Both LTS and individual departments provide conference rooms which may be reserved as study rooms or for meetings.
EWFM 625 -- Full Details and Instructions
A dual-camera classroom to which remote students can connect in real time
Core technologies installed in the learning space include:
- Lectern-facing camera
- Audience-facing camera
- Fixed microphone attached to lectern
- Wireless microphone receiver
- Ceiling microphones for capturing audience audio
- Document camera
- Annotatable monitor
Chairs that are _not_ fixed to the floor, and can be moved around the room.
Movable desks can be found in some rooms, and enable easy re-arranging of the room to suit particular activities.
This is a Core i7-3770 CPU with 8GB of RAM, a 128GB solid state drive, CD/DVD ROM drive, and integrated Intel HD video.
Start here: This is a touch-activated control panel that activates (powers up) and selects the display, audio and computer equipment in the room. Some touch panels are as large as a computer monitor, and may enter a sleep mode. Tap them to wake them up. For full information, read the step-by-step instructions below.
Please remember to select 'Power Off' before leaving the room.
This video camera is mounted in a fixed position and is focused on an adjustable shot of the lectern/front of a learning space.
This video camera is mounted in a fixed position and is focused on an adjustable shot of the audience portion of a learning space.
Microphone(s) mounted in the room's ceiling for picking up audience voices for web-conferencing and other audio applications...
Computers at LTS facilities are part of a network that not only connects them to the internet, but also allows them to share software, data, and other resources such as printers. This guide explains how to use these computers, where to find assistance, and the policies governing their use.
- How do I log on to a Lehigh PC?
- How do I handle a locked workstation?
- What happens when I start up (or restart) a lab or classroom PC?
- What will I find on the Desktop?
- How do I install software on a classroom or lab computer?
- How can I access email on classroom or lab computer?
- How long does it take for the screen saver to kick in?
- How do I log off of a Lehigh PC?
- How can I help keep classroom and lab computers more secure?
- Where can I find computers and computer-enhanced classrooms?
- Where can I get help?
Once any LTS computing site computer has been started and is ready for use, you will see the instruction to press Ctrl-Alt-Del to Login. Pressing the Ctrl, Alt, and Del keys will invoke a login dialog box. To log into the computer, enter your user name and password in the appropriate fields; press the Tab key to move between fields. Make sure "Log on to: AD" below the password field is visible. If it says something like "Log on to: PS-xxxxx" then you'll need to enter your username as "ad\username" in the username field. If it says "Log on to: FSxxxxxx" then it's a faculty/staff machine (you may still be able to login using ad\username if you have permission). When you are finished using a computer at an LTS Computing Site, REMEMBER TO LOG OUT. If you fail to log out, someone could access your email, coursework, or academic records. To log out, click on Start and choose Log Off from the Start Menu. Make sure you are completely logged out before you leave the PC. Often the logout process with require user confirmation or the process could hang. You are not logged out until the PC returns to the main Logon screen.Back to Questions
If another user has been logged into the workstation and left without logging out, the computer will display the message "Press ctrl + alt + delete to unlock this computer" and below that in small type it says who's logged on. If you are not the user who is logged in you will need to turn the PC off and then on again. Hold the On/Off button down for at least 10 seconds or until you see the light behind the button disappear. Then, turn the PC back on, and log in as usual.Back to Questions
On boot up the computer will display some messages as it loads it's operating system into memory. The system will briefly display a menu with two choices: Press F3 to ghost or wait 5 seconds for normal boot. If F3 is selected, the reload process will take 30- 40 minutes on a lightly loaded network with a 100Mb connection. Please do not touch the keyboard until the process is completed. It is important to not interrupt this process once it has started. Ghost Refresh - If you selected Ghost Single Refresh option, the computer will load software to connect to a remote image server and run ghost from this server to restore the hard drive image for this computing site computer. As it finishes, it will automatically reboot the computer twice more. The Ghost refresh resolves many computing issues, including printing problems, software errors, network problems, and more. When the refresh process is complete, all software not on the base image will have been removed from the hard drive (see software section below for an explanation). The computer will continue to start up Windows and then present you with the login screen.Back to Questions
The Windows desktop contains several items. Along the right-hand side are:
- Clock widget
- Course Site
- Google Apps
- LTS Help Desk
- LTS Updates
- Papercut printing impact widget
At the bottom of your screen is the taskbar which includes the Start button at one end and the system clock at the other.
