CED Student Technology Center
- About CED
- News + Events
- Research + Design
- About CED
- News + Events
- Research + Design
The Student Technology Center(STC) is located in room 477, on the fourth floor of the south tower at Bauer Wurster.
Computing Account Services
- Computer labs and satellite areas
- Papercut (Print management)
- Specialty print/scan equipment (477)
- Cloud Printing
- Photorealistic printing/plotting equipment
- Student laptop support
- Rendering Farm
- Plotting and Printing
With a computer account, users receive access to the computers (outside of scheduled instructional activities) located in the computer labs (214 and 479) and computers distributed throughout studios, PhD offices, lounges, etc.
All computers are similar hardware, and run the same software image.
Since the computer accounts provides 24/7 access to the Labs, it also provides 24/7 access to Bauer Wurster Hall. In addition, a limited pool of Lab computers are available remotely 24/7 via Citrix.
A Computer Account is incomplete without the ability to print, so a Lab account also provides a PaperCut account that is used for printing and can also be used in the CED Materials Store.
The Student Technology Center provides specialty equipment such as a large scale scanner, B&W laser printer capable of tabloid, and a photo-realistic plotter. To use these equipment you must have a computer and print account.
Cloud printing allows Users to print from their laptops (or desktops) to a Studio or Satellite laser or inkjet (letter to tabloid sized documents). Instructions are located in the CED knowledge-base.
Computer Lab 214 has two Epson Color Inkjets capable of photo-realistic printing on various sized paper, from card-stock up to tabloid. You must bring your own paper or purchase some from the CED Materials Store. Additionally, in room 477 there is a HP photo-realistic plotter that can print full-bleed.
Computer Labs and Studios have photo scanners (Epson Expression 10000XL) and are available for use by all authorized users of the Labs. These are 2400 dpi, 12800 x 12800 dpi resolution, with a maximum scan area of 12.2″ x 17.2″. A high quality large-scale scanner is also available in the Student Technology Center (477) and can handle documents up to 46″ wide and images 42″ wide. It scans at 12″ per second and can take media up to 20mm thick and features 1200 dpi resolution. Instructions for both types of scanners is located here.
Student Laptop and mobile device support is offered by Educational Technology Services. They will provide wireless, software, and troubleshooting and have both drop-in hours and reservations available in Doe Library and Eshelman Hall.
CED has a server-based Rendering Farm running on Windows with Thinkbox – Deadline as the coordinator of the rendering requests. The rendering software is on each computer in the Computer Labs and Satellites, and is incorporated into Rhino and V-Ray for Rhino. You can send off your data file to the Rendering Farm where the file is held in a folder on the server waiting for its turn to be rendered and, once complete, you will be notified.
A detailed how-to guide is in CED’s Help Desk knowledgebase. Some additional comments:
- Finished jobs will be deleted after 2 days.This is not an archive so inactive files and folders will be deleted without notice.
- Copy and open your file in your folder in the appropriate network share.
- When submitting a job, you must use the absolute path to the server.
- If you are using any non-default textures, you must copy those to your textures folder.
- When open, Rhino locks your file as read-only to other programs. Your job will not render until the Rhino file is closed, so after you submit your job close Rhino.
- Some students are already trying to break into the Rendering Farm back end. This action is against policy and students identified doing this will lose all access privileges, may be fined, and reported to the Office of Student Conduct.
Black and White Printing
Black and White printing on color laser printers
If the area you are working in has a B&W printer it will be either Xerox (letter sized) or HP (usually able to print tabloid). If you print B&W on thes printers it will charge the least expensive printing costs, but if you bring B&W on a color laser printer it will charge color costs. (Some say the B&W printing on color lasers produces a sharper image, but that is your call.)
Printing B&W tabloid
Computer Labs 214 and 479, 493, and 477 each have a HP B&W printer capable of letter and tabloid duplex. In the studios tabloid B&W are on floors 6-7-8-9.
Xerox and file names
The Xerox B&W printers cannot accommodate file names >255 characters, so name print files carefully. If printing directly from Google Docs, which supports long file names, the print queue will most likely jam and will require staff to come and clear the printer.
