The ssh protocol was originally invented by SSH Communications Security which sells commercial ssh servers, clients, and other related products. The server provides the ssh client programs as well as an ssh server daemon and supports both the SSH1 and SSH2 protocols.
Once ssh is enabled, you should be able to connect to your server simply by launching the ssh client on your remote system and ensuring that it is pointed to the external domain name or IP address for your server. In the default configuration, you should next be prompted for your user name. After you enter admin and your administrative password, you will be in the server console. From here you can change the server configuration, access the server manager through a text browser or perform other server console tasks.
A number of different free software programs provide ssh clients for use in a Windows, Macintosh or Linux environment. Several are extensions of existing telnet programs that include ssh functionality. Linux workstations normally have direct ssh capability. Note that the client is free for evaluation, academic and certain non-commercial uses. Another way to upload or download files to and from your server is to enable a protocol called FTP, or "file transfer protocol". This screen enables you to set your policy for FTP.
Note that allowing liberal FTP access to your server does reduce your security. You have two options that you can set here. If for any reason you want or need to be less secure than that, then please check the wiki on how to do so. FTP user account access: Private FTP access allows only people on your internal network to write files to your server. Public FTP access allows users both inside and outside your local network to read or write files on your server, provided they have an account and password.
If, for example, you want to be able to update your web site from home using FTP, you would choose the "Public" setting. We strongly recommend you leave this as Private unless you have a specific reason to do so. The setting you choose here will override all other FTP settings on your server. For example, if you choose "Disable public FTP access" here and then later configure an i-bay to allow public FTP access from the Internet, such access will be forbidden.
Note that one of the choices here allows you to completely disable any use of FTP. Your SME Server provides services to machines on the local network and it gives machines on that network special privileges and access. For example, only machines connected to the local network can access the mail server on your server to send mail. When you configured your server, you provided it with sufficient information to deduce its own local network. Machines on the network are automatically identified by the server as being eligible for these privileges and access.
If your company only has one network that is being serviced by the server, you do not need to add any information here. Some advanced users may wish to extend privileges to more than one network of computers. If you would like your server to identify one or more additional networks for those privileges, you will be asked to enter those network IDs and the subnet mask for each network here.
You can use the panel shown above to modify your firewall rules so as to open a specific port or range of ports on this server and forward it to another port on another host.
Doing so will permit incoming traffic to directly access a private host on your LAN. The server's HTTP proxy works to reduce overall uplink usage by caching recently-visited pages. It is transparent to web browsers using this server as their gateway.
If you wish to use an alternate SMTP server, and this server is your gateway to it, disable this proxy. This forces all SMTP traffic to go through the server and be authenticated. This is the new default. If someone attempts to connect to an external smtp server gmail for example it will be redirected to the sme server.
This is the old default. Note: The server by default now requires email clients other than webmail to authenticate and will not allow auth to occur over an unsecure link. If for example you are using thunderbird then you must set the authentication method to normal password. In the top right corner of the server-manager there is a 'Question mark' This is a link that will list the online Documentation Available. Note that you must be connected to the Internet to read the online user guide.
Accessing administrative areas of your server via Windows file sharing: To access administrative areas of your server using Windows file sharing, you must be logged into your network as "admin" with the server system password.
You can install additional software from enabled repositories by setting 'Manage individual packages' to enabled. Accessing this section allows you to set the system date and time either manually or using a network time server. Pull-down menus for month and time zone ensure accurate entry. The server manager will reset the time automatically during daylight savings time.
There are worldwide time zones with multiple selections for countries with multiple time zones. This ensures that regional variations in time zones and daylight savings time are accurately reflected. Instead of setting the time manually, you can use a network time server. A time server is a device on the Internet that keeps accurate time and is able to communicate the time to other computers over the Internet using the Network Time Protocol NTP.
