Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
March 24
[ITWEEKLY] IT Weekly, March 24, 2017

 

March 22, 2017

 

OIT Faculty Fellow Call for Proposals:

Collaborate with Our Team

Deadline to apply is May 1, 2017

The OIT Faculty Fellow Program assists in advancing exemplary teaching and enriching the experience of students by implementing projects that enhance their department's use of instructional technologies. Faculty Fellows also promote the services available through OIT. Fellows are appointed each academic year pending budget approval. For more information, see the Faculty Fellow Responsibilities and Application Process on the OIT website.

The current Faculty Fellows are Lisa Yamagata-Lynch, Associate Professor in the Educational Psychology & Counseling Department and Robert Spirko, Senior Lecturer in the Department of English. During their time as Faculty Fellows, they have participated in several panel discussions on incorporating accessibility into instruction, assignments and the Canvas learning management system.

 

Update: Classification Survey

 

The Classification Survey initiative continues as we ask faculty, staff, and student employees using university computing equipment to complete a brief survey identifying the type of data stored, viewed, or processed on their university-owned equipment. 

 

Based on feedback that we received from you, we have made several changes to the emails and the website.  We now include a Knowledge Base link to the instructions for classification in the daily classification notice.  Additionally, when there are five days remaining to classify the device, we will start notifying the owner that the device needs to be classified.   For any device with an assigned IP address, such as a printer or server, we will send out separate notification emails to indicate that these critical devices are due for classification.

 

Since January 23, 7,700 university-owned devices have been classified; approximately 26,000 university-owned devices remain on the classification list.  If you have any questions or need assistance, please contact the OIT HelpDesk online or at 865-974-9900.

 

SigmaPlot by Systat Software, Inc.

What is it? SigmaPlot is a scientific graphing and visualization software package with advanced curve fitting, a vector-based programming language, and macro capability. The software is controlled through the graphical user interface that is modeled after the Microsoft Office style ribbon system. SigmaPlot contains over 100 graph types, and the user interface allows detailed manipulation of every graph object. SigmaPlot also includes access to 50 statistical tests which can be used for basic data analysis.

Where can I run it? SigmaPlot is available on OIT’s Apps@UT server and on the computers in the OIT public computer labs, where six people can use it at once.

How can I learn it? To get started with SigmaPlot you can watch the tutorials on the SigmaPlot introductory movies web page.

Where can I get support? OIT offers Minimal Support for SigmaPlot. However, the company offers assistance through their product support page.

 

Workshops for March 20 - 24, 2017

Instructor-Focused:

BYOD with WolfVision Cynap, March 28, 9:30 am – 11 am

Getting to know Canvas, March 31, 9 am – 11 am

Prezi Tips for Conferences, March 31, 9 am – 10:30 am

Adobe Captivate Interactive Practice and Assessment Templates, March 31, 1 pm – 3 pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Don’t Be Fooled, Protect Your Identity

EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an on-line account hacked, and 14 percent have had a computer, tablet, or smart phone stolen. On-line fraud is an ongoing risk. The following tips can help you prevent identity theft.

 

·        Read your credit card, bank, and pay statements carefully each month. Look for unusual or unexpected transactions. Remember also to review recurring bill charges and other important personal account information.

 

·        Review your health insurance plan statements and claims. Look for unusual or unexpected transactions.

 

·        Shred it! Shred any documents with personal, financial, or medical information before you throw them away.

 

·        Take advantage of free annual credit reports. In the US, the three major credit reporting agencies provide a free credit report once a year upon request.

 

·        If a request for your personal info doesn’t feel right, do not feel obligated to respond! Legitimate companies won’t ask for personal information such as your social security number, password, or account number in a pop-up ad, e-mail, text, or unsolicited phone call.

 

·        Limit the personal information you share on social media. Also, check your privacy settings every time you update an application or operating system (or at least every few months).

 

·        Put a password on it. Protect your on-line accounts and mobile devices with strong, unique passwords or pass-phrases.

 

·        Limit use of public WiFi. Be careful when using free WiFi, which may not be secure. Consider waiting to access on-line banking information or other sensitive accounts until you are at home.

 

·        Secure your devices. Encrypt your hard drive, use a VPN, and ensure that your systems, apps, anti-virus software, and plug-ins are up-to-date.

 

Reference:

http://er.educause.edu/blogs/2016/11/april-2017-dont-be-fooled-protect-yourself-and-your-identity

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

March 17
[ITWEEKLY] IT Weekly, March 17, 2017

 

March 17, 2017

 

Faculty First 2017 Grant Recipients

Three faculty members have been awarded grants and will partner with OIT through the Faculty First Program to develop engaging and accessible course materials.

Recipients and their topics are:

·        Karen Tobias

Topic: Multimedia for Instruction in the Principles and Practices of Surgery

Tobias, Professor, Department of Small Animal Clinical Sciences, plans to develop an integrated, interactive online manual that uses multimedia to describe and illustrate basic surgery skills.

 

·        Suzy Prentiss

Topic: Redesigning the Speech Anxious Website

Prentiss, Senior Lecturer, School of Communication Studies, wishes to engage students in more meaningful ways on her website for her Communication Studies 240, Business and Professional Communication course. She plans on making the site more interactive and engaging.

 

·        Sally Harris

Topic: Making Online Lectures Accessible and Student Focused

Harris, Distinguished Lecturer, Department of English, proposes a redesign of online lectures for a high-demand course: English 295, Writing in the Workplace.

 

Learn Something New with Lynda.com

Lynda.com now offers more than 5,500 courses and as a student, faculty, or staff at UT Knoxville, you have access to everything Lynda has to offer. You can find a listing of the newest courses at www.lynda.com/newcourses.aspx. The list can be filtered by topics such as 3D, Business, Photography, and Web so you can easily find a course that meets your interests. Just sign into Lynda.com using your UT NetID and Password. Some of the courses released this month include:

 

 

Instructional Technologies Community of Practice:

Discuss Accessibility Tools and Resources

Bring your lunch and a colleague to the next Instructional Technologies Community of Practice (ITCoP) meeting on March 22 from 12:20-1:10 PM in Hodges Library room 220E.  This month’s topic will feature a discussion on effective tools and resources for creating accessible content. 

 

Join the Office of Disability Services and OIT staff in a discussion on effective tools and resources for creating accessible content. 

 

Mark your calendar for the final Spring ITCoP event on April 26. Visit the ITCoP website for more details.

 

Canvas is here! Are you ready?

OIT is offering weekly Virtual Canvas Camps to help you become Canvas Ready before Blackboard retires on May 31, 2017.

 

Have some Canvas questions as you work on your courses? Join us Mon/Wed/Fri from 9 am-noon and Tue/Thu from 1 pm-4 pm via Zoom: http://tiny.utk.edu/canvas-zoom

 

SAS by SAS Institute

SAS is a software suite for statistical analysis, data management and graphics. There are three major products available: the SAS System, which is the primary tool for writing SAS programs and contains the data processing and analytics engine that is at the core of most SAS products; SAS Enterprise Guide, which provides a graphics user interface to much of the power of SAS; SAS Enterprise Miner, which is used for data mining or investigating patterns in large amounts of data to create descriptive or predictive models.

 

Where can I run it? SAS is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows and Linux PCs. The download and installation instructions are on OIT's software download page. It is also available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and on the computers in the OIT public computer labs. There is no simultaneous user limit for SAS.

 

How can I learn it? OIT offers workshops each semester. You can schedule a one-on-one tutorial any time by calling the OIT HelpDesk at 974-9900. The SAS Institute support web site offers free video tutorials.

 

Where can I get support? OIT offers Full Support for SAS. You can request assistance by calling the OIT HelpDesk at 974-9900. The SAS Institute support web site also offers “support communities” where you can ask questions and it provides a comprehensive set of online manuals.

