FEATURE An Overview
of Public Access Computer Software Management Tools for
Libraries
by Richard Wayne
Most libraries now recognize that public access computers
are essential to providing excellent service to patrons.
Managing these computers has become a major responsibility
for library staffs. Patrons expect to find secure and
well-maintained computers that have simple, stable,
and predictable interfaces.
In my capacity as assistant director for Information
Systems at The University of Texas Southwestern Medical
Center at Dallas (UT Southwestern) Library, I have
grappled with public access computer issues for years.
Ten years ago there were few software tools available;
however, today there are many easy-to-use and cost-effective
alternatives to help manage public access computers.
Tools to Help Manage PACs I'm about to describe a representative sample of
software tools in several important categories. This
article does not attempt to address all programs in
all software management categories because there are
too many products to do that. I'll discuss specific
products from specific vendors, but won't recommend
any. You should do further research and make a purchase
decision appropriate to your environment. Most of the
software discussed in this article is available for
testing prior to purchase. Some of the programs are
free.
The categories of management software that I will
address are setup software, security programs, integrity
maintenance software, browser control tools, antivirus
software, anti-spyware software, patch management tools,
session managers, print management systems, system
utilities, and some Microsoft software options. However,
I won't address filtering software, anti-spam software,
privacy tools, network troubleshooting tools, firewall
software, and some other categories of management tools
in this article.
Computer Setup
I prefer an iterative method of developing a new
computer configuration. Richard Wayne's Iterative Development
Methodology goes something like this:
Start with the best available hardware.
The new hardware ideally consists of identical
models to minimize deployment issues.
Talk to library and information technology
staff and patrons, and then create your first hardware
and software configuration for testing.
Place the configuration someplace where
you can gather further staff feedback.
Develop a second computer configuration
based upon staff feedback.
Place the configuration in a location
to gather further staff and patron feedback.
Develop a third configuration based
upon staff and patron feedback.
Place the configuration in a limited
number of locations for further staff and patron
feedback. Further revise the configuration
if necessary after usage.
Replicate the revised configuration
by replacing the old configuration with the revision.
Once you have developed your final configuration,
preserve it. Make a copy of the configuration and place
it on a server, another computer, an external hard
drive, or a DVD. Then you can replicate your configuration
using software tools like these:
Symantec Ghost can back up, store, and replicate
configuration images. PowerQuest's DeployCenter has
superseded PowerQuest's Drive Image Pro and can also
help deploy software configurations. In December 2003,
Symantec acquired PowerQuest.
Develop a test environment if possible. Then you
can try various software packages without impacting
your production systems. Your test environment should
mimic your production environment as closely as possible.
Microsoft's Virtual PC 2004 can help you to emulate
several operating system environments on a single test
computer.
Security Programs
I will discuss security programs in two sections.
Those that prevent patrons from intentional or unintentional
mischief and access are presented in this section.
The programs that clean up the potential clutter after
patron sessions are listed in the next section ("integrity
maintenance software").
"You need to have aggressive, real-time virus scanning
enabled at all times."
CybraryN from Computers By Design prevents changes
to a PC's configuration. It can be configured to authenticate
to your integrated library system (ILS). For example,
CybraryN works with systems from Innovative, Dynix,
Sirsi, Gaylord, and other ILS vendors. If a patron
does not have a valid bar code, has excessive overdues,
or is not a valid patron type, then he or she will
not be able to use the public access computer if you
design it that way.
CybraryN provides a menu and other features to prevent
patrons from corrupting the computer's software. The
patron is locked into the CybraryN interface and cannot
execute programs or utilities that damage the configuration.
Fortres 101 from Fortres Grand does not provide a
menu, but it does lock down specific Windows settings.
By locking Windows settings, you can control what your
patrons can and can't do. FoolProof Security from Riverdeep
is another product that provides desktop security by
locking down Windows features.
Integrity Maintenance Software
Even with security software loaded, it is likely
that, over time, your public access computer software
will become corrupted and collect extraneous data.
The solution to the problem is integrity maintenance
software.
Centurion Technologies provides two alternatives.
Centurion Guard uses both hardware and software. DriveShield
uses software only. Upon reboot, any changes patrons
have made are removed, and the system is restored to
its initial configuration.
Deep Freeze from Faronics Technologies and Clean
Slate from Fortres Grand are also software-only options
for integrity maintenance. All of the products in this
category allow you to protect only the drives that
you wish to protect. For example, if you have an antivirus
product on your D:\ drive, then you could configure
the software to protect your C:\ drive from changes,
but not your D:\ drive.