Many organizations around the world provide Internet time servers for free. This screen in the server manager allows you to configure your server to connect regularly to a time server and synchronize the clock on the server with the time provided by the time server. Using a time server is optional but doing so can greatly increase the accuracy of your system. If you are using a computer on a local network and you wish to access the server via Windows file sharing, it is important that you are logged onto the same workgroup as your SME Server.
This screen allows you to enter the name of the Windows workgroup the server should appear in. You should also enter the Windows server name. If you wish you can change the workgroup name to correspond with an existing workgroup. Also in this section, you can specify whether the server should be the domain master for your Windows workgroup. Most sites should choose "Yes" unless you are adding an server to an existing network which already has a domain master.
This batch file is executed by Windows clients that have been configured to "Logon to domain". The netlogon. As the "admin" user, you will need to connect to the share or map a drive to it, by using the specific path:. The sample file contains a few examples of setting the system time for each machine and also for mapping a common drive for all Windows client. Note: The Chapter 7 has a method for admin to edit the netlogon. Your SME Server provides an easy mechanism for creating a company directory.
Each time you create or delete an e-mail account, your directory will be automatically updated with the new information. In this section of the server manager, you specify the default directory information for new accounts - the user's department, company, street address, city and phone number.
Each time you create an e-mail account, the fields will contain the information entered here as the default. If you wish, you can change the information for each user. At any time in the future, you can change the default information and have the new information apply to all new users or to all existing users as well. The field to do this is located near the bottom of the screen. Choosing "update with new defaults" is a convenient one-click method of revising your directory when, for example, your company has moved to a new address.
Your SME Server enables all users on your network to easily share a printer. The printer can be either locally attached to a parallel or USB port on your server or can be a network printer. All the server needs is some basic information: the printer name which can be anything you want, as long as it starts with a lower-case letter and consists only of lower-case letters and numbers, with no spaces , a brief description for example, "the printer down the hall" and the location of the printer - whether it's on the network or directly connected to your server through a parallel or USB port.
If you choose "Network printer", you will see an additional screen that will ask for the hostname or IP address and the network printer name. Enter that information where requested. For the network printer name, you can use the default setting, raw, unless you have some reason to do otherwise. Note also that the server printing system does not perform any filtering and passes the print requests directly from the client computers to the printer in the "raw" or "pass-through" machines.
For this reason, the SME Server does not have a list of "supported printers". Most printers are supported as long as the appropriate driver is installed in the operating system on your client computers. However, there are some newer printers that only have a Windows driver available and rely heavily on that operating system to perform their print functions. These printers cannot be used on the server.
As a final item, you should be aware that in order to use the printers available through your server a user must be logged in to their client system with a user name and password that is valid on the server. For instance, if a user is logged in as tturtle on their Windows desktop and that user account does not exist on the server, the user will not be able to print to the printers managed by the server.
Either the user will have to logout and log back in as a valid user or the tturtle account will need to be created on the server. When you installed your SME Server, you were asked to provide a name for your system.
That name and several other "standard" names are automatically configured in your system's host table during the installation process. This host table is consulted as part of the name resolution process. The "Hostnames and address" web panel allows you to modify this table and specify different host "names" for each domain on your system, as well as to control how those names resolve both for systems on your local network and also for systems on the larger Internet.
For instance, when someone tries to connect to "www. As seen in the image below, this screen in the server manager allows you to view these default settings, and also to modify the configuration. Using the Hostnames Panel Suppose, for example, your company's web site was hosted at some other location, such as on your ISP's web servers. If you wanted "www. The image below shows the screen in which you would perform the task:. See Bugzilla: If you were to rename a SME server eg.
However, the various parts of the server listed in server-manager Hostnames and addresses would still show the old name and would not be able to be deleted. Creating new hostnames simply involves selecting one of the links at the top of the Hostnames and addresses panel and filling out the appropriate fields.