Cloud printing B&W tabloid and duplex
If you need B&W tabloid size (single or duplex) printing, and your local B&W printer does not support that sized paper, you may choose to Cloud Print to the HP laser in 477, or log into the computer in 477 and print directly to this laser printer. Please remember to pick up your prints as print-outs are recycled weekly.
Color Laser Printers
For printing B&W on color printers you must remember to use the gray-scale setting. Choose the printer definition carefully and remember you will pay color prices.
These printers run very hot and too much ink saturation on the page will cause a severe jam that will take the whole printer down until fixed. Do not exceed 150 dpi on these printers and do not use greater than 80% ink on the page. We have posted step-by-step instructions for clearing the most common paper jams in the HP Color LaserJet 5550 here.
Students with CED computer accounts and print accounts can access Cloud Printing. This will allow you to send print jobs from your laptop, via the web, to a laser printer in the Studio or 477’s B&W laser printer (which can do tabloid and duplex). Cloud printing does not work for plotters or for any remote printing into the Computer Labs due to its potential interference with instruction. Critical to its operations, you need to select both a printer to send your job to as well as the exact specifications, for instance, “letter color one-sided” or “tabloid b&w duplex”.
Instructions for Cloud Printing are located in the Help Desk system and walk you through what to do to access and use the system.
- Two-sided B&W printing is available in 477 during the normal office hours (M-F, 9- 5).
- No Cloud Printing to plotters.
- No Coud Printing from mobile devices (iPad, iPhone, Android devices).
- Two-sided printing formats pages so they flip on long side.
- PhD “print only” accounts will allow PhD students to Cloud Print to the printer in the PhD room or 477 only.
Common Plotter Issues
Here are some tips on plotting to help transition to this way of printing. Keep in mind it is better to test a large job before you print the final to make sure everthing is setup properly, and do not wait till the last minute to learn how to plot.
- You take a chance when using outside paper, as we do not refund printing issues on paper (sheet or roll) that is not approved.
- Bristol specifically is not approved for use on CED plotters.
- Contact the Lab Manager or ask via the Help Desk for direction on what paper is best for our printers/plotters.
- Create a master file and from that create a print file so you always have a backup in case there is a problem.
- Plot from Adobe PDF.
- Embed all of your images.
- Maximum width of 36″ and a maximum length of 85″. (The plotters can print wider, however CED only supplies 36″ plotter paper.)
- Common sizes are: 36″x48″, 36″x60″, 36″x72″. amd 36″x84″.
- Do not print beyond 180 – 200 dpi.
- Try to rasterize your vectors. This isn’t always possible for a line heavy file, like a topo map.
- If Illustrator struggles with your detailed topo, the plotter will crash.
- Plotting errors happen, so give yourself at least 1 hour to correct any mistakes and plot your boards.
- Many students plot at the last minute so be aware of the crunch.
CED has instructions for plotting from Adobe PDF. There are also instructions on how to convert a file into the PDF.
Training and Instructional Videos
- Adobe: Tutorials and training is available on-line. Here are two links to get started: Adobe Training and Adobe Tutorial.
- AutoDesk: AutoDesk offers an "education community" access through a sign-up process here.
- ESRI: ArcGIS Desktop tutorials (9.2) here. Also there are several ESRI MOOCs (on line classes) available here.
- Microsoft: Microsoft offers a 30-day free trial to on-line tutorials here.
When students first arrive at CED there are expectations that they have basic knowledge on certain software applications relevant to their field. For example, the Office Suite (Microsoft Excel, Word, and PowerPoint); image applications (Adobe Acrobat, PhotoShop, and Illustrator); and some specialty software (AutoCAD or ESRI ArcGis).
Online Video Tutorials
Lab + Studio Policies
- Computing use requirements
- General Computing Policies
- Lab Access
- How to Lose Computing Privileges
- Lost and Found
For all Students and affiliates of CED who wish to use the Computer Labs, three requirements must be met:
- Payment of Computing Lab fees.
- Having a CalNet card and identity.
- Register in the Student Technology Center located at 477 Bauer Wurster (south tower).
UCB or CED Undergraduates: Payment for use of the Computing Labs is required for each semester (Fall, Spring, and Summer).
UCB Graduates: Payment for use of the Computing Labs is required for each semester (Fall, Spring, and Summer).
