Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
December 02
[ITWEEKLY] IT Weekly, December 2, 2016

 

December 2, 2016

 

New UT Mobile App is now available

The UT mobile app has been redesigned with a new look and many new features - like the ability to check grades or see holds on accounts.

 

The app will continue to provide all of the features from the previous version and will now include student accounts, student holds, course grades, Canvas, A to Z index, and Need to Know reminders.

 

The Tennessee app is available for iPhones, iPads, and Android devices. Download the free app from the Apple App Store or Google Play.

 

Get Canvas Ready Now

The transition to the Canvas LMS has been met with enthusiasm from both faculty and students. Over 300 faculty in over 400 courses involving over 10,000 students have adopted Canvas for the Fall Semester. Spring 2017 course shells in Canvas are available now. We have also moved over 12,000 older courses from Blackboard to Canvas. We encourage all faculty to make the move to Canvas as soon as they are ready. If you are interested in using Canvas this spring for your class, please contact the OIT HelpDesk online or at 865-974-9900. Let us know now so that we can move your content over from Blackboard or simply attach you to your content in Canvas and get you Canvas Ready for Spring.

 

Blackboard and Canvas will continue to run side-by-side through May 17, 2017, when Blackboard will be retired and unavailable. Check our workshop offerings to take advantage of our face-to-face workshops. You might also be interested in our online self-paced workshop which takes about 2 hours to complete.  Additionally, we are available for Departmental workshops, small group, and individual consultations.

 

Plan now! It is not too early to get Canvas Ready!

 

Reminder: Upgrades Scheduled for December 26

The Office of Information Technology (OIT) will be making infrastructure improvements between Monday, December 26, at 8:00 AM and Tuesday, December 27, at 8:00 AM EST.  This project will interrupt many services including, but not limited to, MyUTK, Volcard deposits, Parking Services, and several other OIT applications.  For a more complete list, please visit the OIT Knowledge Base.  If you have any questions or concerns regarding the maintenance, please contact the OIT HelpDesk at (865) 974-9900.

 

JMP by SAS Institute 

What is it? JMP is software for data management, analysis, and visualization and is commonly used in applications such as design of experiments, scientific research, and quality control. It is particularly strong in visualizing data interactively, offering tools such as multiple linked graphs and 3D rotating scatterplots. The software consists of two products: JMP and JMP Pro. JMP Pro contains everything in JMP plus advanced techniques for predictive modeling, cross-validation, model comparison and one-click bootstrapping. A scripting language is also available in JMP and JMP Pro.

 

Where can I run it? JMP is made available at no additional charge to faculty, staff and students at UT Knoxville, UT Tullahoma, and UT Health Science Center through their respective technology fees for installation on Windows and Mac computers. The download and installation instructions are at OIT's download site. For UTK, JMP is also available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for JMP.

 

How can I learn it? The JMP User Community web page provides Web Resources where you can watch on-demand webcasts, a Learning Library that includes guides, tutorials and demos and a JMP Discussion Forum where you can ask questions and share information about the JMP software.

 

Where can I get support? OIT offers Full Support for JMP. The JMP User Community web page also provides JMP Support Resources which include the JMP Knowledge Base, JMP FAQs on the JMP software features and how-to use JMP for various statistics, and a library of JMP documentation. SAS Institute offers free telephone support at (919) 677-8008, online support by submitting a SAS Technical Support Form located at http://www.jmp.com/support/ and email support.

 

Workshops for December 5-9, 2016

Instructor-Focused:

o Getting to Know Canvas, December 5, 9 am - 11 am

o Getting to Know Canvas, December 6, 1:30 pm - 3:30 pm

o Getting to Know Canvas, December 7, 1 pm - 3 pm

o Getting to Know Canvas, December 9, 2 pm - 4 pm

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

What is this "Internet of Things" (IoT)?

In the past, technology was relatively simple; you just connected your computer to the Internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges.

 

The next big technical advancement is the Internet of Things. The Internet of Things, often shortened to IoT, is all about connecting everyday devices to the Internet, devices from doorbells and light bulbs to toy dolls and thermostats. These connected devices can make our lives much simpler; for example, having your lights automatically activate as your phone recognizes when you get close to home. The IoT market is moving at an amazing pace, with new devices appearing every week. However, like mobile devices, IoT devices also come with their own individual security issues and risk.

 

What Can I Do to Protect Myself?

Connect Only What You Need

The simplest way to secure an IoT device is to not connect it to the Internet. If you don’t need your device to be connected and online, don’t connect it to your Wi-Fi network.

 

Separate Wi-Fi network

If you do need your IoT devices online, consider creating a separate Wi-Fi network just for them. Many Wi-Fi access points have the ability to create additional network sand this keeps your IoT devices on an isolated network, where they cannot be used to harm or attack any computer connected to your primary home network.

