other vendors and/or partners who will approach you with
related offers. This may increase
unwanted commercial offers from
third party vendors, who in turn
will share your information with
yet more partners/vendors. If
this is not acceptable, avoid these
websites and/or request that they
remove all your information.
Following are some things
to keep in mind to protect your
privacy when browsing the Web.
and Safari all offer tools to help
save you time with such forms
by storing your personal information in the browser settings. If
activated, these tools can automatically fill in the information
that you have saved (e.g., your
first and last name, e-mail address,
telephone number, postal address,
etc.) when you start filling out a
new form. The Netscape tool is
called the Forms Manager, IE offers
AutoComplete and the Microsoft
Profile Assistant, and Safari offers
the OS X Address Book and the
System Keychain. Because other
websites and/or people may be
able to gain access to the data, you
should consider removing your
personal information from these
tools.
To delete cookies in IE,
Netscape, or Safari, follow the
instructions below. For other web
browsers, see their help menu or
visit their support website.
WEB FORMS
How to Delete Your Stored Forms
Information
Internet Explorer for Windows
In the Tools menu, select
“Internet Options.” Click on
the Content tab, and then
click “AutoComplete.” Finally,
click “Clear Forms” and “Clear
Passwords.”
Web forms request information
about you in order to provide you
a service. In the previous New York
Times example, the registration
process requires you to fill out a
web form and submit it before you
can gain full access to the site.
Internet Explorer (IE), Netscape,
Spring 2004 • Connect: Information Technology at NYU
37
Internet Explorer for Macintosh
In the Explorer menu, select
“Preferences.” Click on the
“Forms AutoFill” category then
on the “Forms AutoComplete”
subcategory. Click “Delete,” then
select the “Disabled” option.
Netscape for Windows and Mac
In the Tools menu, select “Form
Manager,” then “Edit Form Info.”
Click “Remove all saved data.”
Safari for Mac
In the Safari menu, select
“Preferences.” Click the AutoFill
tab and uncheck all boxes. Click
each “Edit” button, then select
“Remove All” where available.
COOKIES
Cookies are pieces of information
created in the normal course of
browsing the Web that are stored
in small files on your computer’s
hard disk to facilitate many web
functions. For example, if you
shop online, the website may
create a cookie to keep track of
the items that are in your “online
shopping cart.” Or, if you enter a
website that requires you to log
in, a cookie may be used to store
information about your current
visit to facilitate your future access
to the site.
Cookies help websites determine who is logged in, what activities you perform while you are on
the site, and when your session
is ended. Websites may also use
cookies for other purposes, such
as targeted online advertisements
(showing ads that they think you
will be interested in, based on your
past online activity), for saving
“preferences” you may have set
for the appearance, layout, or
content of a site, or for “remembering” your name and past activities every time you visit (as seen
on http://www.barnesandnoble.com,
for example).
38
Although most cookies are
intended to facilitate or customize
your web browsing experience,
they also pose a potential risk.
After a cookie is stored on your
computer, it could be accessed by
remote computers to obtain information about you that you might
not want to share, including the
websites you visit, how often you
visit them, and what ads have been
displayed on those sites.
How to Delete Your Cookies
You can prevent this sort of information harvesting by manually
deleting cookies from your hard
drive on a regular basis. Some
cookies may store “expiration”
dates, but even after this date
passes, the cookie will remain on
your hard disk, where it could still
be accessed by remote websites
until you delete it.
With modern browsers, you
can also control which websites
can store information in cookies,
and you can even specify when to
store cookies and when not to. For
configuration instructions of this
sort, see your browser’s help menu
or visit your browser’s support
website.
To delete cookies in IE,
Netscape, or Safari, follow the
instructions below. For other web
browsers, see their help menu or
visit their support website. A word
of caution before you proceed:
because cookies save the preferences and other information
described above, the next time you
visit your favorite websites, the
appearance or sign-in process may
be different. If you prefer, most
browsers will allow you to select
specific cookies to delete, allowing
you leave other cookies in place.
Internet Explorer for Windows
In the Tools menu, select
Connect: Information Technology at NYU • Spring 2004
Internet Options, then click
“Delete cookies.”
Internet Explorer for Macintosh
In the Explorer menu, select
“Preferences.” In the window
that opens, in the “Receiving
Files” category, select the
“Cookies” subcategory. On the
right, click on the cookie(s)
you wish to delete, then click
“Delete.”
Netscape for Windows
In the Edit menu, select
“Preferences.” In the window
that opens, in the “Privacy &
Security” category, select the
“Cookies” subcategory. Click
“Manage Stored Cookies” on
the right and then click “Remove
All” to delete all cookies.
Netscape for Macintosh
In the Netscape menu, select
“Preferences.” In the window
that opens, select “Privacy &
Security,” then the “Cookies”
subcategory. Click “Manage
Cookies” on the right and then
click “Remove All” to delete all
cookies.
Safari for Macintosh
In the Safari menu, select
“Preferences”. In the window
that opens, select the Security
icon, then click “Show Cookies”.
Next, either select the specific
cookies you would like to delete
and click “Remove,” or click
“Remove All.”
BROWSER HISTORY
All modern browsers keep a
history, or record, of all the
websites you have visited in the
recent past. By default, Netscape
keeps history data for the previous
nine days, while IE stores information for the past twenty days.
If you can visit several different
websites in a few minutes, imagine
how many websites you may have
visited in the last twenty days!
Deleting this history—which
certain websites and anyone who
uses your computer can access—
will help protect your privacy.
How to Clear the History
To delete the browser history in
IE, Netscape, or Safari, follow
the instructions below. For other
browsers, see their help menu or
their support website. A word of
caution before you proceed: if you
use your history to access websites
that you’ve visited in the past, you
should set bookmarks for those
sites before clearing your history.
Internet Explorer for Windows
In the Tools menu, select
“Internet Options,” then click
“Clear History.”
Internet Explorer for Mac OS X
In the Explorer menu, select
“Preferences.” In the window that opens, select “Web
Browser,” then the “Advanced”
subcategory. Then, in the
History section on the right,
click “Clear History.”
