Getting Started: Faculty
This page is for CSAIL Faculty to quickly get an overview of what services are available and how to get them, as well as recommended computing best practices.
Access to just about everything TIG has to offer is granted via your CSAIL Kerberos username and password. You can obtain a user account, and optionally a CSAIL email account, by filling out the application form: Request an account here.
If you have forgotten your CSAIL Kerberos password, please come by the TIG area room 32-270 or thereabouts during business hours with a valid photo ID and a system administrator can help you reset it.
Faculty accounts do not expire and do not need renewal. They are active through your appointment with CSAIL.
See Accounts and Authentication for more info
CSAIL Web site Profile
One of the most common tasks all new and existing CSAIL members have is getting their public profile on the CSAIL web site and up to date with biographical and bibliographical content. See this page on how to get started.
- You will need MIT certificates for Atlas, Coupa (purchasing), Concur (travel), SAPweb (financials), and many other Institute-wide applications.
- TIG supports the use of all major desktop and mobile mail clients with CSAIL email.
- TIG recommends using Thunderbird, which is available for all of the platforms TIG supports.
- Webmail: You can access your email from anywhere, without the use of an application, by visiting CSAIL’s Horde webmail.
- Email Filters: CSAIL mail provides optional mail filtering and rules. All email filters and rules should be set in webmail. Avoid setting filters and rules directly on your email client, because these only function when that particular client is open.
- If your email is forwarded to MIT’s mail system, we have no ability to provide email support. Please see MIT IS&T.
See Email and Communicating for more info
- All users who wish to print from a wireless network connection must use the “CSAILPrivate” wireless network. If you are connected via Ethernet you don’t need to do anything special.
- For larger print jobs we recommend using one of the Xerox WorkCentre 7970’s, such as xeroxhq or xerox3
See Printing, Copiers, and Scanning for more info
TIG and MIT provides data storage in many forms: the AFS and NFS network file systems, Ceph object and block storage system, as well as MIT Dropbox for Business. Together, these services comprise over 1PB of local data, much of which is backed up using enterprise backup hardware and software, and rotated through off-site storage facilities for disaster recovery.
- Avoid saving files locally to your computer
- Using Cloud / Network storage:
- Maximizes collaboration
- Provides a robust and automatic backup solution
- Can allow for access across multiple devices
See Data Storage for more info
If you need your own workstation or your group needs a physical server(s), we encourage you to consult with TIG before committing to a purchasing decision.
See Hardware for more info
TIG provides support, installation, and troubleshooting of Windows, MacOS, and CSAIL Ubuntu, and well as most MIT provided business applications. Some MIT business applications such as SAPgui and MIT Mail, for example, we can only provide our best effort support as we do not have administrative control or access to these applications
By far, the most common operating systems in use at CSAIL are CSAIL Ubuntu, Microsoft Windows, and Apple macOS. We provide some level of support for each of these platforms.
For pre-configured Windows, Mac, and Linux machines available for Lab use, see:
IS&T offers a wide range of free software applications for the MIT community:
- Never leave your laptop unattended
- If you need to leave your laptop, make sure it is behind both a locked drawer and a locked office.
- Make sure your laptop has a login password set, and is set to lock when closed or idle.
- If you have a Mac, enable “Find My Mac”.
- Don’t remove the TIG account.
- Get a STOP tag and your laptop registered.
- LastPass: use LastPass for saving your passwords. Download IS&T’s licensed, enterprise version.
- Avoid using the same password twice (e.g., across multiple user accounts and / or software systems).
- Use a minimum password length of 12 to 14 characters if permitted.
- Generate passwords randomly where feasible.
- If you think a password may be compromised, you should contact us and change that password ASAP. Also change any system that has the same password.
Phishing is a ploy to get you to click on bogus links or disclose your username and password, giving attackers a way to capture sensitive data, such as usernames, passwords, and credit card details. Learn about the latest attacks. Don’t ever answer requests for passwords via email or telephone. Neither TIG nor IS&T will ever ask for your password in an email.
If you think you might have responded to a phishing attempt, change your passwords ASAP and contact us.
Learn more about phishing at MIT and CSAIL.
Accessories and Equipment Loaning
TIG offers an extensive array of adapters, cables, converters, tools, A/V equipment, and much more for temporary or permanent loan. If you need anything please come down and we may have it!
Technical Information for Grant Proposals
In some in a grant or contract proposals, sponsors require information on technical / computing infrastructure specifications at CSAIL. This summary provides that information.
TIG is a resource for all your computing and facility related needs. Contact us to report everything from a broken door handle to a problem with a server or email. We encourage any feedback, and welcome all to stop in room 270 any time and meet the TIG staff.
- TIG is available Mon - Fri, 9 AM - 6 PM US/Eastern Time
- E-mail If you would like to open a support case regarding Computing or Facilities related issues, sending an email to the address below will create a trouble tracking ticket in which we will promptly respond to.
Come visit us on the second floor of the Stata Center, in 32-270. We’d be happy to see you.
32 Vassar St 32-270
You can also reach us by phone. You can leave a voice mail if we are unavailable.
When leaving an off-hour message via voicemail you may be waking up an uncaffeinated sysadmin. Reserve off-hour voicemails for emergencies only.