Note that if your system is configured with any virtual domains, you will have the choice of the domain in which you want to create the hostname. This allows you, for instance, to have "www. The hostnames you can create on this panel fall into three categories and are available from the drop box "Location":See Bugzilla: Self: Additional names for your server: For instance, you might want to set up "intranet.
All you do here is enter the hostname and, if appropriate, choose the domain for the hostname. Remote: As mentioned in the example earlier, you might want to point a hostname such as "www" to a remote system. While "www" is created by default, you can create other names such as "home", "research", or any other appropriate name.
Local: This screen is a bit more complicated because you have more options. At a basic level, you can create a hostname in a domain that points to another computer on your local network. For instance, you might want "research" to point to a computer system inside your network.
Where this gets complicated is when you want "research. The challenge is that your local IP addresses are only accessible inside your network. For that reason, the target computer system will need to have two network interface cards - one connected to the internal network and one connected to the external network.
Another task you can perform through this panel is to reserve an IP address for a given system based on its Ethernet address. For instance, you might have another intranet web server within your company that you want to always have the same IP address.
One method of assigning that address is to manually configure the client machine to have a static IP address. The negative aspect of doing this is that if you later want to change the network settings for that machine, you must manually go and configure that machine. Additionally, you have to keep track somewhere of the fact that you have assigned a specific IP address to that machine.
Rather than configuring the machine manually, you can reserve an IP address from the DHCP server for that specific machine. This has the same result as manually configuring a static IP address, but offers two benefits.
First, you have one location to keep track of all assigned static address. Second, through the DHCP server you will provide network settings. If you wish to change those settings, the change can be simply done on your server. To reserve an IP address, you must first determine the Ethernet address of your client system.
Once you have determined the client's Ethernet address, click on the link to create a new hostname for a local host. Add the hostname of the target system, the Ethernet address along with the desired IP address into the web panel. From this point on specified IP address will only be provided to a client system with the matching Ethernet address.
When you create a domain using this section of the server manager, your SME Server will be able to receive e-mail and host a web site for that domain. To create a domain, fill in the domain name and a description of the site. You then tell the server where to find the content for that domain - it can be the same as your primary web site, or you can create a new set of web pages and store them in one of your i-bays.
Clicking the arrow in the "Content" field will show you a list of your current i-bays and allow you to make a selection. This feature allows you to host multiple web sites from a single server. Be aware that you can point the domain to either the primary web site or to one of the i-bays. You cannot point a domain to a subdirectory that you simply create inside of the primary web site file area. You need to use an i-bay instead.
Once you have created a domain, your server will be automatically configured to answer to web requests for www. The primary domain is resolved locally as we generate fairly complete DNS records for that domain, including all local hostnames. However, since you need to set up the Internet DNS servers with the correct information anyway, why duplicate the work to enter it locally?
See Appendix B. DNS for more information. As shown below, this section of the server manager allows you to specify the protocol used to retrieve e-mail from your ISP and configure other settings regarding the retrieval of e-mail. There is a comprehensive email howto with alternative and advanced suggestions. Your choice of e-mail retrieval mode will depend on the arrangements you made with your Internet service provider:.
If you want to forward e-mail to another mail server for processing, enter the mail server IP address in the box marked Delegate mail server. A common use for this is if your server is receiving inbound e-mail from the Internet, but you would like to pass that mail to a different mail server on your internal network.
If you intend to have an external mail server handle mail for your domain, just send the mail directly to that mail server, via the MX record for your domain. If you have a dialup connection, the server allows you to control how frequently it fetches e-mail from your ISP.
This is particularly useful in situations where you incur phone or Internet charges each time your system contacts your ISP. The default settings are every 15 minutes during standard office hours and every hour outside normal office hours on weekdays or on weekends. The fields allow you to customize those settings. Finally, if you have "multidrop" mail service you need to select the sort method used by the server to decide which user each message should be delivered to.