 

Workshops for March 20-24, 2017

Instructor-Focused:

Getting to know Canvas, March 20, 2:00pm – 4:00pm

Creating Accessible One-Shot Videos, March 22, 1:00pm – 3:00pm

 

Researcher-Focused:

Introduction to MATLAB, March 21, 12:00pm – 1:30pm

SPSS 2 (SPSS Data Analysis), March 23, 12:00pm – 2:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Are You Practicing Safe Social Networking?

Who Else Is Online? Social media sites are not well-monitored playgrounds with protectors watching over you to ensure your safety. When you use social media, do you think about who might be using it besides your friends and connections? The following are some of the other users you may encounter:

  • Identity thieves. Cybercriminals need only a few pieces of information to gain access to your financial resources. Phone numbers, addresses, names, and other personal information can be harvested easily from social networking sites and used for identity theft. Cybercrime attacks have moved to social media, because that’s where cybercriminals get their greatest return on investment.
  • Online predators. Are your friends interested in seeing your class schedule online? Well, sex offenders or other criminals could be as well. Knowing your schedule and your whereabouts can make it very easy for someone to victimize you, whether it’s breaking in while you’re gone or attacking you while you’re out.

 

How Do I Protect My Information? Although there are no guaranteed ways to keep your online information secure, following are some tips to help keep your private information private: 

  • Don’t post personal or private information online! The easiest way to keep your information private is to NOT post it. Don’t post your full birthdate, address, or phone numbers online. Don’t hesitate to ask friends to remove embarrassing or sensitive information about you from their posts, either. You can NEVER assume the information you post online is private.
  • Use privacy settings. Most social networking sites provide settings that let you restrict public access to your profile, such as allowing only your friends to view it. 
  • Be wary of others. Many social networking sites do not have a rigorous process to verify the identity of their users. Always be cautious when dealing with unfamiliar people online.
  • Understand the role of hashtags. Hashtags (#) are a popular way to provide clever commentary or to tag specific pictures. Many people restrict access to their Instagram accounts so that only their friends can see their pictures. However, when someone applies a hashtag to a picture that is otherwise private, anyone who searches for that hashtag can see it.

 

Article Reference: http://er.educause.edu/blogs/2016/11/august-2017-are-you-practicing-safe-social-networking

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

March 10
[ITWEEKLY] IT Weekly, March 10, 2017
 
March 10, 2017
 
Last Chance – Complete the Annual OIT Customer Satisfaction Survey Today!
If you have not completed the Annual OIT Customer Satisfaction survey, we would like to hear from you!  Complete the survey online at https://tiny.utk.edu/oitcustomersurvey.  The survey will take approximately 10 to 15 minutes.  Your responses are anonymous and will be shown only in summary reports.
 
The survey closes today at 5:00 p.m.
 
Upon exiting the survey, you can choose to enter a drawing for $100. There is no purchase or fee of any kind required to participate in the drawing.
 
Network changes scheduled Spring Break
As part of a plan to consolidate data centers, OIT will be completing several maintenance projects during Spring Break.
 
On Sunday, March 12 between 8:00 AM and 5:00 PM EDT, Network Services will be relocating routers and security devices that provide most of our internet connectivity. To minimize the impact during the maintenance, one of our other internet providers will provide additional bandwidth. However, you may experience slowness during the maintenance window.
 
Beginning Wednesday, March 15 at 10:00 PM EDT, Network Services will be moving core firewall hardware. We do not anticipate any disruption of service as this hardware is part of a redundant pair.  The move will be completed by 2:00 AM EDT on Thursday, March 16.
 
On Sunday, March 19 between 8:00 AM and 12:00 PM EDT, Network Services will be relocating components of the wireless infrastructure. We do not anticipate any disruption of service as this hardware is part of a redundant system. 
 
If you have any questions about this project, please contact the OIT HelpDesk online or at 865-974-9900.
 
Firefox 52 and Banner INB, Argos, and Nolij
This week, Mozilla updated Firefox to version 52 which marks a fundamental shift on how the web browser handles plug-ins other than Adobe's Flash Player. First announced late last year, Firefox 52 is the first release that disables all plugins that use the Netscape Plugin API (NPAPI) besides Flash. Plug-ins such as Silverlight, Java, Acrobat, and Google Hangouts are no longer supported, and Flash content is only activated with user consent. This update will also affect several UT applications such as Banner INB, Nolij, and Argos.
 
Banner INB and Nolij: Users are recommended to disable updates and not upgrade to Firefox 52. To do this in Firefox, go to Options >Advanced > Update tab and select “Never check for updates.”
 
Argos: If you are a user of the Argos client software (this pertains to all browsers), when you attempt to launch Argos users will notice a small change the next time you log in. Upon login, you will be prompted to download and install a small application that will replace the plug-in that is no longer supported by Firefox. 
 
Regarding the future of browser plug-in support, Firefox is only the first to move in this direction, as Google has already announced that the same changes are coming to Chrome browser early this year.
 
Canvas is Mobile!
The Canvas by Instructure App is the mobile version of Canvas that helps you stay current with all courses anywhere you go. It is available for iOS and Android devices through the Apple App Store and Google Play, respectively. 
 
A complete list of features and functions available online for all mobile platforms. 
 
Support Guides for these platforms are also available online:
 
For assistance with the Canvas by Instructure App or converting your course to Canvas, contact the OIT HelpDesk online or at 865-974-9900.
 
OIT is also offering weekly Virtual Canvas Camps to help you become Canvas Ready before Blackboard retires on May 31, 2017.
 
Join us Mon/Wed/Fri from 9 am-noon and Tue/Thu from 1 pm-4 pm via Zoom, http://tiny.utk.edu/canvas-zoom
 
R by the R Core Team 
What is it? R is a free, open source software environment for statistical computing, data management and graphics. While all of its features can be controlled by its programming language, several user interfaces exist that make it easy for non-programmers to use. It is very extensible and supports a wide range of methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.
 
Where can I run it? Being free, you can install R on any Linux, Mac or Windows computer. R is available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and in the OIT public labs. There is no simultaneous user limit for R.
 
How can I learn it? OIT offers workshops each semester and there are a set of two-minute tutorials at the “twotorials” web site. The main R web site lists addresses for support “mailing lists” and manuals.
 
Where can I get support? OIT offers Full Support for R; contact the OIT HelpDesk at 865-974-9900 for assistance. 
 
Additional resources include:
  • Stack Overflow: ask questions or look up answers regarding R programming
  • Cross Validated:  ask questions or look up answers regarding statistical analysis in R
 
Workshops for March 10 - 14, 2017
Instructor-Focused:
Teaching in a Technology Enhanced Classroom, March 14, 1 pm – 2:30 pm
Prezi Tips for Conferences, March 15, 1 pm – 2:30 pm
 
Check out our online training offerings (including Lynda.com).
 
All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.
 
Protect your Personal, Financial, Tax Information and Computers
WASHINGTON — The Internal Revenue Service today reminded taxpayers to be cautious and protect personal, financial and tax information, particularly at tax time. This year’s tax-filing deadline is April 18.
 
The IRS urges taxpayers to be safe online and reminds them to take steps to help protect personal information and guard against identity theft. This is true all year long, but particularly at tax time, when taxpayers may anticipate hearing about a tax refund or the status of their return.
 
“The IRS works year-round to protect taxpayers against scams and identity theft,” said John Koskinen, IRS Commissioner. “But we can’t do this alone. Taxpayers can do their part by taking certain precautions to stay ahead of these would-be con artists.”
 
Treat personal information like cash – don’t hand it out to just anyone. Social Security numbers, credit card numbers, bank and utility account numbers can be used to steal money or open new accounts. Every time a taxpayer receives a request for personal information, they should think
about whether the request is truly necessary. Scammers will do everything they can to appear trustworthy and legitimate.
 
Avoid Phishing Scams
 
The easiest way for criminals to steal sensitive data is simply to ask for it. Taxpayers should learn to recognize phishing emails, calls or texts that pose as familiar organizations such as banks, credit card companies or even the IRS. These ruses generally urge taxpayers to give
up sensitive data such as passwords, Social Security numbers and bank account or credit card numbers. They are called phishing scams because they attempt to lure the receiver into taking the bait. The subject line may suggest the recipient just won a free cruise or that they must
immediately update an account. Never open a link or an attachment from a suspicious email. It may contain malware.
 