Netscape for Windows
In the Edit menu, select
“Preferences.” In the window
that opens, in the “Navigator”
category, select the “History”
subcategory. Then click “Clear
History” on the right.
Netscape for Mac
In the Netscape menu, select
“Preferences.” In the window
that opens, in the “Navigator”
category, select the “History”
subcategory. Then click “Clear
History” on the right.
Safari for Macintosh
Go to the History menu and
select “Clear History.”
THE CACHE
A browser cache is a special
storage location on your computer
for temporary files that can
improve the speed and performance of your web browser. The
cache (pronounced cash) stores
content that does not change often,
so that a web page you’ve visited
can load more quickly the next
time you return.
For instance, while the headline
news on The New York Times on
the Web changes frequently, their
logo does not, so it can be stored
in the cache. This way, your web
browser does not have to download the logo image every time you
visit the site.
Since there is no way to predict
what the Web browser will store in
the cache, some private information may be stored there. Emptying
the cache periodically will help
protect your privacy.
How to Empty the Cache
To empty the cache in IE, Netscape,
or Safari, follow the instructions
below. For other browsers, see
their help menu or their support
website. A word of caution before
you proceed: websites you’ve
visited in the past may take a bit
longer to load the next time you
go there.
Internet Explorer for Windows
In the Tools menu, select
“Internet Options,” then click
“Delete Files.” Click “OK” when
prompted.
Internet Explorer for Mac OS X
In the Explorer menu, select
“Preferences”. In the window that opens, in the “Web
Browser” category, select the
“Advanced” subcategory. In the
Cache section on the right, click
“Empty Now.”
Netscape for Windows
In the Edit menu, select
“Preferences.” In the window
that opens, in the “Advanced”
category, select the “Cache”
subcategory. Then click “Clear
Cache” on the right.
Netscape for Macintosh
In the Netscape menu, select
“Preferences.” In the window
that opens, in the “Advanced”
category, select the “Cache”
subcategory. Then click “Clear
Cache” on the right.
Safari for Macintosh
Go to the Safari menu and
select “Empty Cache…”
OTHER BROWSER PRIVACY
STRATEGIES
Recommended
Set your cache size low.
Setting the space designated for
cache files to a low level will help
limit the amount of information
that is stored on your computer. To
do this, adjust the size of the cache
to a lower level—an option that
is usually available in the cache
area described in the previous
section (if not, see your browser’s
help menu or support website
for instructions). We recommend
setting your cache to no more than
100 MB.
Limit the History.
You can lower the number of
websites kept in your history by
reducing the number of days worth
of history that your web browser
keeps. In IE for Windows’ Tools
menu, select “Internet Options,”
and, in the History section, enter
the number of days that you want
to keep a record of the sites you’ve
visited. In Netscape’s Edit menu,
select “Preferences,” then, in the
“Navigator” category, select the
“History” subcategory.
Please note that setting the
history to zero days will not keep
any websites in the history, and
you will not be able to use the
history to visit web pages that you
have visited previously.
Spring 2004 • Connect: Information Technology at NYU
39
Take control of your cookies.
Browsers like Netscape and Mozilla
allow you to manage your cookies
with a feature called Cookie
Manager. With it, you can set your
browser to accept cookies if the
server that originated the cookie
is the same as the website that
you are visiting; to accept session
cookies; to reject third-party
cookies (cookies that are set by a
website other than the one you are
visiting); or to prompt (ask) you to
accept or deny any cookie before
it is saved to your computer. This
browser feature also allows you
to keep a list of “always-accept”
or “always-deny” websites. IE for
Windows offers a similar feature;
in the Tools menu, select “Internet
Options,” and, in the Privacy tab,
click “Advanced,” or, to specify a
list of sites, click “Edit.”
Use IE’s Security Zones.
Internet Explorer’s Security Zones
allow you to configure different
levels of security for websites that
you visit. The feature includes five
predefined zones: Internet, Local
Intranet, Trusted Sites, Restricted
Sites, and My Computer. You can
set the security options that you
want for each zone, and then
add or remove websites from the
zones, depending on your level of
trust in a website. Instructions are
available on the Microsoft website:
search for “Microsoft Knowledge
Base Article—174360” at http://
support.microsoft.com/.
Review websites’ privacy policies.
As stated earlier in this article,
most websites have a policy
about collecting and sharing your
personal information. It is a good
idea to read these policies on sites
you visit frequently, or before sub-
40
mitting any personal information
to a site.
Use a secure browser when submitting personal/financial info.
Most modern browsers support
secure browsing. This means
that the information you enter
while browsing securely will be
encrypted so that only the proper
party can read it. The URLs (web
addresses) of secure sites begin
with https:// instead of just http://.
Another sign that the site is secure
is if you see a small lock icon in the
browser’s status bar (usually at the
bottom of the window).
Strategies Worth Considering
Use a different browser.
There is a new generation of web
browsers available (including
Mozilla, Firefox, and Opera)
that take privacy concerns more
seriously. They can be downloaded
from the Internet for free.
Use a third-party program to
manage your privacy.
There are literally dozens of
programs that can help you
protect your privacy while
browsing the Web. Some of these
programs may be obtained and
used at no cost, while others are
commercial programs that you
have to purchase. A simple search
at Download.com or Google will
present you with many tools for
controlling the privacy of your web
browsing, such as Cookie Cutter,
Cookie Crusher, Norton Internet
Security, Trend Micro’s PC-cillin,
or McAffee Security Center.
For the Very Cautious
Empty the cache each time you
close your browser.
In Internet Explorer for Windows, a
setting to automatically delete the
Connect: Information Technology at NYU • Spring 2004
temporary Internet files each time
you close your browser is available
in the Advanced tab (under
the Tools menu, select Internet
Options then click the Advanced
tab). This option is also available
in the Opera web browser.
Use anonymous browsing.
There are websites that provide
the ability to browse the Web
anonymously. Simply enter the
website address that you would
like to view, and the site will be
accessed for you. Note, however,
that this service may not work
for all websites. Some sites, such
as Anonymizer.com, also provide
software that can further protect
your privacy.