Browser Control Tools
Let's face it, the Web is tremendously popular with
our library patrons. As a result, they will attempt
to use every available computer for general Web access.
Sometimes, these can be computers designated for OPAC
or licensed database use only. When that happens, you
want to make sure that only the catalog or subscription
databases can be accessed from those computers. If
you don't, they will end up becoming general Internet
access computers.
Public Web Browser (PWB) from TeamSoftware Solutions
controls Web browser sessions. PWB replaces the Internet
Explorer interface with an interface that is highly
configurable. It allows you to specify sites that can
or can't be accessed via the browser. PWB also lets
you customize a number of other options such as buttons,
drop-down menu items, home page default, pop-up policies,
printing settings, and download capabilities.
K-Meleon from kmeleon.org also allows you to control
many browser functions. It is free, open source software.
WINSelect from Faronics gives you control over many
browser and Windows features.
Antivirus Software
In 1992, extensive media coverage led to Michelangelo
virus hysteria. It was a DOS-based virus and was a
new experience for computer users at that time. At
UT Southwestern, we distributed Michelangelo detection
and removal tools on diskette to hundreds of customers
at a centralized "crisis center."
Virus writers have come a long way, and so have the
applications to combat them. Today, you need to update
your antivirus software at least daily. You need to
have aggressive, real-time virus scanning enabled at
all times.
A number of good tools are available to help with
this effort. A few of the major antivirus vendors are
Computer Associates, McAfee, Panda, Sophos, and Symantec.
Anti-Spyware Software
Running anti-spyware software on a system for the
first time can be an enlightening and shocking experience.
It's not uncommon to find hundreds of pieces of spyware
on a system. Spyware can violate your privacy and compromise
the integrity of your systems.
You can download free anti-spyware software from
several sites. One tool is Spybot Search & Destroy
from Patrick M. Kolla. Another free application (for
non-commercial use) is Ad-aware from Lavasoft.
Patch Management Tools
Information technology professionals have been accustomed
to keeping antivirus software up-to-date. The Blaster
worm opened our eyes to a new threat in 2003we
saw that Windows systems also needed to be kept up-to-date
with critical updates issued by Microsoft. The industry
has been in a whirlwind of activity since Blaster,
trying to anticipate the next round of malicious software.
There are a number of applications available to help
keep systems patched and secure.
Microsoft has developed a patch management tool called
Software Update Services or SUS. It is used to deploy
critical Windows updates throughout your library. As
of this writing, SUS 1.0 with Service Pack 1 is available.
SUS 2.0 is in development and has been renamed "Windows
Update Services."
Shavlik Technologies provides a powerful patch management
product called HFNetChkPro. The Microsoft Baseline
Security Analyzer (MBSA) uses the HFNetChkPro scanning
engine. MBSA is a free tool that allows systems administrators
to identify required patches for computers throughout
the network.
Session Managers
Your staff members could spend a great deal of their
time matching patrons to available public access computers
as well as refereeing fights for available computers.
[Editor's Note: See the feature on page 18.]
However, the process can be automated to free your
staff for more sophisticated (and safer) patron interactions.
EnvisionWare's PC Reservation controls patron access
to public access computers. It can work with an ILS
to authenticate patrons prior to granting access to
a computer. It can be configured for use in a patron
self-service mode or a staff-managed mode. It even
supports making reservations via the Web or telephone.
"Running anti-spyware software on a system for the
first time can be
an enlightening and shocking experience."
Comprise Technologies offers Smart Access Management
or SAM. It has a number of interesting modules for
time, reservation, Internet, desktop, and report management.
Print Management Systems
Print management systems help to reduce wasted paper
and ink cartridges. They also make the printing cost-recovery
process more efficient for both patrons and staff.
With LPT:One from EnvisionWare, you can set a price
per page, a maximum number of pages that a patron can
print, and different prices per printer. A simple dialogue
leads the patron through the printing process and gives
her an opportunity to cancel printing altogether.
Computers By Design, GoPrint Systems, and Pharos
Systems also offer solutions to manage printing. Most
systems can be controlled by staff or can work independently
with both card and cash payment systems.
System Utilities
System utilities is a broad category. However, it
gives me the opportunity to mention some miscellaneous
tools that I have found to be helpful.