Also, don’t assume internet advertisements, pop-up ads or emails are from reputable companies. Check out companies to find out if they are legitimate. When online, a little research can save money and reduce security risks. If an ad or offer looks too good to be true, take a
moment to check out the company behind it. Type the company or product name into a search engine with terms like “review,” “complaint” or “scam.”
 
Never download “security” software from a pop-up ad. A pervasive ploy is a pop-up ad that indicates it has detected a virus on the computer. It urges users to download a security software package. Don’t fall for it. It most likely will install some type of malware. Reputable security
software companies do not advertise in this manner.
 
Protect Personal Data
 
Taxpayers should not carry Social Security cards with them or any documents that may include this number. Provide Social Security numbers only when necessary. Occasionally businesses will request it when it is not essential.
 
Give personal information over encrypted websites only. Shopping or banking online should be done only on sites that use encryption. To determine if a website is encrypted, look for “https” at the beginning of the web address (the “s” stands for secure). Some websites use encryption only on the sign-in page. If any part of the session isn’t encrypted, the entire account and the included financial information could be vulnerable. Look for “https” on every page of the site.
 
Use Strong Passwords
 
The longer the password, the tougher it is to crack. Use at least 10 characters; 12 is ideal for most home users. Mix letters, numbers and special characters. Try to be unpredictable – don’t use names, birthdates or common words. Don’t use the same password for many accounts. If the password is stolen –– it can be used to take over multiple accounts. Don’t share passwords on the phone, in texts or by email. Legitimate companies will not send messages asking for passwords. Receiving such a message probably means it’s a scam. Keep passwords in a
secure place.
 
Set password and encryption protections for wireless networks. If a home or business Wi-Fi is unsecured it also allows any computer within range to access the wireless network and potentially steal information from connected devices.
 
Use Security Software
 
Make sure you have security software installed on all of your devices that connect to the internet. Many computers come pre-installed with firewall and anti-virus protections. A good broad-based anti-malware program should provide protection from viruses, Trojans, spyware and adware.
 
Set security software to update automatically so it can be upgraded as threats emerge. Also, make sure the security software is “on” at all times. If retaining important financial documents, such as prior-year tax returns, consider investing in encryption software to prevent unauthorized access by hackers or identity thieves.
 
Make sure security software has parental control options to protect children from malicious websites. Educate children about the threats of opening suspicious web pages, emails or documents.
 
Back Up Files
 
No system is completely secure. Copy important files, including federal and state tax returns, onto a removable disc or a back-up drive, and store it in a safe place. Save tax returns and records. Federal and state tax returns are important financial documents that a taxpayer may
need for many reasons, ranging from home mortgages to college financial aid applications. Print out a copy and keep it in a safe place. Make an electronic copy in a safe spot as well. These steps also can help taxpayers more easily prepare next year’s tax return. If storing sensitive tax and financial records on a personal computer, use a file encryption program to add an additional layer of security.
 
The IRS, state tax agencies and the tax industry recently launched a public awareness campaign called Taxes. Security. Together. It provides additional safety tips for taxpayers. Also, see Publication 4524, Security Awareness for Taxpayers.
 
 
and click on “Join or leave the list (or change settings)”
 
 
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
 
 
 
March 03
[ITWEEKLY] IT Weekly, March 3, 2017
 
March 3, 2017
 
OIT Services affected by Amazon Web Services outage
Several UT applications experienced an interruption in service on Tuesday, February 28 due to an outage at Amazon Web Services (AWS).  AWS is the platform for many websites and applications worldwide, including a number of products licensed for use at UT.  Some of the OIT-managed applications affected by this outage include Canvas, Zoom, Respondus Lockdown Browser, and Turning Technologies (Clickers).  Our partners, especially Canvas, communicated with us as information was available.  You may have experienced intermittent service for these providers as well as many other websites between noon and 5:00 PM on Tuesday.  As soon as AWS restored service, Canvas and other sites became available.
 
Read more at USA Today about what caused the Amazon Web Services outage.
 
Office 365: Microsoft Discontinuing Office 365 version of Office 2013
Beginning March 1, 2017, Office for 2013 is no longer available as an option for download through the Office 365 portal.  Microsoft recommends that anyone using Office 2013 upgrade to the Office 2016 version as they will end mainstream support for Office 2013 on April 10, 2018. OIT will continue to offer Office 2013 for University-owned computers through the OIT Software Download Site
 
Visit the OIT website for more information about Office 365 ProPlus for Staff and Faculty and the Microsoft Student Advantage programs.
 
OIT’s Active Directory Upgrade is complete 
OIT system administrators have recently completed a project to provide a more robust and resilient Active Directory (AD) infrastructure.  The UTK Domain Controllers have been upgraded to Windows Server 2016 and are running on newer and faster hardware.  In addition, to create an infrastructure that can be upgraded more regularly without interrupting university operations, we also have setup a third party certified round-robin, gc.utk.tennessee.edu. This round-robin is now available to UT system administrators for authentication and global catalog services.
 
If you have any questions about this project, please contact the OIT HelpDesk online or at 865-974-9900.
 
We Need YOUR Input
As we continuously seek to better the information technology services for UT Knoxville, OIT needs your input. We ask you to please take 10-15 minutes to complete our annual customer satisfaction survey at https://tiny.utk.edu/oitcustomersurvey. Almost 1,000 people have already provided their feedback this week. Over the years, the information from this survey has contributed directly to initiatives such as the Google deployment, Office 365 and network upgrades. More recently, projects where customer feedback resulted in change include the Canvas implementation (our headline article today notwithstanding) and additional investment in upgrading classroom technology. Your input truly counts. Upon exiting the survey, you can choose to enter a drawing for $100. There is no purchase or fee of any kind required to participate in the drawing.
 
Qualtrics Research Suite by Qualtrics, Inc. 
What is it? Qualtrics Research Suite, a powerful online survey research tool, is available to all faculty, staff, and students at UTC, UTK, and UTM. Once you create your Qualtrics account, you will be able to design simple to complex surveys in a web browser, distribute the survey, run frequencies as it continues to collect data and then download your data. For in-depth analysis, you can export your data to an SPSS, CSV, TXT or Excel file. A basic account is available to all faculty, staff, and students for university-related work such as academic research projects (instructional or academic) and administrative purposes.
 
Where can I run it? Qualtrics is a cloud-based service. Create a new account or log in to an existing account from our web surveys page.
 
How can I learn it? For UTK, OIT offers workshops on Qualtrics each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 865-974-9900.  Qualtrics also provides a variety of training materials on their support page.
 
Where can I get support? OIT offers Full Support for Qualtrics. For assistance, contact the OIT HelpDesk at 865-974-9900.
 
Workshops for March 6 - 10, 2017
Instructor-Focused:
BYOD with WolfVision Cynap, March 8, 3:30 – 5 pm
Getting to know Canvas, March 9, 1 pm – 3 pm
 
Researcher-Focused:
Qualtrics 1 (Web Survey Design), March 7, 1 pm – 3 pm
SPSS 1 (Basics), March 8, 12 pm – 2 pm
Qualtrics 2 (Reporting and Analysis Tools), March 10, 11 am – 1 pm
NVivo11 Fundamentals, March 10, 11:30 am – 1 pm
 
Student-Focused:
Overview of Web Development, March 6, 10:10 am – 12:10 pm
Adobe Photoshop 3 (Banners, Brushes, and Colors), March 7, 9:40 am – 11:40 am
Office 365: Sharing and Collaborating, March 7, 9:40 am – 11:40 am
Adobe PhotoShop 4 (Photo Manipulation), March 9, 9:40 am – 11:40 am
 
Check out our online training offerings (including Lynda.com).
 
All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.
 
Keep What is PrivatePrivate
You exist in digital form all over the Internet. It is thus important to ensure that the digital you matches what you intend to share. It is also critical to guard your privacy — not only to avoid embarrassment but also to protect your identity and finances!
 
