Library items tagged:

Version: 3 Issued: June 2019 Reference: IM-DOC-005 Owner: T. Trevithick Last Reviewed Date: 22/10/2024 We may use cookies. A cookie is a small piece of data or message that is sent from a web server to your browser and may be stored on your hard drive. A cookie can't read data off your hard disk or read cookie files created by other sites. Cookies do not damage your system.
You can form connections with your colleagues. If you go to the person who you want to follow’s profile, which you can find by clicking on their name or going to their user profile in https://community.ja.net/users/<first>-<last>. Click the “Connect to this User” button and then confirm your action if you want to go ahead with the connection. The recipient will receive a notification in the connections section in their profile. They will have the chance to accept or decline the connection.
Once you have joined a group, you can create pieces of content for the group. All pieces of content which are associated for a group will show on the group page. These pieces of content are termed user content and are subject to the Terms and Conditions governing user generate content. If the group setting is public, then anyone can be view the content but non-group member cannot comment on them. Only members of a group can create content for the group.
This section is a user manual to help users with aspects of the Jisc community site Dealing with: Content Groups Login and accounts Users
Version: 3 Issued: June 2019 Reference: IM-DOC-004 Author: G. Kett Last Reviewed Date: 22/10/2024 The Jisc Community site is a way to get expert answers to your questions and queries regarding Jisc products or in the areas that the company works in. It is also an opportunity for you to engage and collaborate with your peers and experts in the field and areas that they are passionate about.
Do you agree with the overall proposal: that universities and colleges should be able to use JANET in pursuit of their business and community engagement activities, as far as is possible within the same regulatory framework as that governing use of teaching and research activities? If you do not agree, please summarise your reasons for disagreeing.  Do you have an alternative proposal which would also lead to more effective use of JANET in pursuit of business and community engagement?  If so, please summarise this. If you do agree:
The online response facility can be found at: http://www.surveymonkey.com/s/janet-bce. The online response asks for the respondent’s name, affiliation and contact details (the latter in case of a need to follow up).  It then asks eight specific questions, listed below.  There is also an opportunity to give any other information, comment or opinion not covered by the questions.
A university or college might choose to retain a commercial ISP for operational reasons, such as ensuring resilience of Internet connectivity via another provider besides Janet, or to lay off liabilities when providing Internet access to students or visitors. Otherwise a separate ISP connection should not be necessary under this proposal, provided that the use of Janet is part of business and community engagement activities.  As suggested in the previous section, where this is patently is not the case the safer option will be to use a commercial ISP connection and services.
The following are a number of examples of the possible application of this proposal where questions were raised in the Stakeholder Panel and expert group discussions and elsewhere, and where the answer may not be straightforward.  We would be particularly interested in hearing of other examples meriting similar analysis.
The Sponsored Connection licence scheme only allows the provision of the Janet IP service via the sponsored connection, but under this proposal there is the potential to offer other Janet services where appropriate. Formally, the Janet network security service (the CSIRT) is not available to the sponsored organisation to provide advice and other services, but informally it often is involved with the hosting organisation in resolving security incidents.