Minutes of Smathers
Middle Manager's Meeting
July 17, 1997
Present: Rich Bennett, Suzanne Brown, Tom Cetwinski, Gary Cornwell, Robena Cornwell, Carol Drum, Stephanie Haas, Winston Harris, Carolyn Henderson, David Hickey, John Ingram, Tom Minton, Richard Phillips, Jan SwanbeckCORE Vendor Recommendation
Departmental Node Estimates
- The NTAC recommendation for a vendor was turned over to the President & Provost yesterday, a decision is expected by next week. CISCO is the nominated company, with a $400,000 purchase price. The CISCO network presentation resembles a faster version of the existing system. The NTAC proposal can be viewed at: http://www.ntac.ufl.edu. The IBM proposal came in at less cost - as they have access to grant funds. In any event, once the University officially decides, it will be easier to proceed with upgrading our network - expanding the HUBS and bandwidth.
- Systems will need an estimate from each department on how many nodes it will need over the next few years. This includes staff & students - an estimated number of ports. Systems will be placing orders to vendors sometime in August for $50-$100,000 worth of equipment. The vendors are advertising 40-50% off the list price by the end of the year on purchases of this quantity. Systems will need the departmental estimates by the first week in August.
Email Only Stations
- The current Circa labs may become places to set up for computer access - only jack plates provided. Lombardi foresees dozens of in-town firms offering low-rate computer access - like copy businesses that rent by the hour.
- Student computers - will laptops be the ideal way to go? Arguments against are the cost ($4-$5000), hard to expand, easy to steal, poor graphics. Student Financial Aid will figure in the cost of computers once they are officially required by the University.
Anonymous Internet Access
- Circa may go with this - the Libraries have not officially decided on a policy for email. Currently, the policy is mixed. There is a problem with effective policing of work stations for email usage. Those that know how to get in & access their email, do.
- Anonymous Internet access is soon to be a thing of the past. Figuring out who is on the Net & from where they are accessing is getting to be big business. Tracking down & stopping illegal operations is high priority. This will have impact on the public service areas. These branches of the Library will want to have a voice when it comes to setting down this policy. Anonymous access will disappear, non-SUS people will need to be authenticated. Obviously this will require staff time to authenticate these patrons. There are quite a lot of people outside the system using the access we provide. Theoretically, when logged on, the system will know what you should have access to. The University is trying to resist censorship & promote freedom of information - but anonymous access comes at the state’s expense.
Back to the Systems Homepage
Last updated February 18, 2000
by Debra Harris