Norton SystemWorks from Symantec includes a number
of products, such as Norton Utilities, which can detect
Windows and disk problems and fix them, as well as
optimize file storage on your hard drive.
Partition Commander from VCOM can create a new partition
on an existing system. I have used this product to
create a new partition for antivirus software. That
partition is treated differently than the others on
the system. For example, on systems with Centurion
Guard, the partition with antivirus software is not
cleared at reboot.
X-Setup Pro from XQDC, Ltd. is a tweaker program.
It can help you to modify Windows settings that are
buried deep within the Windows registry.
Multiyear system warranties are commonly available.
Hardware has also become more dependable. However,
there are times when you still need a bootable hardware
diagnostic program that can help troubleshoot hardware-related
problems. ToolStarTest from Veteran Computer
Solutions has helped me out of a few jams. Another
useful tool in this category is the Ultimate Boot CD.
Some Microsoft Software Options
Microsoft Windows, especially the more recent versions,
offers options to perform some of the functions that
I've addressed in this article. In most cases, features
can be applied from a server or at individual workstations.
Group Policy can control the Windows desktop as well
as many other Windows features. In Windows 2000 and
XP, you can run Microsoft Management Console to set
group policies. An example may help to demonstrate
the feature's potential: In Windows XP, you can set
Group Policy to prevent patrons from seeing the Network
Neighborhood icon on the desktop.
NTFS is the NT file system. A partition that is formatted
with NTFS has extensive security capabilities. For
example, you can set read-only access to a folder for
specific users or groups.
Windows versions since NT have different user types.
In Windows XP, for example, the user "public" might
be a limited user (restricted to performing only certain
functions). The sysadmin would be an "administrator" user.
Microsoft provides the Internet Explorer Administration
Kit or IEAK to manage IE. It was designed to help configure
and deploy the browser.
"Print management systems help to reduce wasted paper
and ink cartridges."
Microsoft offers PowerToys for various versions of
Windows. Within PowerToys is a program called Tweak
UI. It is somewhat similar to X-Setup Pro mentioned
earlier. It provides a graphical interface that allows
you to modify a number of Windows settings.
Finally, Systems Management Server or SMS is offered
by Microsoft as a comprehensive solution for change
and configuration management. It can help administrators
in the areas of application deployment, asset management,
and security patch management.
Just a Quick Overview
I have breezed through many software tools. Many
more are available to help you manage your public access
computers. Use this article as a starting point. After
analyzing the needs of your particular library, you
should do further research. You can probably find a
few affordable tools to meet the needs of your environment.
There are a number of choices in most of the categories
of software that I have discussed. Many of the vendors
mentioned have other products that may also help you.
Software tools must be maintained and kept up-to-date
in order to function well. In many cases, vendors offer
companion network tools that provide the ability to
maintain all computers from a single administrative
workstation or server. Some of the tools also have
extensive reporting capability to assist in decision
making.
Don't despair. There are a number of commercial and
free products and resources to help you manage one
of your biggest challengesthe public access computer.
References
Richard W. Boss, "PC Reservation & Print
Management Software," Public Library Association
TechNotes, June 2003. http://www.ala.org/ala/pla/plapubs/technotes/pcreservation.htm
Michael P. Sauers and Louise E. Alcorn, Neal-Schuman
Directory of Management Software For Public
Access Computers, Neal-Schuman Publishers,
Inc., 2003.
Jennifer Ward, "The Library Web Manager's Reference
Center," Berkeley Digital Library SunSITE, May
20, 2003. http://sunsite.berkeley.edu/Web4Lib/RefCenter/lwmrcpublic.html
Richard Wayne, "Links to Desktop, Company,
and Enterprise Security Resources," Strategic
Information Management Services, March 10,
2004. http://www.strategicinformation.com/d_security/secure_links.htm |
Richard Wayne has managed the
systems group at The University of Texas Southwestern
Medical Center at Dallas Library since 1992. He does
hands-on technical work with Windows, UNIX, Macintosh,
PDA, wireless, and other technologies. Prior to joining
UT Southwestern, he was in the information technology
field for more than 10 years in a number of technical
and managerial capacities. He is also the principal of
Strategic Information Management Services, a library
technology consulting firm. He has worked with a wide
range of library technologies in public, academic, and
special libraries. His particular area of expertise is
information security in the library environment. His
e-mail address is richard.wayne@utsouthwestern.edu.
|