 

Update When Possible

Just like your PC and mobile devices, keep your IoT devices up to date. If your IoT device has the option to automatically update the application or firmware, do it.

 

Strong Passwords

Change any passwords on your IoT device to a unique, strong passphrase only you know.

 

Privacy Options

If your IoT device allows you to configure privacy options, limit the amount of information it shares. One option is to simply disable any information sharing capabilities.

 

Consider Replacement

At some point, you may want to replace an IoT device when your existing one has too many known vulnerabilities that cannot be fixed or there are newer devices that have far more security built into them.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 18
[ITWEEKLY] IT Weekly, November 18, 2016

 

November 11, 2016

 

GTA@OIT Grant Recipients to Enhance Teaching and Learning for Many

OIT is pleased to announce the recipients of the fall 2016 GTA@OIT Grant who will be making a major impact on teaching and learning at UTK.

From general education courses to secondary teacher education, this semester's GTAs are poised to guide students and peer instructors into deeper learning, enhanced evaluation, and greater knowledge retention for many years to come. 

Visit the
GTA@OIT grant website for more information on their proposal abstracts and the program.

Recipients are:

o Lindsey Fox, Mathematics, Utilizing the Web to Enhance Hands-On Learning

o Amy Heger, Psychology, Turning Metacognition into Mobile-cognition: Educational Benefits of Experience Sampling

o Tricia Phillips, Mathematics, Creating Online Components for a Calculus Course 

o Vincent Price, Theory & Practice in Teacher Education, Using Video Recordings as a Means of Self- and Peer Reflection/Evaluation in an Introductory Pedagogical Course

o Cara Sulyok, Mathematics, Group Activities in Online Basic Calculus

 

Reminder: Faculty First Grant 2017 Call for Proposals

OIT Instructional Support invites UTK faculty to apply for the 2017 Faculty First Grant. Proposals are due by Monday, December 12, 2016. The program runs from February to December 2017.

 

Read the Call for Proposals at the Faculty First website.

Please contact the Program Coordinator Tonya Mathis at 974-9670 or tmathis9@utk.edu.

 

OIT HelpDesk Closed for the Thanksgiving Break
The OIT HelpDesk will be closed November 24-25 for the Thanksgiving Holiday and Administrative Closing. While the university is closed, OIT will continue to monitor the network, email, and major OIT applications. To check the current status of IT systems, please visit the online IT System Status Center at http://help.utk.edu/status.

 

The Telephone OIT HelpDesk will reopen on Saturday, November 26 at 12:00 a.m. The OIT HelpDesk Walk-in Service Center will observe normal operating hours on Sunday, November 27.  

 

ImageJ by National Institutes of Health

What is it? ImageJ is a free, open source image processing program that can display, edit, analyze, process, save and print various image types. ImageJ, written in Java, was designed with an open architecture that provides extensibility via Java plugins. Custom acquisition, analysis and processing plugins can be developed using ImageJ's built in editor and Java compiler.

 

Where can I run it? Being free, you can install it on any Linux, Mac or Windows computer. It is available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is no simultaneous user limit for ImageJ.

 

How can I learn it? OIT offers workshops on ImageJ each semester. For UTK, you can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 974-9900. Documentation, including the ImageJ User Guide, tutorials, and examples, can be downloaded from the software's main website.

 

Where can I get support? OIT offers Full Support for ImageJ. For assistance, contact the OIT HelpDesk at 974-9900. The software's main website also includes a user's guide and FAQs, and the ImageJ Information and Documentation Portal has still more helpful information.

 

 

Workshops for November 7-11, 2016

Instructor-Focused:

o Open Consultations for Transition to Canvas, November 21, 2 pm – 3 pm

o Getting to Know Canvas, November 22, 10 am – 12 pm

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Phishing: Don't bite!

As the holiday season approaches, phishing e-mails become more rampant as cyber attackers try to take advantage of consumers purchasing items over the internet. Phishing e-mails are fake messages with the purpose of tricking the recipient into clicking on a link and submitting your

credentials or opening an attachment that will infect your computer with malware. These phishing e-mails sometimes seem as if they are coming from an official organization or someone you know, but will have poor grammar or spelling issues. Be cautious of any e-mail that looks

odd, has grammatical mistakes, spelling mistakes or in any way seems unofficial; it could turn out to be a phishing e-mail that infects your computer or steals your credentials.

 

By falling victim to phishing e-mails, you become vulnerable to having sensitive information stolen. Therefore, it is important to take the proper precautions in protecting yourselves and your colleagues if you receive a phishing e-mail.

 

OIT has recently seen several user accounts compromised through emails delivered as SPAM that looks and sounds like an email from the HelpDesk. Users have clicked on the link and been taken to a website that looks like the Microsoft Office365 login page. They continue to submit their UT NetID and password and are passed on to the Office365 site. Meanwhile, the bad actors have taken the user’s credentials, logged into Office365 as the user and set up forwarding email addresses so that a copy of ALL email sent to the user is also sent to the forwarding address. The user would not notice that this had happened. Consider what content may be in your email: personal information and university information. If you took the bait, ALL of that is accessible by an unauthorized person.