Your server has a default method for this it examines various headers such as "To" and "Resent-To" which works in most circumstances but is not suitable for certain purposes such as mailing list messages. Some ISPs add a header to each e-mail message which can help your server determine the correct recipient.
If your ISP does not add a header to multidrop e-mail, select the "Default" sort method and ignore the "select sort header" field. Because you will experience problems with mailing-lists when using multi-drop e-mail, we strongly recommend that you work with your ISP to have a special header added to each message.
The "Default" sort method should be only used as a last resort. In fact, if you have a temporary dial-up connection to the Internet, you may find that you need to use your ISP's mail server in order to deliver mail to some locations. As a reaction to the huge volume of unsolicited commercial e-mail "spam" , many Internet sites are refusing direct SMTP connections from IP addresses that are known to be temporary dial-up accounts. For this reason, you may need to use your ISP's mail server since it will have a permanent connection to the Internet.
Default for SME8 is Sunday morning. With SME8. When set to occur weekly Clamav weekly scan has been configured to run Saturday morning typically between to local time. Users with large systems may wish to only schedule a weekly AV scan taking place on Saturday morning in order to avoid overlap with disk-check scheduled on Sunday morning.
This section of the server manager summarizes how your server is configured. This is the data that you entered during the installation process and possibly changed later through the server console or the server manager. As you can see from the screen below, this is essentially a report that you can print out for your records. You do not have the ability to make changes from this screen.
Use with caution , this is not part of a default SME server install and requires additional setup and configuration changes. Information bays, or i-bays, are a unique feature built into your SME Server. The network administrator can define several characteristics for each new i-bay they create:. The "Information bays" section of the server manager shows all current i-bays, the name of each i-bay and a description of its contents. In this section, you can delete an i-bay which will delete all contents of the i-bay directory and, if the i-bay requires a password, you can set it here.
As with your user account directory, any i-bay that requires a password will appear in red until that password has been changed from "default" the i-bay for Samson's Farms in the following image is an example of this. Each i-bay has three directories - html, files and cgi-bin. Each directory is briefly outlined below:. In the next few sections, we will take a look at some examples of i-bays that have been created by our hypothetical catering and event-planning company, The Pagan Vegan, to demonstrate their capabilities.
No matter how you are going to use an i-bay, the process of creating an i-bay starts by clicking on the "Click here" link at the top of the Information Bays panel in the server manager. You will be presented with the form shown in the image below.
You now need to fill out the form providing the information and making the choices described below. Note that the ftp access described below can be overridden by the FTP access limits setting on the Remote access panel of the server manager. If you choose to "Disable public FTP access" there, ftp access for individual i-bays will not be allowed, even though you will appear to be able to enable it from the i-bay configuration screen.
Once done filling out the form, click the Create button and the server manager will create your i-bay. If you wish to change these settings at any later point, you can click on Modify next to the i-bay name in the information bays panel of the server manager. At any point in time you can modify the attributes of an i-bay except for its name by clicking on the " Modify " link next to the i-bay name on the "Information bays" panel of the server manager.
For instance, you can easily change the description, group ownership, and access methods. There are, however, a few items to be aware of when modifying i-bays:. Outside of those concerns, you can modify the i-bay as often as you wish. If you wish to change the actual name of the i-bay, you will need to remove the i-bay and create it again. Note that this will delete the contents of the i-bay, so make sure you have backed up the i-bay data before you remove it.
The company finds it reduces the risk of miscommunication and improves its image and reputation. The ". Creating each web site is a straightforward, fill-in-the-blanks process. TPV has chosen a naming convention for i-bays that customers can easily remember - first initial, last name. Because it contains important customer information, only the site administrator can save files into this i-bay.
To prevent others from accessing the customer's i-bay, a password is required to enter the site. TPV created individual passwords and securely provided them to their customers. Miles Gabriel has contacted The Pagan Vegan to cater an art exposition. The Pagan Vegan has created an i-bay specifically for Mr. Gabriel's account called "mgabriel".