CED’s MArch, MCP, or MLA students: MArch, MCP, or MLA students have access to the Computer Systems at CED for Fall and Spring semesters.
MUD students: MUD students have Fall-Spring and Summer access to the Computing Labs.
PhD and MS Students: PhD and MS students have the option of choosing between semester-based Computer Lab access or year-long “print only” accounts. The “print only” allows PhD and MS students to print to the Laser Printer in their room and remotely to 477.
By signing up for access, Users are stating they agree to abide by the Campus Computing Use policy as well as CED’s posted and published policies. There are consequences related to not following these policies, which could include: access removal (without any refund) to any or all facilities (Computer Labs, DFL and Shop) for the semester or up to a year. Further, negligent behavior related to equipment may also be associated with access removal and additional fees to cover the cost of repair or replacement.
▪ The Campus and CED reserve the right to limit, restrict, or extend network, computing, and facilities access privileges.
▪ Do not circumvent security, account, or access restrictions to computer systems, printing, or plotting.
▪ Do not disable, break, or hack into CED or UCB systems.
▪ Do not remove any hardware, software, equipment or paper from any of the Labs or Satellite areas
▪ Do not break or remove AV equipment or screens.
▪ Do not share your Cal1 Card card or CalNet identity with others.
▪ CED computer and server systems are not considered private, and the Campus or CED may audit to check appropriate usage.
▪ Do not save data on public computers or at the Rendering Farm as CED frequently reformats and removes student profiles from systems.
▪ Save work frequently using the Cloud, Berkeley Box, or a detached drive/removable disk.
▪ If conducting any financial, personal, or medical transactions use a personal devices not a public CED computer.
▪ It is suggested that Users scan storage devices using anti-virus software, both before and after use of public computing systems.
▪ Do not prop the Computing Lab doors open, break or disable door alarms, or let unauthorized users into the Computing Labs.
▪ Only authorized CED students are permitted to use the computers or print in the Computing Lab and Satellite areas.
▪ Do not use the Computer Labs during scheduled instructional activity.
▪ Unattended machines will automatically log-out users after twenty (20) minutes of inactivity, and all unsaved data will be lost. Trying to bypass this feature is considered a security breech.
▪ Do not log into more than one computer at a time. Remember to log off the computers when you are done.
▪ Do not use Computer Lab machines for unattended rendering; use the sever-based Rendering Farm.
▪ Do not use Computer Lab machines for unattended computations or processing.
▪ No eating is allowed in the computing labs. You may bring drinks with lids, but clean up after yourself so that the area is ready for the next user.
▪ Put paper recycling, garbage, etc. in the proper containers (not the floor or all over the desks).
▪ Do not disconnect any cables.
▪ Computers and printers are to be used in support of schoolwork and are not intended for general entertainment, personal, or commercial use.
▪ Do not share accounts; users are personally responsible for any computer use or printing done from their accounts.
▪ Use only the supplied paper in CED printers. No outside paper is allowed in CED printers, except for the Epson photo printers.
▪ Do not use Bristol paper or Newsprint in the plotters.
▪ No printing on “sticky back,” tacky, or mailing labels.
▪ You are responsible for your own belongings. Do not leave anything in the labs unattended for any length of time.
The Computer Labs are reserved and priority given for scheduled instructional hours. Scheduled hours are posted online. Students not enrolled in the upcoming class must log off the computers and leave the labs five minutes before the scheduled activity starts.
All students who have purchased computer access have 24/7 access to CED’s computer labs. No unauthorized users allowed in the Computer Labs. Studio computing is limited to the department assigned the floor.
Actions that may result in the immediate loss of your access privileges (without a refund) include:
Not following posted CED or UC Berkeley policies.
Not following directions given by the Computing Lab Manager or related IT Staff.
Propping the doors open or breaking/disabling the door alarm systems.
Allowing unauthorized individuals or groups access to the Labs.
Sharing your CalNet id and passphrase so others can use your computer/print account.
Logging into multiple computers in the Labs or Studios.
Unattended rendering or computation on computers in the Labs or Studios.
Attempting to install or remove applications or hardware on Lab or Studio machines.