OTHER BROWSER PRIVACY
RESOURCES
The following resources may help
you better understand issues
of privacy and security when
browsing the Web:
More about cookies:
http://pages.zdnet.com/hampsi/
Articles/Cookie2.htm
Online browser security check:
h t t p : // w w w.v e r i s i g n . c o m /
advisor/check.html or http://
browsercheck.qualys.com/
Stay Safe Online:
http://www.staysafeonline.info/
Sans Top 20 Internet Vulnerabilities:
http://www.sans.org/top20/
If you have questions about
browser security, please call
the ITS Client Services Center at
1-212-998-3333, or send e-mail to
its.clientservices@nyu.edu. You can
also contact the author directly at:
eduardo.deleon@nyu.edu.
Eduardo DeLeón is a User Support
Specialist at the ITS Client Services
Center.
NYU LIBR ARIES
Calabash
Preserving & Presenting an Online Journal
By Joanna DiPasquale and Jennifer Vinopal
joanna.dipasquale@nyu.edu; jennifer.vinopal@nyu.edu
I
n the spring of 2003, Bobst
Library received a request to
help a popular NYU print journal, Calabash: A Journal of Caribbean
Arts and Letters, “go digital.” Even
in print format, Calabash is a “multimedia” publication, including
fiction, poetry, and visual art, and
representing work from around the
globe. Because of its varied nature,
bringing this exciting journal into
the digital realm presented numerous technical hurdles: how could
Bobst Library capture and digitally
present this mixed media in the
authors’ intended fashion; and
what was the best way to make
the journal available online for an
audience with divergent technical
capabilities and capacities? The
challenges brought up by the digitization of Calabash have allowed
Bobst Library to develop solutions,
apply our knowledge to new projects, and bring the journal to the
World Wide Web.
Bobst Library began the
Calabash project with the SummerFall 2003 issue (Vol. 2, No. 2,
http://library.nyu.edu/calabash/
toc.html ). The initial challenges
were formidable. First, how could
we preserve the unique formatting of poetry in electronic format?
The XHTML markup language,
even with its excellent Cascading
Style Sheet (CSS) capabilities, did
not represent a universal solution—style classes would have to
be adjusted or added per poem
per issue, and some features may
not be perfectly compatible across
browsers and operating systems.
Our goal was to protect the interest
of the artist’s work while finding a
web-ready format that could be
easily delivered.
We also learned that Gerard
Aching, editor of Calabash, did not
necessarily want to forsake the
benefits of a print journal—like
turning pages—simply for a digital
experience. As Gerard wrote:
“Almost a year ago, when we
began to mull over this new stage
of the journal’s young life, we discussed this move with a fair degree
of skepticism. First and foremost
on our minds was the bias that an
electronic journal could not replace
the beautiful objects that the first
three [printed] issues of Calabash
were and always will be.… Yet our
unrepentantly romantic inclina-
tion to lament the loss of certain
features that we associate with
reading the journal—the tangible
weight of every issue, the contemplation of the visual art that graced
each cover, the indelibility of its
printed words, and the reflex that
our pages can only be turned—
soon yielded to economic realities.”1
To keep production costs
low, an electronic format was a
viable solution, but Bobst Library
wanted to foster rather than thwart
those “romantic inclination(s)”
that made Calabash a wonderful print journal. In addition,
because Calabash is international
in scope—with a readership representing North America, Latin
America, Africa, the Caribbean,
Europe, and other areas—certain
browser accessibility concerns
had to be addressed.2 Because
of varying hardware, software,
and—most importantly—connection speeds, we could not rely
on special browser configuration requirements (e.g., JavaScript
readability),
additional
technology within an Internet browser
(e.g., Java applets), or the latest
1. Gerard Aching, “Preface.” Calabash, Vol. 2, No. 2, p. 1. Accessed on March 1, 2004, at http://library.nyu.edu/calabash/
vol2iss2/0202001.pdf
vol2iss2/0202001.pdf.
2. Taken from interviews with Gerard Aching, from Calabash print subscription statistics, and from NYU Libraries website
statistics (“Visitor Domains,” March 1, 2004).
Spring 2004 • Connect: Information Technology at NYU
41
standards to deliver this information. Our documents needed to be
light, quick, and portable.
Joanna
DiPasquale,
Web
Administrator at Bobst Library,
began contemplating the Calabash
interface with these problems in
mind. Knowing that cumbersome
graphics on a website might hinder
access, she designed small-scale
graphics and made extensive use
of CSS for color and overall layout.
Luckily, the authors’ submissions
for the Summer-Fall 2003 issue
were already in electronic form,
and thus the primary task became
finding the right electronic format
in which to present the journal.
In consultation with Jerome
McDonough and the Digital Library
Team at Bobst Library, Adobe
Acrobat’s Portable Document
Format (PDF) was selected.
Acrobat Reader software is free
and easily downloadable, and often
comes packaged with browsers. It
also represents a technology that
takes into account many library/
information technology issues: for
example, Adobe and the Digital
Library Federation (DLF) have
examined the possibilities of
archival formats and quality as the
technology ages. Importantly, PDF
allowed us to preserve the unique
formatting of poetry, and to insert
additional pages as needed.
The capacity to incorporate
additional pages was especially
necessary to address the visual
component of Calabash. Delivering
high-quality images from 35mm
slides over the Web while trying to
minimize file size presented quite a
challenge. From each slide, Joanna
scanned the images at 300dpi
(dots per inch), and then reduced
to 200dpi post-scan. She then
inserted the image files into a PDF
text document that contained information and interviews about the
42
artist, already set to 200dpi. The
result: a good-quality, web-ready
article that preserved and incorporated mixed media into one format.
After successful completion of a
digital version of the Summer-Fall
2003 issue, we turned our attention to past issues of the journal.
Calabash had produced three previous journals from 2001 to 2003,
and we had paper copies (i.e.,
“hard copies”) of each publication.
Unfortunately, we did not have the
luxury of starting with electronic
copies of the articles, so we turned
to the Studio for Digital Projects
and Research at Bobst Library
to begin the digitization project.