 

If you receive a phishing e-mail you should first check the OIT System Status Center website at https://help.utk.edu/status/#scams to determine if the phishing scam has been reported. If you notice the phishing e-mail has NOT been reported, please forward the message, along with the

email headers, to abuse@utk.edu and allow the OIT office to take the proper precautions.

 

If you have further questions or concerns about an email that you find odd or if you mistakenly clicked on a link and submitted your UT credentials, contact the OIT Help Desk at (865) 974-9900 immediately.

 

Remember, no one in OIT, the OIT HelpDesk, or any legitimate on-line entity will ever ask you for your password via email. Be safe this Holiday season.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 11
[ITWEEKLY] IT Weekly, November 11, 2016

 

November 11, 2016

 

Digital Signage

Is your department interested in digital signage? Talk to OIT about your digital signage needs!

 

Earlier this year, OIT worked with representatives from several departments to select a vendor and establish a contract to provide a digital signage solution for the University. This allows the University to utilize a standard solution for campus-wide communication that is supported by OIT. If you have any questions about digital signage, please contact the OIT HelpDesk at 865-974-9900.

 

IT Community of Practice: Canvas - Making the Move
Join us on Wednesday, November 16 for the next Instructional Technology Community of Practice (ITCoP) meeting. In our final meeting of the fall semester, Lisa Yamagata-Lynch, along with OIT staff, will share insights on course design, collaboration, accessibility for the online teaching and learning environment, as well as other tips for making your move to Canvas successful.

 

·         When: 12:20 – 1:10 pm on Wednesday, November 16

·         Where: Hodges Library, room 200E (Practice Presentation Room) 

·         About the Speaker:  Lisa Yamagata-Lynch is an online instructor in Educational Psychology and one of the 2016-2017 OIT Faculty Fellows.

 

Plan now to attend the ITCoP meetings this spring on February 22, March 22, and April 26 from 12;20 – 1:10 pm.  Add the spring events to my calendar.

 

Project Management Community of Practice
The UT Project Management Community of Practice will meet on Thursday, November 17 from 12-1pm in Hodges Library Room 605. The agenda will include a demo of Office 365 Planner, a brief presentation by Creative Services on their PM Career Ladder, and a BYOP (Bring Your Own Project) discussion time to solicit feedback and ideas from attendees on project issues and pain points. If you’d like to attend the meeting, please contact The PM CoP Advisory Board to receive an email invitation to this event. All are welcome, and we look forward to seeing you there.

 

 

HLM by Scientific Software International, Inc.

What is it? HLM from Scientific Software International is a package that does Multilevel Models that are also often called Hierarchical Linear Models (HLM). An example of a multilevel model is a regression equation showing how studying increases grades.That relationship may differ at different levels, such as teachers within schools within districts.

 

Where can I run it? For UTK, HLM is available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is a two simultaneous user limit for HLM.

 

How can I learn it? You can learn HLM from the Help files, which contain the entire manual. However, to understand the manual, you also need the book by the program's developers, Raudenbush and Bryk, Hierarchical Liner Models, Applications and Data Analysis Methods. The web page is at the company's main website.

 

Where can I get support? OIT offers Minimal Support for this software. We can help you analyze HLM models using other software that we fully support. For assistance, contact the OIT HelpDesk at 865-974-9900.

 

Workshops for November 7-11, 2016

Instructor-Focused:

·         TurningPoint Clickers (Basics & Transitioning to TurningPoint Cloud, Nov 14, 1 pm – 3 pm

·         Open Consultations for Transition to Canvas, Nov 14, 3:30 pm - 4:30 pm

·         Getting to Know Canvas, Nov 15, 1 pm – 3 pm

·         BYOD Wirelessly with Wolfvision Cynap, Nov 15, 3:45 pm - 4:45 pm

·         Getting to Know Canvas, Nov 16, 9:30 am - 11:30 am

·         Creating Accessible Documents on a Mac, Nov 18, 9 am – 11 am

·         Using Skype for Business for Online Office Hours (faculty/staff focused), Nov 18, 1 pm – 2 pm

·         Open Consultations for Transition to Canvas, Nov 18, 3 pm – 4 pm

 

Researcher-Focused:

·         Introduction to SAS Proc GLIMMIX, Nov 15, 10am - 11:30am

·         Crossover Design Analysis, Nov 16, 12pm - 1:30pm

·         Repeated Measures Crossover Designs in SAS, Nov 17, 10am - 11:30am

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Malvertising

What is “Malvertising”? How can you protect yourself?

Malvertising is the use of online advertising to spread malware.  Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and

web pages.  With the increase in online shopping and news browsing, Malvertising is a fairly-new concept for spreading malware that can easily go undetected until it is too late.