Attempting to degrade, bypass, or disrupt approved computing or printing processes or performance.
Removing keyboards, mouse, or other equipment from the Lab.
Violating terms of applicable software licensing agreements or copyright laws.
Using a computing area you are not authorized to use.
Attempting to circumvent data protection or security schemes.
Eating in the Computing Labs.
Refusing to leave the Lab prior to the start of schedule instruction.
Basically, do not violate the policies or you will be subject to loss of privileges
Actions that may result in additional charges include:
Operating the equipment (computers, plotters, printers, or scanners) negligently to where repairs are required will result in your payment for the repair/replacement as well as potential loss of privileges.
Breaking any of the office or Audio/Visual equipment in the Labs will result in your payment for the repair/replacement.
Breaking or disabling the door alarm systems will result in your payment for the repair/replacement as well as potential loss of privileges.
Sharing your CalNet id and passphrase will result in your being charged an additional computer access fee to cover the person to whom you gave your account. .
In the event of policy violations, and based on level of policy violation, access to Computer Labs, DFL and Shop access may be singularly or simultaneously revoked.
Lost and found items will be immediately taken to the Facilities Office (117 Bauer Wurster Hall) for short-term storage. By the end of the semester all items in the lost and found will be either disposed of (if the items found are papers, books, pens, pencils, etc.) or sent to campus police (cell phones, larger electronic equipment and other personal items). By the end of May, any unclaimed flash drives or external harddrives will be reformatted and given to the Library, embARC High School students, other summer program participants, or the IIT group.
In order to provide its constituency with secure yet open electronic communications, UC Berkeley, and, by extension, the College of Environmental Design, must protect the physical and logical integrity of its networks, computers, software, and data. There are a variety of potential security threats to these resources, including unauthorized intrusions, malicious misuse, and inadvertent compromises.
Students: If you use a computer in any capacity at the University, you must personally take security measures in a variety of ways and greater detail is available on line.
Faculty/Staff: Please read UC Berkeley Security's IT Policy Overview for new Employees to understand security compliance on campus.
Security + Privacy
- General Guidelines
- Social Media Privacy Settings
- Student computer logout policy
There are some general considerations every user of public computer systems should be aware of:
Do not allow someone to borrow and use your Cal1 ID card.
You can share your CalNet login name, but do not share your passphrase.
Do not store confidential information on, or access your private information from, public or CED electronic devices.
Do not store any confidential data on public or CED-supported systems.
Do not open unexpected email attachments or trust unknown web or email sources.
Do not send sensitive information via unencrypted email.
Encrypt sensitive data.
Keep critical software up to date with current security patches and virus protection.
Do not post information on social media that answers your security questions.
Use “private browsing” when accessing sites with cookies that you do not want and consider using tracking blockers.
Be careful with geotagging photographs.
Check security settings periodically.
- Click on the lock (top-right on screen) and run the privacy checkup.
- Review all the settings, but especially:
- Content of your public profile
- Who can see your connections
- Sharing with third parties
- Run the privacy checkup and review settings, but especially
- Application connections
- View your profile as it appears to others and look for information you do not want to share
- Review linkages to other services (Twitter, Instagram, etc.)
- Click on your photo
- View your profile to see how it looks to others
- Click on security and privacy
- Review all settings, but especially
- Tweet privacy controls (can your tweets be viewed publicly)
- Photo tagging, tweet privacy and locations
- Linkages to other services (Facebook)
- Review all settings, but especially
Despite our requests to not use CED computers as personal devices, we are aware that many CED students do so anyway. Routinely, students walk away from these computers while still logged in; a security exposure that can lead to serious consequences for the User and CED. CED is in a position of responsibility to ensure that restricted student data is secure according to State and Federal law and campus policy; as a result, Computer Labs and Satellite areas have a twenty (20) minute logout policy.
After twenty (20) minutes of user inactivity (mouse or keyboard use) CED student computers will automatically log Users out.
A reminder pops up at the two (2) minute mark.
Save data prior to leaving CED computers.
All unsaved data will be lost at log-out.
Attempting to circumvent this log-out policy is considered a serious security breech and will have negative consequences including loss of privileges, notification to the Department, and depending upon the severity reporting to the Center for Student Conduct.