Following are specific steps you can take to protect your online information, identity, and privacy.
 
  • Use a unique password for each site. Hackers often use previously compromised information to access other sites. Choosing unique passwords keeps that risk to a minimum.
  • Use a password manager. Using an encrypted password manager to store your passwords makes it easy to access and use a unique password for each site.
  • Know what you are sharing. Check the privacy settings on all of your social media accounts; some even include a wizard to walk you through the settings. Always be cautious about what you post publicly.
  • Guard your date of birth and telephone number. These are key pieces of information used for verification, and you should not share them publicly. If an online service or site asks you to share this critical information, consider whether it is important enough to warrant it.
  • Keep your work and personal presences separate. Your employer has the right to access your e-mail account, so you should use an outside service for private e-mails. A private e-mail account helps you ensure uninterrupted access to your private e-mail and other services if you switch employers.
  • There are no true secrets online. Use the postcard or billboard test: Would you be comfortable with everyone reading a message or post? If not, don't share it.
 
 
 
and click on “Join or leave the list (or change settings)”
 
 
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
 
 
 
February 24
[ITWEEKLY] IT Weekly, February 24, 2017
 
February 24, 2017
 
 
Classification Survey: Frequently Asked Questions
The Classification Survey initiative continues as we ask faculty, staff, and student employees using university computing equipment to complete a brief survey identifying the type of data stored, viewed or processed on their university-owned equipment. 
 
Since January 23rd, 4,800 university-owned devices have been classified; approximately 31,000 university-owned devices remain on the classification list. Some of the most frequently asked questions we receive are answered below.
 
Where do I log in to complete my survey?
 
What is the purpose of this survey and why do I have to complete it?
Cybersecurity has been and continues to be an area of concern in an organization as large as UT. One of the first questions typically asked of us when a security incident occurs is what kind of data was potentially exposed and were any data files transferred off the device?  Knowing how you use University data on your machine helps answer those questions and evaluate the level of exposure of data.  We have focused on enterprise class systems in the past. We are now focusing on collecting that information for all UT-owned equipment on desktops and in departments
 
The faculty or staff member (or in some cases the student) assigned to a given system typically has the best knowledge about that system and therefore is the one who can best answer the survey.  The IT Support person in your department typically does not have that information but you may ask them to sit with you if you need assistance answering the questions.
 
Why are you asking me about my personal information?
One of the common misconceptions is that we are asking you to report what information is stored (Jane Doe’s social security number or Jack Doe’s credit card number) on your computer.  Instead, we are asking you to report the type of information.  For example, if you have social security numbers, grade rosters, medical records, etc., we are asking to you to tell us that you have this information, not whose information it is.
 
  • You do NOT need to report your personal information.
  • You DO need to report if you view or process information the type of information asked in the questions.
 
On the classify.utk.edu page, all of my computers are in the section “Devices Not Requiring Immediate Attention.”  What do I need to do?
You have two options regarding the devices that do not need immediate attention.  You can classify them now, or you can wait to receive email notifications for the specific device.  Once you receive the first notification, you will have 30 days to complete the survey.
 
 
 
Plagiarism Prevention/Detection for Canvas
Unplag for Canvas has arrived.
Unplag is a plagiarism prevention/detection system integrated into Canvas.  You will find that the system is very similar to SafeAssign in Blackboard. 
 
Unplag has been fully integrated into Canvas and can easily be implemented into your course assignments. We have moved our SafeAssign repository of submitted papers from Blackboard to our Unplag institutional repository.
 
See the guides below for instructions on how to use Unplag in your Canvas courses and let us know if you have any difficulties. We will be adding new training opportunities soon!
 
 
For assistance with Unplag or converting your course to Canvas, contact the OIT HelpDesk online or at 865-974-9900.
 
OIT is also offering weekly Virtual Canvas Camps to help you become Canvas Ready before Blackboard retires on May 31, 2017.
Join us Mon/Wed/Fri from 9 am-noon and Tue/Thu from 1 pm-4 pm via Zoom, http://tiny.utk.edu/canvas-zoom
 
Rasputin
Last week, an article was published which contained a list of some 60 universities and government agencies that had been “hacked” by the cyber-criminal known as Rasputin. The University of Tennessee was on the list, and OIT was notified about the breach. OIT staff contacted “Recorded Future” for details about the hack.
 
Recorded Future provided information regarding a departmental website that was vulnerable. The vulnerability was verified by OIT, the local IT staff for the department was notified, and the vulnerability was resolved.
 
The website did not contain any information of a confidential nature. Recorded Future stated that “With a high degree of confidence, we believe that Ubercri [aka Rasputin] has not (to date) downloaded internal data from the respective victim systems, nor attempted to monetize the access in the criminal underground.” Rasputin doesn’t “sell the information”; he sells the code that he used to exploit or, “hack,” the site.
 
OIT follows a documented procedure when developing applications or websites which include testing the site for vulnerabilities BEFORE it goes live. Departments are encouraged to contact the OIT HelpDesk at (865) 974-9900 if they are launching a new website or application and request that it be tested for vulnerabilities. This test is especially important if the site is connecting to data sources or collecting information from users.
 
The entire article can be viewed at https://tiny.utk.edu/recorded-future
 
QDA Miner by Provalis Research, Inc. 
What is it? QDA Miner is a software package which aids in the qualitative analysis of text or images. In addition to purely qualitative functions like creating and applying coding structures, QDA Miner also provides more numerical functions such as analysis of coding co-occurrences and analyzing coding by other variables such as age or gender.
 
Where can I run it? QDA Miner is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs. The download and installation instructions are on OIT's software download page. For UTK, QDA Miner is also available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is no simultaneous user limit for QDA Miner.
 
How can I learn it? For UTK, OIT offers workshops on QDA Miner each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 8965-974-9900. Tutorials are also available on QDA Miner's tutorial website.
 
Where can I get support? OIT offers Full Support for this software. For assistance, contact the OIT HelpDesk at 974-9900.
 
Anything else I need to know? A trial version of QDA Miner is available for download. A license file can be downloaded from the OIT's software download page which turns the evaluation software into a fully licensed copy.
 
 
Workshops for February 13 - 17, 2017
Instructor-Focused:
Getting to Know Canvas, February 28, 2 pm – 4 pm
Getting to Know Canvas, March 1, 10 am – 12 pm
 
Researcher-Focused:
Introduction to SQLite Database, February 27, 1 pm – 3 pm
Mixed Model Analysis in SPSS, February 28, 1:30 pm - 3:30 pm
 
Check out our online training offerings (including Lynda.com).
 
All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.
 
 
The Cloud
The cloud is a service provider that stores and manages data for its customers. The advantages of using the cloud are that you can access your data from multiple devices and can share the data more easily with who you desire. The reason this service is known as “the cloud” is that you often do not know where your data is physically being stored. Examples of “the cloud” include Google Apps, Amazon cloud, Office 365, and Apple iCloud.
 
The cloud has its advantages, but you must also take the proper steps in protecting yourself when selecting a cloud provider. For your work computer or work related information, check with OIT to see which cloud services are provided. Be sure to understand how your data will get from your computer to the cloud and how your information will be stored in the cloud. Finally, make sure the connection is secured by encryption and understand who can decrypt your data. As a steward of the information, it is your responsibility to protect and dispose of the university information left to your keeping.
 
As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  If you have concerns or questions about “the cloud,” you should contact the OIT HelpDesk at (865) 974-9900.
 
Remember, no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password via email.
 
and click on “Join or leave the list (or change settings)”
 
 
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
 
 
February 17
[ITWEEKLY] IT Weekly, February 17, 2017
 
February 17, 2017
 
OIT conducting surveys to improve wireless coverage
As part of OIT’s continuous improvement efforts, the Network Services team is conducting wireless surveys in buildings across campus to determine if additional coverage is necessary. 
 