 

How does Malvertising work? 

Websites or web publishers unknowingly incorporate a corrupted or malicious advertisement into their page. Once the advertisement is in place, a visitor of the website can click on the advertisement causing their computer to become infected.

 

What is so scary about malvertising is that it often involves the exploitation of trustworthy companies.  Those attempting to spread malware place “clean” advertisements on trustworthy sites first in order to gain a good reputation, then they later insert a virus or spyware in the code behind the ad for a short period of time, thus infecting all visitors of the site during that time period.

 

How do you protect yourself from Malvertising?

 

·         Know that even the most reputable websites are not immune. Malvertising is not only engineered to trick unsuspecting victims, but it operates in a way that can make it hard for reputable websites to detect.

·         Know what to look for. Malvertising can often come in the form of pop-up ads, drive-by downloads, in-text advertising, or even third-party advertisements on webpages.

·         Use a smart internet browser. There are many internet browsers that can detect websites that have malware advertisements on them. Their added levels of security can make attacks more difficult.

·         Run up-to-date Anti-Virus software on your computer. This can protect you and your computer against threats and remove malicious software from your system.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 04
[ITWEEKLY] IT Weekly, November 4, 2016

 

November 4, 2016

Upgrades Scheduled for December 26

The Office of Information Technology (OIT) will be making infrastructure improvements between Monday, December 26, at 8:00 AM and Tuesday, December 27, at 8:00 AM EST.  This project will interrupt many services including, but not limited to, MyUTK, Volcard deposits, Parking Services, and several other OIT applications.  For a more complete list, please visit the OIT Knowledge Base at help.utk.edu/kb/entry/2564.

 

During this time, we will be upgrading the storage for the SQL Server Clusters (Julius and Persephone) and access to any application connecting to the SQL clusters will be unavailable.  If you have any questions or concerns regarding the maintenance, please contact the OIT HelpDesk at (865) 974-9900.

 

 

Coming in January 2017
The Office of Information Technology (OIT) continues to take steps to improve our information security posture, including recommendations from our security assessor that we collect information about the type of data stored, viewed, or processed on all university owned equipment.  In July 2016, we began collecting this information for any new devices connecting to the UT network.  In 2017, we will collect this information on all the current university owned equipment.  We will send email to the appropriate faculty, staff, or student when it is time for them to provide us this information.  Additional information about this initiative will be available as we get closer to the start date.

If you have any questions, please contact the OIT HelpDesk online or at 865-974-9900.

ChemDraw Professional by PerkinElmer Informatics

What is it? ChemDraw Professional is a drawing tool for chemists and biologists used to create publication-ready, scientifically intelligent drawings for use in ELNs, databases and publications, and for querying chemical databases.

 

Where can I run it? ChemDraw Professional is available at no additional charge to UTK and UTSI faculty, staff and students for installation on university-owned and personally-owned Windows PCs and Macs. The download and installation instructions are at OIT's software distribution site. For UTK, the software is also available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is no simultaneous user limit for its use.

 

How can I learn it? To watch Webinar videos, read informative articles and watch feature demos, go to their main webpage and select Chemistry and then ChemDraw.

 

Where can I get support? OIT offers Full Support for ChemBioDraw. For additional technical support, browse the Cambridgesoft Technical Support site. You may also download manuals for free, search or ask a question in the Support Forum, or contact the support team via their web form.

 

Workshops for November 7-11, 2016

Instructor-Focused:

·         Cloud Storage Options at UTK (Faculty/Staff Focused), November 9, 10:30 am - 11:30 am

·         Prezi Tips for Conferences, November 10, 9:30 am – 11 am

·         Tools for Evaluating Accessibility, November 10, 1 pm – 3 pm. NOTE: This section is part of the Fall Accessibility Program. You may register for any or all of the workshops in the Program.

 

Researcher-Focused:

·         Repeated Measures Analysis in SAS Using GLM and Mixed Procedures, November 10, 1 pm - 2:30 pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Safe Online Holiday Shopping

It’s that time of year again – food, fun, parties, and lots of online shopping. Online shopping can be a savior, allowing you to find the perfect gift while saving time, but it can also end with identity theft, malware on your computer, and other cyber unpleasantness. Rather than letting it ruin your holiday season, you can take a few simple security precautions, and be careful where you shop, to help reduce the chances of you being a cyber-victim. When purchasing online keep these tips in mind to minimize your risk:

 

1.       Be cautious what devices you use to shop online. Mobile devices, such as smartphones and tablets, make shopping convenient at any time and place, but they frequently lack the security precautions of a regular computer. If you use a mobile device to shop, make extra sure you are taking all the precautions listed below.

2.      Do not use public computers or public wireless for your online shopping. Public computers and wireless networks may contain malicious software that steals your information when you place your order, which can lead to identity theft.

