31.12.2014 Views

Ph.D. Program Guidebook - The University of Chicago Booth School ...

Ph.D. Program Guidebook - The University of Chicago Booth School ...

Ph.D. Program Guidebook - The University of Chicago Booth School ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Ph</strong>.D. <strong>Program</strong> <strong>Guidebook</strong> 2007-2008<br />

CHAPTER 13 – COMPUTING FACILITIES, RESOURCES AND<br />

POLICIES<br />

<strong>The</strong> <strong>Ph</strong>.D. Student Computer Lab (Room 383) is a room designated for the exclusive use <strong>of</strong><br />

<strong>Ph</strong>.D. students. <strong>The</strong> room contains PCs/linux machines, a printer, storage “lockers,” and a<br />

dry erase board.<br />

<strong>The</strong> Computing Services staff outfits each PC with a special “build” designed to incorporate<br />

all the s<strong>of</strong>tware the <strong>Ph</strong>.D. <strong>Program</strong> has licenses to, installed in the most efficient manner. <strong>The</strong><br />

majority <strong>of</strong> the PCs have all <strong>of</strong> the same s<strong>of</strong>tware; a few PCs have additional s<strong>of</strong>tware that is<br />

used less frequently. Installation, as well as any necessary follow-up service and repairs, will<br />

be handled solely by the CS staff. Students are prohibited from installing s<strong>of</strong>tware on GSB<br />

owned machines.<br />

PH.D. PROGRAM COMPUTING RESOURCES<br />

Each student’s general GSB login and password enables usage <strong>of</strong> the GSB <strong>Ph</strong>.D. computing<br />

workstations. Upon request, a <strong>Ph</strong>.D. student receives a Research grid user I.D. entitling the<br />

student to use the research grid server. For basic everyday usage, there is a 1 gigabyte limit.<br />

Students working on special computing projects requiring extraordinary amounts <strong>of</strong> disk<br />

space for a limited period <strong>of</strong> time should request a temporary allocation <strong>of</strong> more storage by<br />

submitting the “Application for Temporary Increase <strong>of</strong> Research Grid Space” to the<br />

Associate Director. This form is available on the “Useful Forms” section <strong>of</strong> the <strong>Ph</strong>.D.<br />

<strong>Program</strong> website at: http://programs.chicagogsb.edu/phd/forms/docs/research-grid_-<br />

ncrease.pdf. A faculty signature is required.<br />

COMPUTING POLICIES<br />

Students are expected to know and comply with the university's computing policies,<br />

including but not limited to:<br />

1. Eligibility and Acceptable Use Policy for Information Technology<br />

http://www.uchicago.edu/docs/policies/eaup<br />

2. Student Manual <strong>of</strong> <strong>University</strong> Policies and Regulations<br />

http://www.uchicago.edu/docs/studentmanual<br />

3. Policy Guidelines for Publishing Networked Information<br />

http://nsit.uchicago.edu/policies/publishing-policy/<br />

4. <strong>Chicago</strong> GSB Acceptable Use and Privacy Policy<br />

http://computing.chicagogsb.edu/computing/policies/aup.asp<br />

Students also are expected to be aware <strong>of</strong> and comply with <strong>Chicago</strong> GSB's Computer Use<br />

Policy (posted on the <strong>Chicago</strong> GSB Computing Services Web site), which includes, but is<br />

not limited to, the policies and procedures provided below. Disruption <strong>of</strong> computing through<br />

deliberate human action—whether it affects the operation <strong>of</strong> computing systems or<br />

telecommunications, the security <strong>of</strong> electronically stored information, or the integrity <strong>of</strong> such<br />

information—is a serious academic <strong>of</strong>fense and will be subject to disciplinary action within<br />

the university as well as to civil or criminal action. Following are some illustrations <strong>of</strong> forms<br />

<strong>of</strong> computer abuse that will be subject to punishment.<br />

rev. 7/2007 68

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!