Jennifer Vinopal, Services Manager
of the Studio, led the project.
Our first challenge at the Studio
We thus are able to
recreate in the digital
realm the user’s
familiar experience of
“thumbing through”
each issue.
lay in the physical characteristics of the journals themselves.
Calabash was mostly text-based,
but scanning produces an image
of the page—not a file that contains editable words and letters.
To make those page images easily
readable, we needed a good quality
scan that properly displayed each
character on screen.
The plan was to scan the pages,
save the images in the JPEG image
format, then bring them into Adobe
Acrobat in order to produce PDF
documents. The better the quality
of the scanned image, the larger
the size of the electronic file produced, so we tested the process
at various dpi to determine what
quality scan would create highly
Connect: Information Technology at NYU • Spring 2004
readable text without a file size too
large for web delivery. We determined that scanning the pages in
8-bit grayscale at 200dpi met our
needs.
While we were pleased with
the way the page images looked,
we also wanted to make the documents searchable, so readers
could find words or phrases within
each text. The Studio’s optical
character recognition (OCR) software, ABBYY FineReader, was the
perfect solution. It “reads” each
page image and translates what
it sees into machine-readable text
(i.e., a series of individual characters like those produced by a word
processor).
We then turned our attention to
the images of non-text items (such
as pictures of studio artwork). The
color photographs in the original
Calabash publications were produced in halftone, a printing technique that uses small dots of color
to create the illusion of a continuous range of tones. When halftone images are scanned, a moiré
(rippled) pattern may result from
the combination of the printing
dots and the pixels produced in the
scanning process. Bobst Library’s
Digital Conservation Specialist,
Melitte Buchman, cautioned us
about this effect and suggested
that we carefully test the process
of scanning and conversion into
PDF to minimize the moiré effect.
In digital scanning projects,
images usually are scanned at a
high resolution to produce a highquality, archival copy of the image.
However, we were quite surprised
to discover that the scanned halftone photographs looked better
when scanned at a much lower
quality than we had used for the
page images themselves. After
much trial and error, we found
that color photographs scanned at
100dpi in 24-bit color and saved
as JPEGs integrated nicely with the
text images into PDF documents.
Once we scanned each page of
each issue, we used Adobe Acrobat
to combine all the JPEG images
of text pages and photos and to
convert them into one PDF document per article.
Web pages for each individual
issue of Calabash offer links to
download these article PDFs, and
the design and layout of the issue’s
web pages maintain a print-like
browsability. We thus are able
to recreate in the digital realm
the user’s familiar experience of
“thumbing through” each issue.
But, what the digital environment
offers that the print version cannot
is a “search this site” feature that
gives users the ability to search the
OCR’d text files “hidden behind”
the PDF documents.
The PDF archives of past
Calabash issues are forthcoming.
We are adding new content and
articles each day, and hope to
finish by Summer 2004. To access
Calabash, simply point your web
browser to: http://library.nyu.edu/
calabash/.
MORE ABOUT DIGITAL IMAGING
AND CONSERVATION
• Conservation On-Line (CoOL)
from Stanford University, at
http://palimpsest.stanford.edu. In
particular, resources on Digital
Imaging at http://palimpsest.
stanford.edu/bytopic/imaging/,
are useful for learning about
industry standards, conservation methods, and conversions.
• The Digital Library Team
provides a clearinghouse of
resources on their website, at
http://library.nyu.edu/diglib/
standards.html.
• The Studio for Digital Projects
and Research enables faculty and other NYU scholars
to use digital tools and content to enhance their scholarship in the arts, humanities,
and related disciplines (http://
www.nyu.edu/studio/ ).
• Information about Adobe
Acrobat is available at
http:// www.adobe.com/products/
acrobat/.
Joanna DiPasquale is Web
Administrator at NYU’s Bobst
Library, and Jennifer Vinopal is
Services Manager at the Studio for
Digital Projects and Research at
Bobst Library.
The main page of the Summer-Fall 2003 issue of Calabash at
http://library.nyu.edu/calabash/.
Spring 2004 • Connect: Information Technology at NYU
43
NYU LIBR ARIES
ARTstor
A Digital Archive of Art Images for Study & Research
By James Viskochil
james.viskochil@nyu.edu
A
nyone who has studied
art history, even in recent
years, probably recalls
spending a lot of time searching
for images of artwork in books, in
journals, or in an art department’s
slide library. But increasingly, it is
not only the art history researcher
who needs images of art and
architecture. Students and faculty
members in diverse fields, ranging from music to food studies to
medicine, frequently find that they
also need images.
A new archive of digital art
images, ARTstor, holds great
promise for anyone searching for
high quality images of art and
architecture. NYU is among the
first to gain access to this exciting
resource, along with thirteen other
museums and libraries.
WHAT IS ARTSTOR?
ARTstor is a non-profit organization that began as an initiative of The Andrew W. Mellon
Foundation to provide access to
collections of digital images from
contributing cultural and educational institutions. ARTstor’s
mission is to promote scholarship, teaching, and learning in
the arts through the distribution
of a library of digital images and
related information that serves
the needs of researchers, teachers,
and students. This is accomplished
by working closely with both
providers and users of content
from around the world to construct
a non-profit, public utility.
ARTstor’s origins can be traced
to the Foundation’s creation of
JSTOR, a comprehensive archive
of scholarly journal literature containing over 13 million pages, from
over 350 journals. In 2000, the
Foundation made a grant to the
Digital Library Federation, a notfor-profit program of the Council of
Library and Information Resources,
to explore ways of creating digital
image collections, with a special
focus on the needs of art history
faculty and students.
The result was the creation of
a web-based application which
accesses the discrete collections
from a database of combined
content provided by ARTstor’s participating institutions.
HOW DOES ARTSTOR WORK?
The main page of the ARTstor test website.
44
Connect: Information Technology at NYU • Spring 2004
ARTstor utilizes Macromedia Flash
Player technology to provide a
web browser-based interface that
is both intuitive and contextual.