These surveys will not affect your wireless service, and we make every effort to cause minimal disruptions while we collect this information.  We are working with the building representatives to find the best time to schedule each building’s survey.  Do not be surprised to see us gathering data in hallways, offices, conference rooms, and classrooms.  We have mounted our equipment on a cart that we will roll throughout the buildings.
 
If you have any questions regarding this initiative, please contact the OIT HelpDesk at help.utk.edu or 865-974-9900.
 
OIT upgrade to Active Directory
OIT will be upgrading our Active Directory (AD) infrastructure from Windows Server 2008 R2 to Server 2016 over the next four weeks. There are many new enhancements in Windows Server 2016 as well as being on faster and more redundant hardware. Some of the new features include privileged access management, Azure AD Join, and Microsoft Passport.
 
We do not anticipate an interruption of service to Windows or Mac OS 10.7+ computers which are joined to the domain. If you have an older MAC (<10.7) that is joined to the domain, you may have to unbind and rebind to AD.
 
If you have any questions regarding this initiative, please contact the OIT HelpDesk at help.utk.edu or 865-974-9900
 
Instructional Technologies Community of Practice
Bring your lunch and a colleague to the next Instructional Technologies Community of Practice (ITCoP) meeting on February 22 from 12:20-1:10 PM in Hodges Library room 220E.  This month’s topic will feature a discussion on multimodal composition using images, audio, or video in assignments.
 
Join Jeff Ringer, Assistant Professor of English and Writing Program Director; Robert Spirko, Senior Lecturer in English and a 2016-17 OIT Faculty Fellow; and others in a discussion about going beyond text and writing to make your assignments more accessible and interesting.
 
Mark your calendar for Spring ITCoP events on March 22 and April 26.  Visit the ITCoP website for more details.
 
Canvas is here! Are you ready?
OIT is offering weekly Virtual Canvas Camps to help you become Canvas Ready before Blackboard retires on May 31, 2017.
Join us Mon/Wed/Fri from 9 am-noon and Tue/Thu from 1 pm-4 pm via Zoom, http://tiny.utk.edu/canvas-zoom
 
Origin Pro by OriginLab Corporation
What is it? Origin Pro is graphing and data analysis software that provides a comprehensive solution for scientists and engineers who need to analyze, graph and professionally present data. Origin Pro's point-and-click interface allows you to start using it quickly, yet its wide range of advanced features provides for your growing needs.
 
Where can I run it? For UTK, Origin Pro is available on Apps@UT and in the OIT public computer labs. The simultaneous user limit for Origin Pro is five. 
 
How can I learn it? Origin's online documentation and video tutorials are an excellent source of information.  The online documentation includes the user guide, tutorials, quick help on specific topics, programming examples and reference information. In addition, OriginLab provides free, live training webinars that teach you how to perform various tasks in Origin Pro. 
 
Where can I get support? For UTK, OIT offers Minimal Support for Origin Pro.
 
Technical support from Originlab is included with UTK's maintenance package. OriginLab provides four ways for you to contact their technical support representatives:
  • Call 1-800-969-7720 and select Option 6, Monday through Friday from 8:30 AM to 6 PM EST
  • Use the Online Chat option available through the Originlab website
  • Send email to tech@originlab.com
  • Select Support on the Originlab website for links to the additional support resources, including the Technical Support FAQ, User Forums, and the File Exchange which provides a venue for sharing files and custom applications with other users.
 
Workshops for February 13 - 17, 2017
Instructor-Focused:
Improving Your Web Pages' Visibility in Search Engine Results (SEO), February 20, 1 – 3 pm
Creating Video with a Mobile Device and SWIVL, February 23, 1 – 3 pm
Getting to Know Canvas, February 24, 1 – 3 pm
 
Researcher-Focused:
SAS Programming Basics 1, February 21, 1:30 - 3:30 pm
SAS Data Analysis, February 22, 10 am – 12 pm
Introduction to ArcGIS Pro, February 22, 12 – 2 pm
JMP Basics, February 23, 1:30 pm - 3:30 pm
 
Check out our online training offerings (including Lynda.com).
 
All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.
 
 
Refuse the Phishing Bait!!
Cybercriminals know the best strategies for gaining access to the university’s sensitive data. In most cases, it doesn’t involve them rappelling from the top of Andy Holt Tower and deftly avoiding a laser detection system to hack into your servers; instead, they simply manipulate a community member’s trust by posing as something they trust.
According to IBM’s 2014 Cyber Security Intelligence Index, human error is a factor in 95 percent of security incidents. Following are a few ways to identify various types of social engineering attacks and their telltale signs.
  • Phishing isn’t relegated to just e-mail! Cybercriminals will also launch phishing attacks through phone calls, text messages, or other online messaging applications. Don’t know the sender or caller? Seem too good to be true? It’s probably a phishing attack.
  • Know the signs. Does the e-mail contain a vague salutation, spelling or grammatical errors, an urgent request, and/or an offer that seems impossibly good? Click that delete button.
  • Verify the sender. Check the sender’s e-mail address to make sure it’s legitimate. If it appears that the OIT HelpDesk is asking you to click on a link to increase your mailbox quota, but the sender is “UniversityHelpDesk@yahoo.com,” it’s a phishing message.
  • Don’t be duped by aesthetics. Phishing e-mails often contain convincing logos, links to actual company websites, legitimate phone numbers, and e-mail signatures of actual employees. However, if the message is urging you to take action — especially action such as sending sensitive information, clicking on a link, or downloading an attachment — exercise caution and look for other telltale signs of phishing attacks. Don’t hesitate to contact the company directly; they can verify legitimacy and may not even be aware that their name is being used for fraud.
  • Never, ever share your password. Did we say never? Yup, we mean never. Your password is the key to your identity, your data, and your classmates’ and colleagues’ data. It is for your eyes only. OIT will never ask you for your password.
  • Avoid opening links and attachments from unknown senders. Get into the habit of typing known URLs into your browser. Don’t open attachments unless you’re expecting a file from someone. Give them a call if you’re suspicious.
  • When you’re not sure, call to verify. Let’s say you receive an e-mail claiming to be from someone you know — a friend, colleague, or even the UT Chancellor or UT President. Cybercriminals often spoof addresses to convince you, then request that you perform an action such as transfer funds or provide sensitive information. If something seems off about the e-mail, call them at a known number listed in your institution’s directory to confirm the request.
  • Don’t talk to strangers! Receive a call from someone you don’t know? Are they asking you to provide information or making odd requests? Hang up the phone and report it to the OIT HelpDesk at (865) 974-9900.
  • Don’t be tempted by abandoned flash drives. Cybercriminals may leave flash drives lying around for victims to pick up and insert, thereby unknowingly installing malware on their computers. You might be tempted to insert a flash drive only to find out the rightful owner, but be wary — it could be a trap.
  • See someone suspicious? Say something. If you notice someone suspicious walking around or “tailgating” someone else, especially in an off-limits area, call UTPD.
 
and click on “Join or leave the list (or change settings)”
 
 
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
 
 
 
February 10
[ITWEEKLY] IT Weekly, February 10, 2017

 

February 10, 2017

 

New Network Infrastructure – Building Distribution Network

Over the last eighteen months, the Office of Information Technology (OIT) has changed the way the majority of buildings connect to the network. Today, all networked buildings connect to two campus data centers. These redundant connections allow OIT to perform updates without downtime and provide additional protections in the event of data center hardware failures. The dual connections doubled the available bandwidth to each building – many buildings now have 20 Gbps of bandwidth to the network core. The new infrastructure reduces the load on the existing core and minimizes downtime related to network architecture changes.

 

Spread the Word about IT Weekly!

Thanks to all of you who have subscribed to IT Weekly and acknowledged its value to you! We strive to provide informative and timely information about technology at UT and based on your feedback we are hitting the mark. If you have topics you are interested in hearing about, please contact Joel Reeves, joel.reeves@utk.edu, or anyone else on the OIT team.  

 

Those who are interested in IT Weekly must self-enroll to the listserv; if you have colleagues or students who may be interested in learning more about what we are up to, please forward this email or let them know that they can subscribe to IT Weekly at http://tiny.utk.edu/join-itweekly. You can also follow us on Twitter & like us on Facebook with the handle UT_OIT. 