3.      Secure your computer and mobile devices. Be sure to keep the operating system, software, and apps updated/patched on all of your computers and mobile devices. Use up-to-date antivirus protection and make sure it is receiving updates.
Use strong passwords. The use of strong, unique passwords is one of the simplest and most important steps to take in securing your devices, computers, and online accounts. If you need to create an account with the merchant, be sure to use a strong, unique password. Try to use more than ten characters, with numbers, special characters, and upper and lower case letters. Use a unique password for every unique site.

4.      Know your online shopping merchants. Limit your online shopping to merchants you know and trust. If you have questions about a merchant, check with the Better Business Bureau or the Federal Trade Commission. Confirm the online seller's physical address, where available, and phone number in case you have questions or problems. Do not create an online account with a merchant you don’t trust.

5.      Pay online with one credit card. A safer way to shop on the Internet is to pay with a credit card rather than debit card. Debit cards do not have the same consumer protections as credit cards. Credit cards are protected by the Fair Credit Billing Act and may limit your liability if your information was used improperly. By using one credit card, with a lower balance, for all your online shopping you also limit the potential for financial fraud to affect all of your accounts. Always check your statements regularly and carefully, though.

6.      Look for "https" when making an online purchase. The "s" in "https" stands for "secure" and indicates that communication with the webpage is encrypted. This helps to ensure your information is transmitted safely to the merchant and no one can spy on it.

7.       Do not respond to pop-ups. When a window pops up promising you cash or gift cards for answering a question or taking a survey, close it by pressing Control + F4 for Windows and Command + W for Macs.

8.      Be careful opening emails, attachments, and clicking on links.  Be cautious about all emails you receive, even those purportedly from your favorite retailers. The emails could be spoofed and contain malware.

9.      Do not auto-save your personal information. When purchasing online, you may be given the option to save your personal information online for future use. Consider if the convenience is really worth the risk. The convenience of not having to reenter the information is insignificant compared to the significant amount of time you’ll spend trying to repair the loss of your stolen personal information.

10.   Use common sense to avoid scams. Don't give out your personal or financial information via email or text. Information on many current scams can be found on the website of the Internet Crime Complaint Center: http://www.ic3.gov/default.aspx and the Federal Trade Commission: http://www.consumer.ftc.gov/scam-alerts.

11.    Review privacy policies. Review the privacy policy for the website/merchant you are visiting. Know what information the merchant is collecting about you, how it will be stored, how it will be used, and if it will be shared with others.

 

What to do if you encounter problems with an online shopping site?

Contact the seller or the site operator directly to resolve any issues. You may also contact the following:

 

·         Your state’s Attorney General's Office or Consumer Protection Agency

·         The Better Business Bureau - www.bbb.org

·         The Federal Trade Commission - http://www.ftccomplaintassistant.gov

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

October 28
[ITWEEKLY] IT Weekly, October 28, 2016

 

October 28, 2016

Plagiarism Prevention and Detection for Canvas

Many instructors have expressed a desire to have a plagiarism checker in Canvas as an equivalent feature to SafeAssign that is currently available in Blackboard. Unplag is now available for use in Canvas for a pilot test. This semester-long pilot will expire at the end of fall 2016. We have issued a Request for Proposal (RFP) seeking a permanent tool that can be used in Canvas. Visit Unplag’s website to learn more about the product.

 

Unplag User Guides:

·        Instructor guide (video): Unplag LTI

·        Student guide: Unplag LTI

 

Office 365: New App Launcher and PDF Previewer for OneDrive for Business

Over the next few weeks, Microsoft is rolling out two new features in Office 365. The first is a new version of the Office 365 App Launcher. The new App Launcher provides improved discoverability for new and recently used apps, additional customization options and search across all the services and applications you use in Office 365.

Additional information about this update is available on Microsoft’s website.

 

Additionally, OneDrive for Business PDF Previewer and high-resolution thumbnails are new features for Office 365. Microsoft is enabling rich previews for your most commonly used business file types. Without leaving OneDrive, you will be able to preview Adobe files, including Illustrator (.ai), Photoshop (.psd) and Encapsulated PostScript (.eps). Email files (.msg and .eml), almost all photo files (including many RAW formats) and streaming video are also supported. Additionally, most of these file types now have high-resolution thumbnails in the folder’s tile view.