Other icons, such as the Firefox, IE, Chrome and Word quick launch and the Microsoft Antivirus active protection logo, may appear in the taskbar.
All software can be started from the Start button's 'All Programs' menu.Back to Questions
Each classroom or lab computer comes with a base set of programs, which include the following titles: Adobe Reader, iTunes, Microsoft Forefront Endpoint Protection (antivirus software), Microsoft Office (Word, Excel, PowerPoint, Access), Notepad ++, Internet Explorer, Firefox, Thunderbird, along with Quick time, VLC and Paint.NET. (Other utility programs are under Accessories.) LTS refers to this base set of programs as the base image. Performing a complete software reload provides a new copy of this base image to the computer's hard drive. Click the Software link on the Desktop to install software that is not included in the base image. There may be restrictions on where some titles can be installed.Back to Questions
There are several methods for accessing your Lehigh electronic mail from the computing sites.
- Webmail, the web based mail reader- Point your browser to http://webmail.lehigh.edu
- Lehigh Gmail - Click Google Apps mail icon on left margin of Lehigh homepage (just above LTS Alerts).
- You can also access email from the Campus Portal (http://portal.lehigh.edu) via the Mail icon in the upper right corner.
More information about using mail can be found on the web page:https://lts.lehigh.edu/services/faq/email-guide-faqBack to Questions
In order to protect users' confidential data, a password-protected screen saver has been implemented at the computing sites and computer classrooms. The timeout for classroom instructors stations is 2 hours, for all other computing site machines it is 10 minutes. The screen saver can be activated at any time by pressing the "Windows + L" keys on the keyboard. The original user can log back into the computer with the Lehigh password. If the original user has left the PC without logging off, the next user will need to shut the PC down and restart it.Back to Questions
When you are finished using a computer at an LTS computing site, REMEMBER TO LOG OUT. If you fail to log out, someone could access your email, coursework, or academic records. To log out, click on Start and choose Log Off from the Start Menu. Make sure you are completely logged out before you leave the PC. Often the logout process will require user confirmation or the process could hang. You are not logged out until the PC returns to the main Logon screen.Back to Questions
Invasive software (described by terms such as computer viruses, worms, and Trojan programs) can be spread around the world in a matter of days; anyone connected to the Internet can be at risk from invasive software. All LTS computing site computers have Microsoft Forefront protection software installed. You can also minimize risks from invasive software. Electronic mail. Avoid opening executable (.exe) attachments and attachments of that are unfamiliar or unexpected. Save attachments as files and run virus detection on them before opening them by right clicking on the file and scanning for viruses. Look out for phishing email, i.e. someone you don’t know or someone pretending to be someone else requesting sensitive and personal information from you. Phishing e-mail usually asks you to e-mail a password, or fill out a form on a non-Lehigh website (check the address bar) with your username and password. Never login any website with your Lehigh username and password if the site isn't part of the "lehigh.edu" domain. Never e-mail your password to anyone, even someone at Lehigh. Web browsers. Download software with caution, and run virus detection on the files before running/installing them. Practice safe downloading practices by loading software from a trusted site.Back to Questions
The LTS Facilities pages contain lists of what equipment is installed in which buildings and rooms.Back to Questions
The Help Desk service in the Fairchild-Martindale Library Information Commons (main floor of the Fairchild-Martindale Library) provides a starting point for getting answers to questions about Lehigh libraries, computing, and telecommunications. Help Desk staff respond to inquiries about hardware, software, classroom and lab computing, library collections and services, and phone problems and services. You can reach the help desk by calling 610-758-HELP (4357). The Help Desk is available by email at firstname.lastname@example.org or by chat. More information about the Help Desk is available at: http://www.lehigh.edu/helpdeskBack to Questions