October 15, 2018
macOS Mojave, version 10.14, now available
Here we go again! Apple has just released its latest operating system, macOS Mojave. As tempted as
you might be to upgrade, be cautious and upgrade your operating system only after you have verified that all of your favorite applications will work with the newer OS. But, BEWARE! Depending on your hardware and current OS, Apple may roll the upgrade to
Mojave into their normal operating system updates. If you are not careful and you just select ‘Update All’, you may get the Mojave upgrade along with all of the standard updates. To uncouple the standard updates from the Mojave OS upgrade, click on the ‘More’
button to expand your choices. You can then click the desired Update buttons and leave the Mojave upgrade for another time, allowing you to get your operating system updates without being forced to upgrade to Mojave.
OIT’s recommendation is to always wait a few months until Apple releases the first, or even the second patch, and vendors have an opportunity to correct incompatibilities between
their products and Mojave. Some vendors have cautioned against upgrading due to incompatibilities with their software, such as with some Adobe Creative Cloud applications, Google Drive, etc. If you do decide to proceed, please be sure to back up your
data and locate any media and/or license codes for your applications prior to initiating any upgrade.
If you have any questions or need assistance, please contact the OIT HelpDesk
online or call (865) 974-9900.
How to Spot an Email Scam: Tip 3
One way to spot an email scam is to check the
aesthetics. Phishing emails often contain convincing logos, links to actual company websites, legitimate phone numbers, and e-mail signatures of actual employees. If the email meets some of the other email scam criteria, you should be wary. Contact
the organization directly with a known phone number to verify the request. Do not call the number provided in the email.
As always, you can contact the OIT HelpDesk to verify the legitimacy of the message.
Learn more about how to spot an email scam on OIT’s website.
Learn to Design Conjoint Surveys in Question Pro
Do you need to apply conjoint analysis in your study? Attend OIT’s face-to-face workshop! Conjoint analysis is based on a main effects analysis-of-variance
model, and is one method that survey researchers and statisticians use assess the importance of multiple factors used in making decisions. For example, marketing researchers may use conjoint analysis to determine what price consumers are willing to pay for
specific features or products, whereas health program coordinators may use conjoint analysis to predict patient adherence to various treatment regimens.
Using QuestionPro, participants will gain hands on experience designing conjoint survey questions and analyzing data. Examples of conjoint studies within different fields will
be presented to encourage a discussion of methodology, survey design, and analytical techniques.
SAS is a suite for statistical analysis, data management, and graphics. There are two recommended ways to run SAS: SAS itself, using its original program editor; SAS Studio, a
more modern interface for both programming and menu-based analysis. Other products included in the Education Analytical Suite are Enterprise Miner, used for data mining, and Text Miner, which can extract concepts or sentiment from large volumes of text. A
comprehensive list of SAS software included is shown on the vendor’s Education Analytical Suite web page.
Learn more about SAS on OIT’s Research Software website.
Learn when to use it, where to run it, how to learn, and where to get help.
Upcoming OIT Workshops
Here's a selection of topics that will be covered in workshops this week:
Automated Coding and Insights in Nvivo12
Creating a Student Portfolio with WordPress.com
ePortfolios for Developing and Assessing Student Professional Competencies
Microsoft Access 1 (Basic)
QuestionPro for Qualtrics Users
View our calendar of upcoming workshops at workshops.utk.edu and
register to attend.
Can't make it to class or want to learn about another topic? Check out our
online training sessions.
Cybersecurity and Research
Grant-funded research projects are exciting. Imagine being a campus researcher leading such a project: you've defined a problem, spent hours — including evenings and weekends
— writing a grant, and you've been selected from a competitive field to receive the award. Now you have a limited amount of time to build your team, execute your plan, and reach your research goal.
One common factor among scientists, no matter which discipline they belong to or how complex the project may be, is the use of computing resources. Researchers use computers for
simulations, data capture, storage, sharing, and analysis, as well as project management, collaboration, and more utilitarian tasks like e-mailing, scheduling, and maintaining websites. Using computing resources inevitably come cybersecurity concerns. Even
if the use of computer resources is minimal, threats such as ransomware and usurpation of your computers for a BOTNET or SPAM can seriously impede your research. Some projects will have a clear challenge around regulated data (e.g., HIPAA for certain types
of health information and defense regulations for certain types of classified data), but cybersecurity requirements may be less clear.
There are specific cybersecurity challenges for grant-funded science projects, and the Information Security community can help resolve those challenges.
Grant-funded science projects face a number of unique challenges related to cybersecurity:
Projects are rarely large enough to warrant hiring personnel dedicated to information security.
The limited lifetime of a project makes them laser-focused (sometimes literally!) on their scientific goals.
Research can require specialized computing infrastructure that is difficult to update and challenges common information security practices.
There is a common misunderstanding that an open research project that doesn't have confidentiality requirements has no cybersecurity concerns.
Scientists may be offered (often contradictory) information security advice, leaving them feeling anxious, overwhelmed, and uncertain about how to begin addressing cybersecurity issues
with respect to their research projects and data.
Five lessons in how OIT can work with researchers:
LISTEN - IT and research staff must strive to communicate and bridge the cultural gap between their communities. To effectively
support research, IT staff must have a clear understanding of the concerns of the research staff about the integrity of their research project. Mapping those concerns to cybersecurity risks is the end goal.
RECOGNIZE THE DIFFERENCE - IT controls (e.g., firewall policies) that make sense for administrative computing can hinder the
collaboration required by a research project that spans multiple organizations. A research-centric approach such as a science DMZ may be one way to bridge the gap between administrative and research computing.
PRIORITIZE - Research projects are typically time-sensitive. Clear communication between the IT practitioners and the research
staff is important when identifying where cybersecurity is most critical. This promotes the prioritization of recommended actions that will deliver the most bang for the buck in a short amount of time.
NEVER ASSUME - Research staff may assume that a level of cybersecurity protections (controls) exist. CAUTION! Never assume;
ASK. You may assume a firewall exists and is actively protecting your data when the very opposite may be the case.
When your project depends on information technology resources at UTK, involve OIT as EARLY as possible; start the conversation with the Office of Research & Engagement early to
ensure that your requirements are known, IT risks are identified and prioritized.
Engaging OIT starts with a call to HelpDesk at 865-974-9900.
Have questions or need assistance? Contact the HelpDesk.
| 865-974-9900 |
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
Join/Leave the IT Weekly
Archive now available