 

New Courses Announced for Lynda.com
Lynda.com is constantly adding new courses and as a student, faculty, or staff at UT Knoxville, you have access to everything Lynda has to offer. You can find an up-to-date listing of new courses at www.lynda.com/newcourses.aspx. The list can be filtered by topics such as 3D, Business, Photography, and Web so you can easily find a course that meets your interests. Just sign into Lynda.com using your UT NetID and Password. Some of the courses released this semester are:

·        Learn Office 365 Groups: The Basics

·        Outlook 2016: Advanced Tips and Tricks

·        Excel 2016: Data Validation in Depth

·        PowerPoint for Mac 2016: Tips and Tricks

·        Google Docs: Tips and Tricks

·        Customizing Macs for Accessibility and Ease of Use

·        Customizing Windows 10 for Accessibility and Ease of Use

·        Prezi: Tips and Tricks

·        Universal Principles of Design

·        HTML Essential Training

 

ATLAS.ti by ATLAS.ti Scientific Software Development GmbH

What is it?  ATLAS.ti is one of two qualitative analysis software packages offered at UT that allow the researcher to organize, analyze, report and visualize data in both text and multimedia formats. ATLAS.ti also allows users to transcribe directly into the program and has an accompanying iPad and Android app for multimedia data collection.

Where can I run it? ATLAS.ti is funded by the UTK Technology Fee and made available at no additional charge to UTK students, faculty and staff on the Apps@UT server. At this time only five users can simultaneous use ATLAS.ti.

How can I learn it? ATLAS.ti offers free training and video tutorials from the ATLAS.ti YouTube channel. You can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 974-9900. You can also visit ATLAS.ti’s support page.

Where can I get support? OIT offers Full Support for ATLAS.ti. For assistance, contact the OIT HelpDesk at 974-9900.

Anything else I should know? Users should use the assign (and not add to library) function for primary documents while working with ATLAS.ti on the Apps@UT server. More information on these issues can be found on the How to Use Apps@UT web page.

 

Workshops for October 31-November 4, 2016

Instructor-Focused:

·        Getting to Know Canvas, October 31, 9:30 am - 11:30 am

·        Creating Accessible Assessments, November 3, 1 pm - 3 pm. NOTE: This section is part of the Fall Accessibility Program. You may register for any or all of the workshops in the Program.

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Steps To Staying Secure In These Scary Times

As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using or where you are using it, we recommend the following four key steps.

 

What Can I Do?

 

1.                          You: Attackers have learned that the easiest way to bypass even the most advanced security technology is by attacking you. If they want your password, credit card, or personal data, the easiest thing for them to do is to trick you into giving them this information. For example, they can call you pretending to be Microsoft tech support and claim that your computer is infected, when in reality they are just cyber criminals that want you to give them access to your computer. Perhaps they will send you an email explaining that your package could not be delivered and ask you to click on a link to confirm your mailing address, when in reality they are tricking you into visiting a malicious website that will hack into your computer. This is how attacks such as Ransomware work. Ultimately, the greatest defense against attackers is you. Be suspicious. By using common sense, you can spot and stop most attacks.

2.                          Passwords: The next step to protecting yourself involves using a strong, unique password for each of your devices and online accounts. The key words here are strong and unique. A strong password means one that cannot be easily guessed by hackers or by their automated programs. Tired of complex passwords that are hard to remember and difficult to type? Try using a passphrase instead. Instead of a single word, use a series of words that is easy to remember, such as “Where is my coffee?” The longer your passphrase is, the stronger. A unique password means using a different password for each device and online account. This way, if one password is compromised, all of your other accounts and devices are still safe. Can’t remember all those strong, unique passwords? Don’t worry, neither can we. That is why we recommend you use a password manager, which is a specialized application for your smartphone or computer that securely stores all of your passwords in an encrypted format.

 

3.                          Updates/Patches: Make sure your computers, mobile devices, apps, and anything else connected to the Internet are running the latest software versions. Cyber criminals are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use special programs to exploit them and hack into the devices you are using. Meanwhile, the companies that created the software for these devices are hard at work fixing them by releasing updates. By ensuring your computers and mobile devices install these updates, you make it much harder for someone to hack you. If your operating systems or devices are old and no longer supported with security updates, we recommend you replace them with new ones that are.

 

4.                          Backups: Sometimes, no matter how careful you are, you may be hacked. If that is the case, often your only option to ensure your computer or mobile device is free of malware is to fully wipe it and rebuild it from scratch. The attacker might even prevent you from accessing your personal files, photos, and other information stored on the hacked system. Often the only way to restore all of your personal information is from backups.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

Referenced Content: http://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201610_en.pdf  

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

October 14
[ITWEEKLY] IT Weekly, October 14, 2016

 

October 14, 2016

OIT Computer Labs: ArcGIS and AutoCAD

OIT is happy to announce that ArcGIS and AutoCAD are now available for use via Apps@UT.    Four new graphics servers were recently added to the Citrix server farm providing the capability to support these graphics-intensive applications.  UTK faculty, staff, and students will now be able to run these applications without installing them on their own computers.  The applications can be found in the Graphix folder located in the main menu of Apps@UT.  Additionally, you may access the applications from any OIT computer lab through the START menu of all Windows computers.

 

ArcGIS and AutoCAD often require access to large datasets.  For the fastest application response times, use your “H” or “I” network drives to store your data.  If you have any questions about this service or how to best utilize it in your classes, please contact the OIT Helpdesk at 865-974+9900 or online.