This enhanced interface provides
The ARTstor interface simplifies the process of browsing large art collections.
access to each of ARTstor’s collections through either a keyword
search or an advanced, more
highly-focused search. Browsing
the entire collection is also an
option. The advanced search
allows Boolean1 searching of each
of the 12 indexes.
ARTstor also allows searching
of the free text note fields, which
can include personal-, instructor-,
and student-created notes. This is
especially useful for academic
applications where instructors have
attached classroom lecture notes to
the images for their students.
ARTstor offers another useful
tool, the “Image Group,” which
enables each user to create a folder
containing images from selected
collections. Creation of these
image groups can greatly enhance
the learning process by allowing
students and instructors to group
images together by lectures or by
concept.
Finally, art history classroom
teaching very often requires sideby-side projection of two images
for contrast/compare discussions.
ARTstor’s interface allows the
faculty member to not only continue this traditional practice, but
to greatly enhance it with ARTstor’s
ability to display details of the work
“on-the-fly”.
THE ARTSTOR COLLECTIONS
ARTstor currently includes images
from the following collections:
• The Image Collection—A deep
and broad collection of images
of world art, architecture, and
visual art;
• Art History Survey Collection—
Key monuments of world art;
• Carnegie Art of the United
States—American art, architecture, and visual culture from
the Colonial era to the 20th
Century;
• The Illustrated Bartsch—
European prints from the
Renaissance to the 19th
Century;
• Museum of Modern Art
Architecture and Design
Collection—20th Century
Design;
• Mellon International Dunhuang
Archive—Rich documentation
of the important Buddhist cave
shrines at the Dunhuang Oasis
site on the ancient silk route.
TRY ARTSTOR!
ARTstor is in a testing phase for the
2003/2004 academic year, after
which it will be made available for
site-wide licensing by non-profit
institutions, beginning in the US.
NYU community members are
qualified to use the ARTstor site
during this test phase. To do so,
visit http://test.artstor.org from a
computer that is connected to the
NYU network.
If you have questions about
ARTstor, please contact NYU’s
ARTstor beta-testing coordinator:
Tom McNulty
Librarian for Fine Arts
Bobst Library
212-998-2519
tom.mcnulty@nyu.edu
James Viskochil is Electronic Journals
and Acquisitions Librarian at NYU’s
Bobst Library.
1. A search strategy that allows the use of operators such as “OR,” “AND,” or “NOT,” along with keywords to help refine
search results.
Spring 2004 • Connect: Information Technology at NYU
45
S O C I A L S C I E N C E S , S TAT I S T I C S & M A P P I N G
Econometric Data Mining
with PcGets
By Robert Yaffee
robert.yaffee@nyu.edu
Note: The following is an excerpt from a longer article, available in its entirety at
http://www.nyu.edu/its/pubs/connect/spring04/yaffee_pcgets.html.
P
cGets (PC General To Specific
modeling), written by David
Hendry (Nuffield College,
Oxford University) and HansMartin Krolzig (formerly of Nuffield
College, Oxford and currently of
Humboldt University, Berlin), is
an econometric software modeling
package that combines ease of data
importation, user-friendliness, and
powerful graphical capability with
automated econometric modeling.
This program is nestled in
the versatile GiveWin (General
Instrumental Variable Estimation
for Windows) interface, written
in the Ox programming language
by Jurgen A. Doornik (Oxford
University). That interface allows
for easy data importation, basic
graphical analysis, and pushbutton module selection.
The PcGets module provides
options for automated generalto-specific econometric modeling
for a variety of ordinary least
squares and instrumental lagged
distributed variables estimation
of univariate models. In the documentation, Krolzig shows how
the program can be used for VAR
modeling as well. PcGets combines flexible data management,
powerful graphics, and automatic
econometric model selection into a
46
user-friendly, simple, and efficient
program.
THE GIVEWIN INTERFACE
Data importation can be done in
several ways. One can simply copy
and paste an Excel spreadsheet
into the GiveWin data spreadsheet
after defining the time span and
observational frequency (figure 1).
In the GiveWin interface, one can
select the particular Oxmetrics
module that one would like to
apply.
Of course, there is the option of
using either DBMSCOPY or STAT
Transfer to convert SPSS, SAS, or
other files to the PcGive format,
which can be read by the PcGets
module. The GiveWin interface
endows this package with exceptionally powerful exploratory
graphical capability. Whether one
is preliminarily examining the
series or doing residual graphical
analysis, this package has a large
repertoire of graphical options.
The interface allows for a variety
of time sequence graphs that can
be overlaid, edited, and annotated.
The interface permits graphs
of transformations of the series,
including logs, first differences,
growths, and means within
specified ranges. The interface
also allows the easy inclusion of
Figure 1. The GiveWin data spreadsheet.
Connect: Information Technology at NYU • Spring 2004
Figure 2. Time sequence plot of key series.
seasonality, centered seasonality,
trends, and constants. It performs
a variety of scatterplots, with
regression lines, cubic splines and
matrices. It also permits distributional analysis with frequency
charts, cumulative frequency
charts, density plots, histograms,
and box plots. Time series graphs
include graphs for both the time
and frequency domain (figure 2).
For the time domain, there are
autocorrelation functions, partial
autocorrelation functions, and
crosscorrelation functions. For the
frequency domain, there are the
spectral density charts and periodograms. For testing residuals
and other distributions, there are
quantile plots against a uniform
distribution, a normal distribution
and against a distribution of choice.
Two series can be graphed against a
third, and contour or three-dimensional surfaces can also be graphed
and rotated to a user-specified
angle for better perspective.
PcGets itself contains a number
of other graphs to enhance parameter and residual analysis. To
assess parameter constancy,
forward recursive or backward
recursive estimation can be run
and graphed, as can a rolling
window of parameters estimated
with rolling regression analysis.
Figure 3. Residual graphics (L to R): actual vs. fitted,
fitted vs. output, normalized residual time plot, and
squared normalized residual time plot.
To clearly diagnose the model,
one can also select from a rich repertoire of residual graphics. In figure
3, a matrix of four graphs is output.