Gabriel accesses the site with the URL www. As you can see, Mr. Gabriel has access to a summary of his event information. He can check at any time to ensure the arrangements are correct. For example, at midnight tonight he can access his i-bay to show his spouse the design used for his invitations!
Having a shared network drive can be very helpful as a way of storing and sharing documents company-wide. TPV uses an i-bay for a company-wide network drive to hold documents to which all employees should have access. All employees can read and write files to this directory. To access using file sharing, simply access the server over the network via Network Neighborhood and open the appropriate i-bay. You will see the files located in the files directory and can then open them or copy them to your system.
As an example, when the staff of The Pagan Vegan goes into their Network Neighborhood, they double-click on "E-smith-server" as shown in:. They will then see a list of i-bays accessible through Windows file sharing.
When they click on one of them called "sharedfiles", they see the three folders inside of the i-bay:. As you can see in this example, The Pagan Vegan has several files in this directory for company use. Providing a centralized location for company documents such as expense report templates ensures that everyone always has access to these documents and uses the most up-to-date version. The company has found this to be a good way for employees to express themselves and share information. In keeping with TPV's culture, the newsletter is very casual.
The company has a high degree of trust in its employees, and, as a result, employees are given full access to the contents of the intranet so anyone on staff can revise it. A more typical company might want the intranet to be created by a particular staff member and "checked in" by the administrator write access "administrator only".
The intranet is, of course, viewable only from the internal network. No password is required. This particular newsletter was created using a desktop office application called LibreOffice similar to Microsoft Office.
The files were created as typical word processing documents, saved into ". Starting with just a blank document, it took only about an hour to create the main page and the other pages that make up this newsletter. Samson's and TPV use an i-bay to improve the ordering and delivery process. TPV has created an i-bay for Samson's called "samfarms". It is accessible to the external Internet but password-protected so that only staff at TPV and Samson's Farms can read it.
Anyone on TPV's local network can write to it. When customers hire The Pagan Vegan to plan events, they need to review a great deal of information - menu options, catalogues from various vendors for event stationary, table-setting rentals, etc. Often customers want several days to review it all. TPV has only a limited number of catalogues for loan, so it decided to provide customers with access to this information online. To accomplish this, TPV created a download i-bay, called "menus", where customers can download the catalogue files themselves and view the contents on their desktop machines.
TPV set the i-bay for Administrator-only write access, viewable over the entire Internet, with no password required. This is what the customer sees:. When the cursor is placed over a file name, the full name of the file appears. To download a particular file, the customer simply clicks on the file name. A browser window allows the customer to select a destination directory for the file on his or her local hard drive. A local area network LAN is the system of wires and other hardware that connects the computers within your office and allows them to communicate with one another.
An ethernet LAN is the most common type. Ethernet refers both to a kind of connection and to a protocol for how Internet data packets travel around your network. The hub, a common component of an ethernet, serves as a point of interface between computers on the network. Each computer on your network is connected to the hub using an ethernet network cable. An ethernet adapter, also called an ethernet card or network interface card NIC , connects each computer to the ethernet LAN.
An server with a dedicated Internet connection requires two ethernet adapters; one connects it to your LAN and the other connects it to the external network that leads to your ISP. A router ensures that Internet data packets e. Routing is one of the functions performed by the server in server and gateway mode. Allowing a third party, such as a systems integrator or networking company, to install your ethernet can be a good idea.
It can help you select, procure and install the appropriate ethernet adapters, hub and cables. There are also various how-to guides available in bookstores if you are committed to installing it on your own. DNS or the Domain Name Service is a distributed system of servers designed to translate human-readable names into computer routable IP addresses.
SME, by design, does not respond to DNS queries from outside your local network, and cannot be used as a public DNS server for anyone outside your location. Basically, PTR records are managed by the organization that controls the IP address which makes sense, if you think about it.