 

Please note that all usage of AutoCAD and ArcGIS must be for academic purposes only. 

 

 

UT Project Management Community of Practice

In September, the UT Project Management Community of Practice (UT PM CoP) was established.  UT project managers were invited to the first Brown Bag luncheon which provided an opportunity for attendees to introduce themselves and develop this community. The advisory group also led a discussion related to the results of a recent UT project manager survey. Participants discussed and suggested topics for future meetings. Twenty-two people from multiple offices across campus attended this event.

The UT PM CoP will utilize PMI Project Management Standards of Practice to provide education, support, and mentoring experiences to anyone who manages projects within the Knoxville-area UT community.

Mark your calendar
The next two meetings of the UT PM CoP have been scheduled from 12-1 PM in Hodges Library, room 605:

·         Thurs., Oct. 20 – OIT Project Management Office’s evolution of processes & methodology

·         Thurs., Nov. 17 – Bring Your Own Project (BYOP): informal, ~5-minute presentations to solicit feedback & ideas from attendees on project issues & pain points.

 

If you are interested in attending these events or joining this group, please join our listserv or contact a member of the UT PM Advisory Group:

·         Shane Colter, colters@utk.edu

·         Stephanie Workman, workmss@utk.edu

·         Judy Ratliff, jratlif4@utk.edu

·         Brandon Herriage, wherriag@utk.edu

 

Special thanks to OIT”s Project Management Office for creating the advisory group and establishing the new Community of Practice.

Reminder: Project RITE Proposal Deadline is Today

The deadline for applying for the OIT Project RITE grant is Friday, October 14. The grant provides faculty at UT Knoxville and UT Martin the opportunity to study the impact of using technology-mediated instructional strategies on student learning outcomes.  Information about the proposal process is available on OIT’s website.

 

Amos for Windows by SPSS, an IBM company

What is it? Amos (Analysis of MOment Structures) analyzes Structural Equations Models (SEM) by either drawing a path diagram or via a command language. These models are also known as LISREL models, confirmatory factor analysis, analysis of covariance structures, path analysis, or causal modeling.

 

Where can I run it? Amos is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs.The download and installation instructions are at the OIT software download page. For UTK, Amos is also available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is no simultaneous user limit for Amos.

 

How can I learn it? You can schedule a one-on-one tutorial by calling the OIT HelpDesk at 865-974-9900. A tutorial is also provided as part of the Amos Help files.

 

Where can I get support? OIT offers Full Support for this software. For assistance, contact the OIT HelpDesk at 865-974-9900.

 

 

Workshops for October 17-21, 2016

Instructor-Focused:

·         Adobe Captivate Interactive Practice and Assessment Templates, Oct 17 , 1:30pm - 3:30pm

·         Mobile Learning In and Out of Class (Make It, Take It), Oct 18 , 10:00am - 12:00pm

·         Office 365: Overview (Faculty / Staff focused), Oct 18 , 10:10am - 12:10pm

·         Getting to Know Canvas, Oct 18 , 2:00pm - 4:00pm

·         Getting to Know Canvas, Oct 19 , 11:00am - 1:00pm

·         Prezi Tips for Conferences, Oct 19 , 2:30pm - 4:30pm

·         Creating Accessible Documents with Adobe Acrobat DC, Oct 20 , 10:30am - 11:45am

·         Office of Disability Services Overview, Oct 20 , 1:00pm - 3:00pm. NOTE: This section is part of the Fall Accessibility Program. You may register for any or all of the workshops in the Program.

·         Getting to Know Canvas, Oct 21 , 10:00am - 12:00pm

·         Camtasia for Windows 1: Creating Online Instructional Video, Oct 21 , 1:00pm - 3:00pm

 

Researcher-Focused:

·         NVivo11 Fundamentals, Oct 17 , 10:00am - 12:00pm

·         Mixed Model Analysis in SPSS, Oct 20 , 10:00am - 12:00pm

·         SPSS 2 (SPSS Data Analysis), Oct 20 , 1:30pm - 3:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Cybersecurity and Research

Grant-funded research projects are exciting. Imagine being a campus researcher leading such a project: you've defined a problem, spent hours — including evenings and weekends — writing a grant, and you've been selected from a competitive field to receive the award. Now you have a

limited amount of time to build your team, execute your plan, and reach your research goal.

 

One common factor among scientists, no matter which discipline they belong to or how complex the project may be, is the use of computing resources. Researchers use computers for simulations, data capture, storage, sharing, and analysis, as well as project management,

collaboration, and the more utilitarian tasks like e-mailing, scheduling, and maintaining websites. Using computing resources inevitably come cybersecurity concerns. Even if the use of computer resources is minimal, threats such as ransomware and usurpation of your

computers for a BOTNET or SPAM can seriously impede your research. Some projects will have a clear challenge around regulated data (e.g., HIPAA for certain types of health information and defense regulations for certain types of classified data), but cybersecurity requirements may be

less clear.