Canvas is here! Are you ready?

OIT is offering weekly Virtual Canvas Camps to help you become Canvas Ready before Blackboard retires on May 31, 2017.

Join us Mon/Wed/Fri from 9 am-noon and Tue/Thu from 1 pm-4 pm via Zoom, http://tiny.utk.edu/canvas-zoom

 

UT Project Management Community of Practice

The next UT Project Management Community of Practice (PM CoP) meeting will be Thurs, Feb. 16 from 12 - 1 pm in Hodges Library, room 605. You can bring your lunch and arrive as early as 11:45 am.

 

Agenda:

o Bring Your Own Project (BYOP) discussion: Applying Agile Methodologies to Nuclear Physics Experiments – Stan Paulauskas, Physics

o Other BYOP discussions – solicit ideas & suggestions from other CoP attendees on any of your current project issues and pain points

o Planning for future meetings

o Networking

 

The March 16 meeting is canceled due to the conflict with UT’s Spring Break. Our next meeting is scheduled for April 20.

 

NVivo by QSR International

What is itNVivo is a qualitative analysis software package that supports both qualitative and mixed methods research. It lets you collect, organize, and analyze content from interviews, focus groups, discussions, surveys, documents, audio and visual files, images, social media data, web pages, and spreadsheets. It also offers multiple ways to visualize and report data, including graphs, charts and cluster analysis. Within the program, one can search and all or parts of data, sort data based on variable attributes or classifications and display a matrix of codes or coding structures. Video and Audio files can be transcribed and analyzed within the program. It also interfaces with EndNote, Mendeley, and Zotero for conducting a paperless literature review.

 

Where can I run it? NVivo is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows and Mac computers. The download and installation instructions are on OIT's software download page. For UTK, NVivo is also available on OIT’s Apps@UT server.

 

How can I learn it? For UTK, OIT offers workshops on NVivo each semester, and you can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 865-974-9900. You can also visit NVivo’s Support page or watch tutorials from QSR International’s YouTube channel.

 

Where can I get support? OIT offers Full Support for NVivo.For assistance, contact the OIT HelpDesk at 865-974-9900.

 

Workshops for February 13 - 17, 2017

Instructor-Focused:

Getting to Know Canvas, February 15, 10:00am - 12:00pm

Teaching in a Technology Enhanced Classroom (TEC) 1, February 17, 3:30pm - 5:00pm

 

Researcher-Focused:

QDA Miner 1 (Basics), February 15, 10:10am - 12:10pm

NVivo11 Fundamentals, February 15, 12:00pm - 1:30pm

Introduction to MATLAB, February 15, 1:00pm - 3:00pm

Image Processing Using ImageJ, February 16, 1:30pm - 3:30pm

WordStat for Text Mining, February 17, 10:10am - 12:10pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

 

I've been hacked!

Determining whether or not your computer or mobile device has been hacked can be difficult. Nonetheless, there are a few common issues that will indicate your computer has been hacked. If your browser's homepage has unexpectedly changed or is taking you to websites you have never visited, this could be an indication. Also, if your computer program has triggered an alert that your system is infected, or your computer applications are constantly crashing, your computer could be hacked.

 

If you are experiencing any of these common issues or have experienced other unusual things with your computer, you should respond quickly. If you are using a device provided to you by your department, report the incident to your departmental  IT staff or call the OIT HelpDesk right away. If this is a personal device, you should try changing your passwords and reinstall the operating system. If you still think your computer is corrupted, contact the manufacturer of the device or visit their website to determine your next step. Lastly, if you feel in any way threatened, immediately report it to law enforcement.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  If you have concerns or questions about whether your computer is hacked, you should contact the OIT HelpDesk at (865) 974-9900.

Remember, no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password via email.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

February 03
[ITWEEKLY] IT Weekly, February 3, 2017

 

February 3, 2017

 

Adobe Creative Cloud, Captivate, and Presenter

Do you need Adobe Creative Cloud, Captivate, or Presenter for your computer or student computer lab?  UT Knoxville departments may purchase licenses through VolTech*.

 

Creative Cloud licensing is based on named users and requires UT to assign licenses to a specific employee for all products.

 

Benefits of the named license for Creative Cloud include the ability for the employee to use the software on two different computers, one of which may be a home computer. This benefit is not available for Captivate or Presenter. Departments may also purchase licenses for use by their student employees engaged in departmental (non-academic) work.

 

Departments that support a student computer lab or a staff training lab may get a packaged version of Creative Cloud for the cost of one license per machine. Note that dual boot machines will require a license for both operating systems.

 

*If you are with another campus or unit, such as UT System Administration, Institute of Agriculture, Institute for Public Service, Health Science Center, Chattanooga, or Martin, please check with your respective Chief Information Officer for additional information regarding the distribution of Adobe products.

 

Canvas is here! Are you ready?

Blackboard retires on May 31, 2017.

This semester, over 900 Instructors are actively using Canvas to deliver more than 1,600 course sections.

 

Get Canvas Ready Now in 4 Convenient Ways:

1.      Attend an OIT Course Delivery Workshop (Register Now)

2.      Access online tutorials

a.   Topic Specific Resources

b.   Full Online Canvas Workshop

3.      Contact the OIT HelpDesk to schedule one-on-one and small group help. 

4.      Zoom into Canvas with Virtual Camp Canvas

a.   Join us Mon/Wed/Fri from 9 am-noon and Tue/Thu from 1 pm-4 pm via Zoom

b.   http://tiny.utk.edu/canvas-zoom


Turning Technologies adds Clicker Peer Support

Turning Technologies is adding to the UTK support team.  Grant Peterson, a freshman in the Haslam College of Business, will be providing peer support and faculty assistance with the Turning Technologies response system and devices. "I look forward to helping you," says Grant. "Go Vols!"

 

Clicker Peer Support Location and Hours:

Information Commons @ Hodges Library, START desk (near room 220E)

Tuesdays: 11 am-12:30 pm and 1-3 pm
Thursdays: 9 am-12:30 pm and 1-3 pm

 

Spring 2017 GTA@OIT Grant Deadline: Friday, March 3

OIT offers Graduate Teaching Associates and Assistants (GTAs) an opportunity to receive a GTA@OIT Grant. Recipients must be an instructor of record for a summer or fall 2017 course. This grant is for enhancing a course with technology by redesigning a course or course component for web-based delivery.

The grant includes one-on-one instructional design consulting, Technology-Enhanced Classroom (TEC) training, and help in using Canvas and Zoom features related to communication, assessment, evaluation, and online instruction.

Recipients of this grant also receive a monetary award to be used for travel and professional development purposes. Grant recipients must complete course content in the spring for summer or fall implementation.

For more information, visit
GTA@OIT.

 

Mplus by Muthén & Muthén 

What is it? Mplus analyzes Structural Equations Models (SEM) that can include both continuous and categorical latent constructs. As their website states, it can also analyze "both cross-sectional and longitudinal data, single-level and multi-level data, and data that come from different populations with either observed or unobserved heterogeneity. Analyses can be carried out for observed variables that are continuous, censored, binary, ordered categorical (ordinal), unordered categorical (nominal), counts, or combinations of these variable types."

 

Where can I run it? For UTK, Mplus is available on OIT’s Apps@UT server and the computers in the OIT public computer labs. Four people can run the software simultaneously.

 

How can I learn it? There are short courses on the Muthén & Muthén website, and general SEM information is at SEMNET. To learn Mplus, we also recommend the program's help files.

 

Where can I get support? OIT offers Minimal Support for this software.