If you have already registered your domain name, find out if your Registrar provides DNS hosting services, and if so, how to configure them. They'll provide you with a web address where you can configure your DNS. Ask them. If you have not yet registered your domain name, try to find a Registrar who provides free DNS services.
PTR Records or Pointer records, or Reverse DNS records are used by internet hosts to convert an IP address into a name - sometimes for information only, sometimes for identity verification. PTR records are constructed by reversing your IP address and appending the special suffix 'in-addr.
For example, the PTR record for a. PTR records are only rarely used for their original purpose of verifying the identity of a particular computer - this is now done with SSL certificates and Trust Authorities.
Some email providers will not accept your email if the name returned by the 'reverse lookup' of your IP address does not in its turn result in your IP address when it, itself is looked up. It doesn't necessarily need to match your configured domain name, but it has to work both ways. For example, if the nslookup d. Many receiving mail servers now require sending mail servers to have properly configured SPF records for the domain s being sent from.
Failure to have SPF records can result in mail being rejected by mail servers eg Hotmail servers will reject mail that comes from mail servers without SPF records. They are not configured on the sme server. Here is a test site where you can check if SPF records are configured for your domain.
A dynamic DNS service provides you with an automated way to notify them whenever your IP address changes so that they can immediately publish new DNS records for your domain. Without dynamic DNS, you would have to contact your ISP to have them change your DNS records, and your web site and other services would be unavailable for several days until the change was processed. You can easily enable the usage of a dynamic DNS service by selecting it on your server console.
If your IP address is assigned dynamically and you intend to receive all your e-mail directly rather than having it stored at an ISP and retrieving it via POP or IMAP , but you decide not to use a dynamic DNS service, you should implement multidrop e-mail as your e-mail solution as this will ensure that no e-mail is misdirected to another IP address See Some important notes on Service list D multidrop mail in Chapter 3.
Here is a brief list of vendors who provide DNS service hosting. The inclusion of a vendor here does not constitute endorsement by the SME developers.
Proxy servers temporarily store information from the Internet on the hard drive of the server, allowing other users to access it directly from that hard drive.
For example, when an employee visits a web page, the web proxy server will store that web page. Subsequent visitors to that web page will read it from your proxy server's hard drive, rather than over the Internet. This slightly reduces the network performance for the first visitor to that web page, but can enhance the performance for subsequent visitors. Many gateway systems require the use of proxy servers, but with the server it is optional. Networked applications such as web browsers will work perfectly without proxying, due to the IP masquerading capability of the server.
In general, we recommend that proxying be disabled in your network applications. Using the proxy server can benefit the organization if you have a slow Internet connection and you've installed your server software on a fast computer. In this case, reading from the hard drive will be faster than reading from the Internet. Remember, though, that a proxy server benefits the second and subsequent visitors to a site but not the first visitor, so this benefit only applies if your users tend to visit the same sites repeatedly.
A proxy server is generally not appropriate if you have a fast Internet connection and you've installed your server software on a lower- or mid-level computer. In this case, reading from the hard drive of the computer may not be faster than over the Internet. It also offers no benefit to your organization if employees at your site do not tend to visit the same web pages.
If you are having difficulty configuring another vendor's hardware or software, we recommend you refer to the manual or contact the vendor for that product. There are also links there to other web sites relating to the server. Below are some useful terms and their brief definitions. For more information refer to the many sites on the Internet offering expansion. You may also need to configure your firewall for port forwarding of services.
Note: Static IP addressing is preferable to dynamic IP addressing because it makes it easier for users on the Internet to connect to your services. This interferes in a few minor ways with your server e. However, using the ISP's proxy server will normally work fine. Warning: While the software includes experimental support for ISDN cards, we do not provide technical support for the use of these cards as they have not yet been tested in a wide enough variety of environments.