In the upper left is a graph of the
actual values plotted against the
fitted values. In the lower left, there
are the residuals plotted against the
time line, to indicate where the possible outliers reside. In the lower
right, there are the squared normalized residuals plotted against the
time line; the normalized residuals
make identification of the outliers
particularly easy. In the upper right,
the fitted values are plotted against
the output. Moreover, histograms
of residuals, auto and partial autocorrelation functions, and spectral density plots are also available (figure 4). These graphs can be
enlarged, edited, annotated, copied,
and pasted into Microsoft Word or
WordPerfect files with ease.
[Article continued at http://www.nyu.
edu/it s/pubs/spr ing04/yaf fee _
pcgets.html.]
Robert Yaffee is a statistician within
the ITS Social Sciences, Statistics &
Mapping Group.
Figure 4. Additional residual graphics include (L to R):
correlogram, spectral density chart, histogram and
superimposed normal curve, and quantile-quantile plot.
Spring 2004 • Connect: Information Technology at NYU
47
S O C I A L S C I E N C E S , S TAT I S T I C S & M A P P I N G
SAS Analyst
Simplifying Statistical Analyses
By Frank LoPresti
frank.lopresti@nyu.edu
S
AS Analyst, included in
SAS Version 8 and 9 and
available as an add-on to
Release 6.12, is an application
that provides easy access to basic
statistical analyses, and has an
SPSS feel. As described on the SAS
website, Analyst is a data analysis
interface that takes a task-oriented
approach. With Analyst, one “can
compute descriptive statistics, perform simple hypothesis tests, and
fit models with analysis of variance and regression. Other tasks
include repeated measurements,
mixed models, survival analysis,
and multivariate analysis. The
application also provides some
tasks not covered by SAS procedures, such as sample size and
power computations. In addition,
you can produce several types
of graphs, including histograms,
box-and-whisker plots, probability
plots, scatter plots, contour plots,
and surface plots.”1
SAS is now beginning to offer
the type of mixed-mode usage that
has always been available in SPSS.
For example, say you’re using SPSS
to work on the research data collection phase of a project that
involves merging many files and,
perhaps, reformatting or cleaning
up variables in order to create a
“good” dataset. In SPSS, you would
click to open datasets, then click to
run a bunch of frequencies to see
for the first time what you have in
the dataset.
You might paste a lot of syntax
from a task window to the SPSS
Syntax window to build up a real
“program” for this project. If you
knew that down the road you
would repeat large areas of code
that you’re saving, you could
perhaps also add code in the
Syntax window to create new variables or scales with some missing
value logic included. You would
move between the clicking and the
Syntax method as you worked on
your project.
By comparison, let’s say you’re
creating a simple dataset in SAS
using students’ IDs and the results
of five tests that they took. You
have two missing values, “E” for
excused missed tests, and “U”
for unexcused. As shown below,
this simple data step creates
“work.Period_a” with IDs and
five test results (Test1-Test5). The
“missing” statement allows you to
have two missing values to help
keep better track of why a student
missed an exam:
data work.Period_a;
missing E U;
input Id $4. Test1 - Test5;
datalines;
1001 U 45 65 U 78
1002 86 27 55 72 86
1004 93 52 E 76 88
1015 73 35 43 112 108
1027 100 87 39 76 79
1103 98 100 57 37 E
;
Figure 1. Choosing the SAS dataset “work.Period_a” for an Analyst session.
1. http://support.sas.com/
48
Connect: Information Technology at NYU • Spring 2004
Figure 2. The SAS Analyst window with our data,
“Period_a”, open in Browse mode.
Figure 3. Computing a new variable in Analyst.
Figure 4. Analyst simplifies the generation of data steps.
To begin using Analyst, on the
SAS startup window, just select
Solutions, then Analysis, and then
choose Analyst.2 Open the saved
dataset, “work.Period_a”, by going
to File and then selecting “Open By
SAS Name…”. In the dialogue box
that opens (see figure 1), under
Libraries, highlight Work, then the
file name and click “OK”.
Once you have opened the file,
you’ll see that the Analyst “data
view” window has two modes—
Browse and Edit. You must be in
Edit mode (which is found under
Edit>Mode…) to be able to, for
instance, create a new variable
(see figure 2). Notice that there
is only one menu bar, whereas
in SPSS you have a menu bar for
each open window. In Analyst, the
data window mode that is active,
i.e., Edit or Browse, will determine
which menu bar is visible on the
large SAS “session” window. If you
select “Save” when the Edit mode
is active, you’ll save the commands
in the Editor window. If the Browse
mode is active, you’ll save the data
in your Analyst project folder.
With the sample dataset open
in Edit mode, you can now use
Analyst to create a variable, Final,
which is equal to the average over
the five tests. In a fashion similar to
SPSS, if you pull down “Data” then
select “Compute,” a very useful
function window (see figure 3) will
help you find the correct function,
Mean, to get the desired command,
FINAL=Mean(TEST1, TEST2, TEST3,
TEST4, TEST5).
SAS commands generated by
Analyst are stored, so that you can
reuse them; you could, for example,
copy them into a program editor.
And Analyst teaches you the SAS
language just by clicking. Figure 4
shows the data step generated in
SAS Analyst (just as in SPSS) by
clicking.
Years ago, SAS first started providing tools to assist us in running
commands without being forced
to keep a manual or two at hand.
My early experience led to reviews
which recommended that you
“stick to the Edit window.” Now
that I’ve taken a look at the useful
new Analyst tool, I congratulate
SAS on a job well done!
SAS is available for use by NYU
faculty, researchers, and advanced
students at the ITS Third Avenue
North computer lab (75 Third
Avenue, Level C3). The software
package can also be purchased at
an educational discount through
ITS. For more information, visit
http://www.nyu.edu/its/software/
sas.html or contact Frank LoPresti
of the ITS Social Sciences, Statistics
& Mapping Group at 1-212-9983398 or frank.lopresti@nyu.edu.
Frank LoPresti heads the ITS
Academic Computing Services’
Social Sciences, Statistics & Mapping
Group.
