The computer

The two main types of users are further broken down into the following categories (by computer resource used):

♦ Stationary (office) workstation user. These users (usually knowledge workers) do not need a notebook computer because they need the machine only at work. The machine is usually a small-footprint workstation running Windows 2000 Professional or Windows XP Professional.

♦ Remote workstation user. This worker connects to the network from home or a remote office across a WAN connection or modem. These users still use a fixed desktop computer because they do not move around.

♦ Notebook/docking station user. These users use their computer at work and at home. The user is usually accommodated with a docking station at home and at the office, which makes connecting and disconnecting from the network easier.

♦ Multi-user workstation. This computer does not belong to any specific user. Users making use of this resource are usually guests, users who move around from location to location, temporary staff, shift staff (such as call-center or customer-service representatives), and so on. This computer is also known as a kiosk.

♦ Mobile computer. This computer is usually a notebook or laptop computer, sans docking station, that spends most of its life in a carrying case stuffed inside the cubby of a jetliner. Mobile users can either connect to the office from the road (such as a hotel or conference center) or from branch locations where they can connect to the corporate network.

In each of these cases, you need to establish workstation and user-management policy for each type of user and computer. Further tagging your users as advanced or basic in the literacy level of computer usage often makes more sense than dumping them in one group. We have had knowledge workers who caused endless problems for the administrators and basic workers who should be writing software instead of using it. We return to the subject of how much power to give users in the section "Workstation lockdown," later in this chapter. First we need to deal with the issue of applications.

Create a list or database of these categories. In each category, list a computer name and a username. Take, for example, the following list of mobile computers:

♦ Mobile Computer Accounts

♦ Mobile Computer Users

• Catherine H. Anderson

Was this article helpful?

0 0

Post a comment