 

Workshops for February 6 - 10, 2017

Instructor-Focused:

o Getting to Know Canvas, February 6, 9 am - 11 am

o Creating Accessible Documents on a Mac, February 6, 1 pm - 3 pm

o Mobile Learning In and Out of Class, February 7, 1 pm – 3 pm

o BYOD with WolfVision Cynap, February 8, 11:10 am - 12:40 pm

o Prezi Tips for Conferences, February 8, 3:30 pm – 5 pm

o OIT New Staff Orientation, February 9, 8:30 am – 10 am

o BYOD with WolfVision Cynap, February 9, 3:30 pm – 5 pm

 

Researcher-Focused:

o Analyzing Social Media Data for Research, February 9, 3 pm – 5 pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

 

Securing Internet of Things (IOT) Devices

Internet of Things (IOT) is defined as a system of interrelated computing devices and objects that can transfer data over a network without the need of any human-to-human or human-to-computer interaction. In 2013, the Global Standards Initiative defined IOT as “the infrastructure of the information society.” Examples of devices or “things” in IOT can refer to a variety of devices such as smart TV’s, routers, smart thermostats and smart home devices.

 

The first step in protecting your IOT device is to consider what functionality you need from the device. Just because your refrigerator or washer and dryer can connect to the internet doesn’t mean you should connect it to the internet. Be sure you fully understand what internet connectivity will mean for your IOT device and decide whether that benefit is valuable. If you ultimately choose to hook up your IOT devices to the internet, create a separate network for guests that do not allow access to your shared files or networking devices.

 

Also, be aware that many IOT devices come equipped with very few security features, little security support, and a default password that is rarely changed. Consequently, these devices can be hacked, making it possible to slow your internet and attack other devices.  Therefore, when purchasing and using IOT devices, be sure to change the default password that comes pre-loaded on the device.

 

Finally, be sure to update your device when new software becomes available. Vulnerabilities and exploits are usually fixed as they emerge, so it is important that your IOT devices are regularly updated. If possible, automate this on your IOT device or check for updates as frequently as possible.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

January 28
[ITWEEKLY] IT Weekly, January 28, 2017

 

January 27, 2017

 

Get to Know WolfVision Cynap

The WolfVision Cynap is a BYOD (Bring Your Own Device) system that allows instructors and students to connect their laptops, tablets, and smartphones wirelessly to project to the main screen in a classroom.  

 

Cynap features: 

o Connect up to four devices at the same time. 

o Mirror Mode allows all four devices to appear on the main screen at once. 

o Moderator Mode allows the instructor to preview all four devices and then send one image at a time to the main screen. 

o Onboard web browser allows you to use your UTK Google drive for presenting  

o Whiteboard feature included. 

o Annotation feature included. 

o Interactive annotation feature lets Instructors turn on an interactive annotation feature allowing students to do live annotations from their own devices. 

o Wireless connections include AirPlay, Mircast, Chromecast, and vSolution software from WolfVision 

o Support Wired HDMI connections. 

 

Cynaps are available in the following classrooms: 

o Alumni Memorial Building 2, 3, and 32  

o Buehler 415 

o Communications 54 

o Dougherty Engineering 416 

o Earth and Planetary Sciences 400 

o Hodges Library 101, 127, 128, 211, 220E 

o Plant Science 128 

o Walters Life Science M401 and M415

 

Come to one of our workshops to learn more or contact the OIT HelpDesk online or by phone at 865-974-9900 to arrange a one-on-one consultation. 

 

My Mediasite

With each venture into online education, faculty need greater access to tools for creating and sharing video content. One of many ways OIT Digital Media Services (DMS) assists faculty with their video needs is the My Mediasite video portal. 

 

My Mediasite and its companion application, the Mediasite Desktop Recorder, allow faculty to create and publish video content directly from a laptop or desktop to an OIT server. Once published, the content is available for on-demand playback and sharing via presentation URLs. The Mediasite Desktop Recorder is perfect for capturing a camera image plus a screencast or a slideshow in a side-by-side presentation. 

 

Viewers see the presenter delivering a lecture along with presentation materials. Voice-over screencast and voice-over slideshow options are also available. With My Mediasite, uploading videos directly from iOS and Android devices is also quick and easy. 

 

If you want to create new course videos or just share videos you have already produced, try My Mediasite and the Mediasite Desktop Recorder. 

 

For more information and assistance with setting up your My Mediasite profile, contact the OIT HelpDesk online or call (865) 974-9900 to schedule a consultation. 

 

OIT Scantron Test Scoring Services  

A fast and accurate way to score tests or enter survey data is to use optical mark recognition forms. These familiar darken-the-circle forms require the use of a number 2 pencil. 

 

Our service includes an Excel file containing your data, item analysis for tests in the form of a PDF file, and answer reports of each student's answers and the correct answers for each item. 

 

You may drop off and pick up your Scantron forms between 9 am and 5 pm in 517 Greve Hall. OIT will process forms within one business day* and deliver your Scantron results via the secure Online@UT (Blackboard) interface. Once you receive your Scantron results in Blackboard, your forms will be ready for pickup at Greve Hall. OIT will securely discard processed forms left over two weeks from their drop-off date. 

 

*On the last day of final exams, we scan more frequently to give you more time to get your grades in. 

 

The cost of scanning is 6 cents per page regardless of whether the forms are single- or double-sided.  Payment is made using a departmental account, which must be provided when dropping off the forms. Students requesting this service must handle billing through their department.  

 

If you have special needs such as scanning custom forms or scheduling quicker turnaround time, contact the OIT HelpDesk online or call (865) 974-9900 a few days in advance to make the arrangements. 

 

 

MATLAB and Simulink by MathWorks, Inc.

What is it? MATLAB and Simulink are computational software environments used to perform a variety of computational tasks such as in engineering, science, mathematics, statistics and finance. The UT system-wide Total Academic Headcount (TAH) license includes MATLAB, Simulink and more than 50 add-on products called Toolboxes, seeToolboxlist.pdf. The Toolboxes are collections of functions for solving particular classes of problems, such as signal processing, image processing, control systems, curve fitting, etc. Simulink and the Toolboxes require MATLAB.

 

Where can I run it? The MATLAB products are available at no additional charge to faculty, staff and students at UTK, UTSI, UTHSC and UTC for installation on university-owned and personally-owned Windows, Mac and Linux computers. The download and installation instructions are on the OIT software download site. For UTK, the MATLAB products are also available on OIT’s Apps@UT server, the Newton Linux Cluster and the computers in the OIT public computer labs. There is no simultaneous user limit for the MATLAB products.

 

How can I learn it? For UTK, OIT offers MATLAB workshops each semester. You can also learn Matlab from Mathworks videos and webinars and Lynda.com from OIT online training library. Manuals for all products are online at Mathworks help site. MATLAB and Simulink tutorials are online at Mathworks support site

 

Where can I get support? OIT offers Full Support for MATLAB. For assistance, contact the OIT HelpDesk at 974-9900. For free online and telephone support with the MathWorks Support team, or call (508) 647-7000 from 8:30 am – 10:00 pm EST, Monday – Friday.

 

Workshops for January 30 – February 3, 2017

Instructor-Focused:

o BYOD with WolfVision Cynap, January 30 2:30pm - 4:00pm

o Adobe Captivate 1 (Hands-On With Adobe Captivate: Going Beyond PowerPoint), February 1 1:30pm - 3:30pm

o BYOD with WolfVision Cynap, February 2 9:30am - 11:00am

o Getting to Know Canvas, February 2 2:00pm - 4:00pm

 

Researcher-Focused:

o Using Qualitative Data Analysis Software for Literature Reviews, February 2 4:00pm - 5:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

2017 Security Awareness Training!

On February 1, 2017, the UTK Information Security Office (ISO) will be enabling the campus information security awareness training program called “Securing the Human.” Securing the Human is an on-line computer-based program that provides faculty and staff with information

they need to engage in effective information security behavior.

 

The Office of Information Technology, by way of SANS, will be sending an email to all UTK faculty and staff containing the link to the UTK security training web page – security.utk.edu/awareness. The email will come from noreply@securingthehuman.org. If you have Clutter enabled on your Office365 Email account, there’s a chance that the email will end

up in the Clutter Folder. All participates must complete the information security awareness training, as awareness is an integral part of protecting the University’s resources.