2. Despite the number of clicks it takes to access the programming environment, this useful application is very likely to
become a regular part of my normal windows SAS sessions in the future.
Spring 2004 • Connect: Information Technology at NYU
49
OUTRE ACH
The 2003 ITS Client
Satisfaction Survey
By Jill Hochberg, with Ken Fauerbach and Jeffrey Lane
jill.hochberg@nyu.edu; ken.fauerbach@nyu.edu; jeffrey.lane@nyu.edu
I
n ITS, we have a tradition of
paying close attention to client feedback and taking it
seriously. There are many ways
in which we’ve sought feedback
in the past, such as through web
surveys about particular services,
meeting and working with client
groups, and tallying phone and
e-mail comments and complaints.
And we regularly incorporate the
feedback from all these sources
into ongoing efforts to improve
services.
Recently, we took our quest
for feedback to a new level. In
November, we invited upwards
of 3,000 NYU students, faculty,
administrators, and staff to participate in the 2003 NYU ITS
Client Satisfaction Survey. As our
first broad-based survey, it solicited opinions and suggestions on
a wide range of ITS services. The
sample of invitees was randomly
selected across the University.
We are thrilled that 39% of those
invited took the time to complete
the survey, a significantly higher
percentage of participation than
anticipated.
After initial reviews of the
results, we are already introducing
some improvements, while we are
also preparing the survey report
itself for publication and digging
50
deeper into the data for improvement ideas. What follows is an
overview of what we’ve learned
thus far and what we are doing
about it.
The survey was conducted
in collaboration with IT service
providers at two other universities, the Massachusetts Institute
of Technology (MIT) and Stanford
University. Earlier in the fall
semester, ITS had been invited to
work with them in developing and
administering client satisfaction
surveys at our respective institutions, and then to use our findings to prioritize improvement initiatives. Each university’s survey
would be a separate activity, but
with some questions in common,
although using locally familiar
names, such as NYUHome, NetID,
and so on. By combining energies,
our three organizations could learn
from one another and advance our
efforts to improve IT support for
the teaching, learning, research,
and business endeavors at our
three institutions.
GETTING READY, GOING LIVE
Under the guidance of MOR
Associates—the independent consulting firm working with all three
organizations—the 2003 NYU ITS
Client Satisfaction Survey was soon
ready to go. The survey would be
administered by MOR Associates,
who would also e-mail the invitations, analyze survey results, and
report back to ITS, keeping individual responses anonymous.
E-mail invitations went out
in November to the randomly
selected sample of full and parttime faculty, undergraduate and
graduate students in degree programs, and administrators and
Expanding on an ITS tradition of listening to our clients’ feedback,
the survey was also a new opportunity to collaborate with other
universities in formulating service improvement strategies.
Connect: Information Technology at NYU • Spring 2004
Survey participants were asked to rate ITS services on 5-point scales like the one shown above, and were also
invited to enter their comments and suggested improvements in free-text comment boxes throughout the survey.
staff members. (ITS staff members
were automatically excluded.)
The invitations assured our invitees that their participation was
completely voluntary, that their
responses would remain confidential, and that data would be collected and analyzed by an independent outside firm (MOR). The
participants were asked to complete the survey within the following week.
Each e-mail invitation included
a unique link to the recipient’s
own, individual online survey form,
accessed through a web browser. A
few opening questions were aimed
at obtaining a profile of our respondents’ use of computers, handheld
devices and e-mail, web, and connectivity services. The remaining
items asked for respondents’
ratings of a range of ITS services,
and solicited their improvement
suggestions. Most questions dealt
with services used generally by
all ITS clients—helpdesk, telecommunications, network connectivity,
e-mail and web-based services and
support. Additional smaller sets
of questions, specific to technologies that ITS clients would more
likely use in their roles as students,
faculty, administrators, or staff,
were also included.
In a typical question, respondents were asked to rate a service
on a five-point Likert scale ranging
from “Very Dissatisfied” to “Very
Satisfied” or “Very Unimportant”
to “Very Important.” Also scattered
throughout the survey were freetext comment boxes and questions
inviting a text reply in the form of
“What would increase your satisfaction with…?” The entire survey
took about 15 minutes to complete.
WHAT WE’VE LEARNED,
WHAT WE’RE DOING
A report is being prepared as
we go to press, and will soon be
available. But here’s an overview,
based on our initial review of the
results.
At ITS, we’re impressed and
very pleased that so many NYU
community members took the time
to take our survey and share their
comments with us. Nearly 1,220
people accepted our invitation and
participated in the ITS survey, providing an excellent overall response
rate of 39%; based on their experience with other universities, MOR
had expected perhaps 30%. Of
course, as with many surveys, not
every participant answered every
question.
When asked about their satisfaction with ITS services and
support overall, 79% of those who
responded provided a rating of
Satisfied or Very Satisfied, while
fewer than 3% selected Dissatisfied
or Very Dissatisfied.
As expected, although Macintosh
use did have a respectable representation in our sample, the large
majority of our survey participants
use Windows-based computers. A
sizable portion of them reported
using more than one type of computer (desktop, laptop; Windows,
Mac, Unix, Linux). Asked which
e-mail tools they used for their
NYUHome mail, 69% of those
responding reported using the
webmail client.
Percentages of respondents who rated their satisfaction with
ITS services overall: 79% were either Very Satisfied or Satisfied,
and fewer than 3% were Dissatisfied (2%) or Very Dissatisfied (<1%).
Spring 2004 • Connect: Information Technology at NYU
51
While there was general validation of the directions ITS services
have been taking, an important
goal of the survey was to add to
our information about what future
service improvements our clients
would like to see. Based on what
we’ve discerned from results thus
far, here are some of the improvements that our clients would like
us to work on, and some of the initiatives being considered by ITS—
or already under way.
Help & self-help. We’ll be looking
at ways that we might improve the
training that ITS already offers—
such as when we roll out new or
upgraded products and services—
and reviewing our other instructional resources, such as our
online guides and in-person help.