What Koozali adds to this solid base is easy and secure ways to adminster and manage all of it in a way that incorporates best practices and ease of use. This means that people not expert in server administration and Linux can safely manage an Internet-connected server. This manual walks you step-by-step through the straightforward process of installing and configuring your Koozali SME Server. The Appendices and Glossary provide background information on subjects related to networking and the Internet and are intended to supplement chapters in the main section of this document.
Originally released in as "e-smith Server and Gateway", right from the start the SME Server adopted the principles that it still follows: simplicity of administration, security by default, and using proven foundations.
Originally based on the free version of Red Hat, in early production it rapidly moved to version 4. The e-smith company was bought-in by the Enterprise communications supplier Mitel, who offered unified office servers based upon the e-smith, renamed to "Managed Application Server", and continued up to version 6. Mitel later generously donated the 6. We may again opt for a new code base moving forward. Below are listed the last few generations of Koozali SME Server still showing as in use, point releases are not included.
Be precise in your descriptions and do not leave room for wrong interpretations At the end of a teaching session you will be asked to hand over to a Knowledge Expert who will review the automatically generated code.
Knowledge is described with the focus of covering 3 aspects:. These 3 questions can be used to sufficiently describe any action, and the answers to them will be mapped to the structure of a KI, which is:. One can think of any piece of knowledge as a sentence using the 3 sections of a KI. Examples below:. So when answering the question "Where can this knowledge be applied? The second part of a KI will define when a certain action can be carried out.
Lastly, the Do section of each step will be where an SME can describe the way in which they carry out the action stated in the title. This description can also include methods, special equipment to be used, and any other peculiarities there may be depending on the step. For this, the SME needs to explain what is cosidered a 'successful' run, and how to interpret that so other knowledge can react to this new changed state.
The progress bar will provide them with a status on how many steps were created, which Knowledge Expert is working on the conversion and, eventually, how many KIs have been deployed. Once the teaching is complete The next time that the same Task occurs, and this Task needs to be completed again, it will be fully automated! By clicking on the drop down icon on the top left, a user can switch between apps as needed.
This can be seen in the Account Settings view, by clicking the View Profile button. From here, one can see their username, User Role, and can choose to change their password. More details on User Roles can be found here. The Start Teaching button in the Actions column is only available for Tasks that do not currently belong to anyone. Or they can Search for a specific Task by name in the field on the top right. A Teaching Session will require listing the Steps it takes to solve a Task, and describing each one in detail.
The number of Steps specified will appear on the bottom part of the first circle in the Progress column. The number above it represent how many of those Steps have been fully defined. After all Steps have been fully described, an SME will Hand Over the teaching session to a Knowledge Expert for the agile automation cycle to be complete. They can choose to give their Teaching Session a name on the top left, so it can be found easier in the future in the automation queue; and on the top right, they can find options such as archiving a conversation, closing the Teaching Session or the app, and here they can also find further details about the Tasklist app.
An SME would reply in the message input field at the bottom, and press Enter after each Step or click the Send button. After all the Steps have been specified the SME should type "done" in order to move onto the next part of teaching. The first part asks the user to describe the Step in more detail. This description should contain as much information as possible, so that when another person might be offered the option of re-using this Step they can understand what it does and how by reading this description.
Each Step needs to be described following the logical flow Where, When, What. How to think about answering the question "Where" is covered in 4. In this part, one needs to consider if there are any conditions that need to be fulfilled before this Step can be executed, and describe those conditions as clearly as possible. So, if the SME has a clear idea of the Task and can look into a Task to see its contents, they can use that information to state more clearly the conditions that need to be met before this Step can be run.
The user must at this point provide any peculiarities of the Step, and be specific with possible values which would always need to be considered for this Step.
From the list below, not all the questions will fit for all Steps, but they should however be used as guidelines for this part:. After fully describing the final Step, the user is redirected back to the Description tab, where the Teaching Session originally began. If the user confirms that the knowledge acquisition is complete, they can request a review from colleagues please see chapter 2.
0コメント