 

The Security Awareness program consists of a number of videos that cover specific security topics. The videos range anywhere from 1 to 5 minutes in length and are intended to influence user behavior that will reduce security risks. Users are allowed to complete the training at their pace, monitor their progress, and revisit completed training. Upon completion, the user will receive a security awareness training certificate. For more information about this program, visit the Securing the Human website (http://www.securingthehuman.org).

 

If you do not receive a training email, check your Junk or Spam folders in your email client. For questions regarding your personalized security awareness training, please contact the OIT HelpDesk at (865) 974-9900.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

January 20
[ITWEEKLY] IT Weekly, January 20, 2017

 

January 20, 2017

 

Classification Survey

Over the next year, all faculty, staff, and student employees using university computing equipment will be required to complete a brief survey identifying data on your university-owned equipment.

 

The Classification Survey will provide the Office of Information Technology (OIT) information about the data stored, viewed, or processed on the university-owned equipment that you use.A recent security assessment recommended that such a survey be completed on an annual basis. 

 

You can get ahead of the game by submitting your survey now at classify.utk.edu.  If any of the devices on your list are personally owned, rather than university owned, you will need to identify them as such by updating your Network Registration entry (instructions).  This change will not affect your ability to access the internet via that device. 

 

Otherwise, you will get an email sometime during the next 12 months instructing you to complete the survey. Once you receive this notice, you will have 30 days to respond.  

 

If you find a device on your list that you do not own or use, you will need to contact the owner or the OIT HelpDesk. If you have trouble completing the survey, you can seek assistance by contacting the OIT HelpDesk at 865-974-9900. 

 

Phishing Scams: PayPal and UT Libraries

Many faculty, staff, and students found phishing scams in their inbox this week.  Two notable examples appeared to be from PayPal and the UT Libraries.  In both cases, recipients were asked to confirm their account by clicking on a link.  Please be aware that many universities (including UT) have been targets of spear phishing, meaning a specific and targeted campaign against our faculty, staff, and students. 

You can check to see if an email you received has been reported as a scam on
OIT's System Status Center: Recent Email Scam or you may report the email with full headers to abuse@utk.edu (instructions).

When in doubt, contact the OIT HelpDesk for assistance at 865-974-9900 or
help.utk.edu.

 

Qualtrics vs. Survey Monkey 

Are you using SurveyMonkey? You may want to consider changing to Qualtrics Research Suite. A Qualtrics account is available to all faculty, students, and staff at no additional cost, and has many more features than SurveyMonkey. 

 

If you are using a SurveyMonkey account, consider these Qualtrics features: 

  • Easy to use, and available to all UT faculty, staff and students. 
  • Fully meets all Institutional Review Board (IRB) standards for data collection. 
  • Can keep data private and control how it is shared with collaborators. 
  • Access to a UT-branded template and dozens of generic templates. 
  • Access to training videos and excellent help files on its website. 
  • Allows collaboration with researchers at UT and researchers on other campuses. 
  • Robust reporting tools. 
  • Easily exports data from Qualtrics to SPSS and other statistical programs. 
  • Automatically optimizes surveys for mobile and desktop viewing. 
  • Fully supported by OIT. 

 

OIT’s staff has 10+ years of experience in building and administering online surveys and providing statistical services. They will also review your surveys to ensure that they are optimized for data collection on the web. 

 

OIT offers Qualtrics workshops and one-to-one overviews on how to use Qualtrics software.  In addition, our staff will provide assistance in building difficult surveys.

 

Find out more information and create your Qualtrics account from our website.

 

To request an appointment for assistance with online surveys or data analysis, contact OIT HelpDesk online or call 865-974-9900. 

 

Stay Connected with OIT 

You have several options when it comes to keeping informed of what’s happening at OIT. 

 

The OIT HelpDesk posts updates about technology on campus, reported issues and problems, and will respond to most questions and comments on Twitter. Twitter and Facebook are great resources for timely updates on OIT announcements. 

 

If you have any questions about any OIT Service, please contact the OIT HelpDesk online or call (865) 974-9900. 

 

 

Mathematica by Wolfram Research, Inc.

What is it? Mathematica is computational software used in science, engineering, finance and other areas of computing that require mathematics. The Mathematica system is now based on the Wolfram Language which is a knowledge-based symbolic language that grew out of the Mathematica Language. The Wolfram Language provides an extensive collection of more than 5,000 mathematical functions that support a wide range of symbolic operations as well as efficient numerical evaluation. Mathematica uses the Wolfram Notebook interface which allows you to organize everything you do in documents that contain text, runnable code, dynamic graphics and user interfaces.

 

Where can I run it? Mathematica is available at no additional charge to faculty, staff and students at UTK, UTSI for installation on university-owned and personally-owned Windows, Mac and Linux computers. Each UT campus maintains its download and installation instructions. The download and installation instructions for UTK are on OIT's software download site. For UTK, Mathematica is also available on OIT’s Apps@UT server, the Newton Linux Cluster and the computers in the OIT public computer labs. There is no simultaneous user limit for Mathematica.

 

How can I learn it? The Mathematica Resources page provides an extensive collection of Mathematica tutorials, examples, and other resources to learn about Mathematica. Use the Wolfram Mathematica Documentation Center to learnMathematica using the definitive guide that covers all functions and provides extensive tutorials and examples. It also provides How To’s which describe how to carry out tasks with step-by-step instructions. The Lynda.com online training library also offers Mathematica training videos for the UT community.

 

Where can I get support? OIT offers Minimal Support for Mathematica. For assistance, contact the OIT HelpDesk at 974-9900. The Wolfram support page has links to Documentation and How To’s, Support Articles, and the Wolfram Community. UT is a Premier Service subscriber which means you have telephone and email access to Wolfram experts who can help with Mathematica programming. For Advanced Technical Support, call (217) 398-6500 or submit a message form.

 

Workshops for January 16-20, 2017

Instructor-Focused:

o Teaching in a Technology Enhanced Classroom (TEC) 1, January 23, 11:10am - 12:40pm

o Getting to Know Canvas, January 24, 1:00pm - 3:00pm

 

Researcher-Focused:

o R Basics, January 23, 9:05am - 12:05pm

o Introduction to ArcGIS Online, January 26, 12:00pm - 1:30pm

o R for Text Analysis, January 27, 10:10am - 12:05pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Are You Practicing Safe Social Networking?

Social media sites are not well-monitored playgrounds with protectors watching over you to ensure your safety. When you use social media, do you think about who might be using it besides your friends and connections? Following are some of the other users you may encounter.

 

  • Identity thieves. Cybercriminals need only a few pieces of information to gain access to your financial resources, such as phone numbers, addresses, names, and other personal information
  • Online predators. Are your friends interested in seeing your class schedule online? Well, sex offenders or other criminals could be as well. Knowing your schedule and your whereabouts can make it very easy for someone to victimize you, whether it’s breaking in while you’re gone or attacking you while you’re out.
  • Employers. Most employers investigate applicants and current employees through social networking sites and/or search engines. What you post online could put you in a negative light to prospective or current employers.  Think before you post

 

How Do You Protect Your Information? Although there are no guaranteed ways to keep your online information secure, following are some tips to help keep your private information private.

 

  • Don’t post personal or private information online! The easiest way to keep your information private is to NOT post it. Don’t post your full birthdate, address, or phone numbers online. Don’t hesitate to ask friends to remove embarrassing or sensitive information about you from their posts, either. You should NEVER assume the information you post online is private.
  • Use privacy settings. Most social networking sites provide settings that let you restrict public access to your profile, such as allowing only your friends to view it.
  • Be wary of others. Many social networking sites do not have a rigorous process to verify the identity of their users. Always be cautious when dealing with unfamiliar people online and approving friend requests
  • Understand the role of hashtags. Hashtags (#) are a popular way to provide clever commentary or to tag specific pictures. Many people restrict access to their Instagram accounts so that only their friends can see their pictures. However, when someone applies a hashtag to a picture that is otherwise private, anyone who searches for that hashtag can see it.

 

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

1 - 10Next