As one example, an initiative to
offer clinics for wireless connectivity beginners is currently under
consideration. As another example,
we are revising navigation paths
on the ITS website, to make the
most pertinent instructions, FAQs,
and service descriptions easier to
find. In addition, we’ll be working
to make clients more aware of the
ITS training available to them (see
Awareness, below).
Security information & updates.
There was a great deal of positive
feedback with respect to ITS’
handling of computer and network
security issues, and security information and updates. Many respondents thought a service providing
automated operating system and
anti-virus updates would be an
important addition, and an ITS
pilot of such a service is currently
under way.
Awareness. Respondents sometimes
seemed unaware of services
already available to them—antivirus and spam-filtering services
are examples (see And Did You
Know, below). As a result, we are
taking steps to better disseminate news and information about
ITS services and resources. In
this regard, we are redesigning
Connect-Direct, the ITS e-bulletin
sent to all active NYU e-mail
account holders at the start of
each semester, and then periodically throughout the semester
to those who choose to remain
subscribed to it. Connect-Direct
will be more easily navigated,
and will feature security- and
performance-enhancing “eTips”
and “Did You Know?” sections.
We are also considering additional
ways that we can reach out to new
students, faculty, administrators,
and staff members to acquaint
them with our services.
AND DID YOU KNOW?
Some service improvements suggested by our survey respondents were
actually already in place or under
way at the time of the survey. As
an example, NYUHome has offered
a spam-filtering service since
this past September, activated at
each client’s option through the
NYUHome Preferences menu. Under
a soon-to-be-released version of
NYUHome, clients activating their
new NYUHome accounts will automatically be walked through their
anti-spam filter setups in “wizard”
fashion.
In the area of security and
anti-virus protection, Symantec
AntiVirus software is available
free of charge via download from
NYUHome to NYU faculty, students, administrators, and staff,
under a University-wide site
license obtained by ITS.1
In addition, an enterprise antivirus system automatically checks
incoming NYU e-mail for viruses
and removes any that are found; in
February 2004 alone, for example,
nearly 1.5 million viruses were
trapped at the NYU mail gateway
(see page 20). On NYUHome, a
Security Alerts channel provides
urgent security alerts (on the Home
tab) and general security news is
provided via the News channel (on
the News tab).
LOOKING FURTHER AHEAD
“Thanks to all who took the time
to share their thoughts with us!”
noted Associate Provost and Chief
Information Technology Officer
Marilyn McMillan. “As we delve
deeper into the survey results, ITS
will continue to take your opinions
and suggestions seriously. We
look forward to further collaboration with our clients in the NYU
community, as well as our colleagues at MIT and Stanford, in
the continued improvement of our
services.”
Further detail will be available in a survey report that is
being prepared for publication
in April; check the ITS website,
http://www.nyu.edu/its/survey/,
for an announcement and access
information.
Jill Hochberg is a Technical Writer/
Editor in ITS Client Services’
Publications Group; ITS Director of
Policy and Planning Ken Fauerbach
led this ITS survey effort; Jeffrey Lane
is ITS Director of Client Services.
1. A similar product is licensed by the School of Medicine for SOM faculty, students, administrators, and staff.
52
Connect: Information Technology at NYU • Spring 2004
Did You Know...
• NYUHome can help reduce all that spam clutter
NYUHome offers a customizable spam filtering service that can help reduce the spam clutter
in your e-mail inbox. Whether you access your e-mail using NYUHome’s webmail client or
a desktop mail client (e.g., Eudora, Macintosh Mail, Netscape Messenger, or Outlook), the
NYUHome PureMessage spam filter will help remove that annoying junk mail. Activate this convenient service through your NYUHome “Preferences” settings, or visit http://home.nyu.edu/help/
mail/spamfilter.nyu for a full set of instructions.
• You can download AntiVirus software from NYUHome, and easily
keep it up-to-date!
ITS automatically checks your incoming NYU e-mail for computer viruses (see p. 20),
but with new viruses emerging daily, you should take additional steps to protect your
computer. ITS provides Symantec AntiVirus (and other useful software) to the NYU
community through NYUHome. To download this software, log in to NYUHome at
http://home.nyu.edu/ using your NYU NetID and password. Click on the “Files” tab, scroll down
to the “ITS Software” channel, then click on the AntiVirus link for your computer’s operating
system. Once you’ve installed AntiVirus, be sure to use the “LiveUpdate” feature to update the
virus definitions. Then, continue to check for updates daily or whenever you’re online. (You
can set LiveUpdate to do this for you automatically.) See “When Computer Viruses Strike” on
p. 18, the Security Awareness Month announcement on the back cover, and the ITS website
(http://www.nyu.edu/its/security/ ) for more information about protecting your computer.
• What’s new at the ITS labs and classrooms
ITS’ Academic Computing Services has recently improved and expanded a number of the lab and
classroom facilities and services available to NYU faculty and students. Recent enhancements
include a redesigned Video Editing Lab, new Apple G5 computers at the ITS Multimedia Lab, and
expanded end-of-semester hours at the ITS labs and the Faculty Technology Center. See “What’s
New at the ITS Computer Labs” on p. 26 for details. And, in case you haven’t already heard, ITS
offers several hands-on computer classrooms that can be reserved by faculty for regular or occasional class meetings that require in-class computer use by students. See http://www.nyu.edu/its/
classrooms/ for more information.
• ITS can help with your research or academic project
ITS offers a variety of services in support of instructors and researchers at NYU, including
computing facilities and special resources, technical support, consultation, and resources management. Examples discussed in this issue include digital project support (“The Clerk’s Tale,” p. 7),
arts technology resources (“Rapid Prototyping,” p. 2), and high performance computing services
(“High Performance Computing Rocks at NYU,” p. 29). Contact the ITS Faculty Technology Center
to find out more about the ways that we can help: its.ftc@nyu.edu.
• You can keep in the know with Connect-Direct
Be sure to watch Connect-Direct, ITS’ monthly e-mail publication, for computer-related news,
security alerts, eTips, and other information of interest to people who use information technology
at NYU. See http://www.nyu.edu/its/pubs/connect/direct.html for more about Connect-Direct.
Download