 

There are specific cybersecurity challenges for grant-funded science projects, and the Information Security community can help resolve those challenges.

 

·         Grant-funded science projects face a number of unique challenges related to cybersecurity:

·         Projects are rarely large enough to warrant hiring personnel dedicated to information security.

·         The limited lifetime of a project makes them laser-focused (sometimes literally!) on their scientific goals.

·         Research can require specialized computing infrastructure that is difficult to update and challenges common information security practices.

·         There is a common misunderstanding that an open research project that doesn't have confidentiality requirements has no cybersecurity concerns.

·         Scientists may be offered (often contradictory) information security advice, leaving them feeling anxious, overwhelmed, and uncertain about how to begin addressing cybersecurity issues with respect to their research projects and data.

 

Four lessons in how the information technology community can work with researchers:

 

1.       LISTEN - IT and research staff must strive to communicate and bridge the cultural gap between their communities. To effectively support research, IT staff must have a clear understanding of the concerns of the research staff about the integrity of their research project. Mapping those concerns to cybersecurity risks is the end goal.

2.      RECOGNIZE THE DIFFERENCE - IT controls (e.g., firewall policies) that make sense for administrative computing can hinder the collaboration required by a research project that spans multiple organizations. A research-centric approach such as a science DMZ may be one way to bridge the gap between administrative and research computing.

3.      PRIORITIZE - Research projects are typically time-sensitive. Clear communication between the IT practitioners and the research staff is important when identifying where cybersecurity is most critical. This promotes the prioritization of recommended actions that will deliver the most bang for the buck in a short amount of time.

4.      NEVER ASSUME - Research staff may assume that a level of cybersecurity protections (controls) exist. CAUTION! Never assume; ASK. You may assume a firewall exists and is actively protecting your data when the very opposite may be the case.

 

When your project depends on information technology resources at UTK, involve OIT as EARLY as possible; start the conversation early to ensurethat your requirements are known, IT risks are identified and prioritized.

 

Engaging OIT starts with a call to (865) 974-9900.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

October 07
[ITWEEKLY] IT Weekly, October 7, 2016

 

October 7, 2016

Make Your Course Materials Accessible

In June, OIT and the Office of Disability Services (ODS) offered a Summer Accessibility Workshop program that helped about 40 instructors learn how to make their class materials more accessible to all students. This fall, you can experience the same workshops on Thursdays from 1-3 p.m. now through November 10. You can plan to join us for the entire series, or pick and choose your topics. This series will be held at the Office of Disability Services (Dunford Hall, Room 125). These workshops incorporate accessibility guidelines and ideas for Universal Design for Learning.
 
Join us for:

 

Many of the workshops listed above are also available at alternate times/locations, and this additional workshop is not part of the series:

 

 

For additional assistance, consultation, or training contact the OIT HelpDesk online or call 865-974-9900.

 

 

TurningPoint Cloud and UTK

Turning Technology has been on campus working with the Office of Information Technology and several faculty members to resolve the conflicts between TurningPoint Cloud and our dual learning management systems, Blackboard and Canvas.
 
At this time, all connections to our Blackboard and Canvas learning management systems have been resolved. All students currently enrolled in a Blackboard or Canvas-connected course which uses TurningPoint Cloud have been linked to their course for the Fall 2016 semester. Once Instructors update their participant lists and export the previous classes' session data to Blackboard or Canvas, students should see their points displayed within the Grade Center. For information on updating the participant list, refer to the Blackboard 
UTK Participant List Updates PDF document or the Canvas document for downloading participant lists.
 
Students who are not receiving points should verify the following:

  1. The student is attending class.
  2. The device is on the correct channel.
  3. The device is working properly (the check mark beside the response within the device's LCD screen confirms the response was recorded by the Instructor's receiver).
  4. The device that is being used is the one registered with the student’s Turning Account.
  5. The device is NOT in the instructor's Unassigned Devices listing.

 

If the student has verified these items and is not receiving points within the Blackboard or Canvas, please contact the OIT HelpDesk at 865-974-9900 or online

 

OIT Computers Labs: Adobe Creative Cloud

Do your students need access to Adobe Creative Cloud to complete their school assignments?  OIT provides the full Creative Cloud Suite on the computers in Commons located on the second floor of Hodges Library.  Additionally, there are over 100 software packages available in the various OIT computer labs.  For detailed information about the type of software running in each lab, visit the  OIT Computer Labs Hardware & Software database.

 

Additionally, faculty may reserve our teaching labs in Humanities, Tickle, and Presidential Court as well as request software be installed in any OIT lab for classroom instruction. Additional information about this process is available on the OIT Computer Lab Reservation website.

 

 

WordStat by Provalis Research, Inc.

What is it? WordStat is a supplemental program that works with either QDA Miner or Stata to perform content analysis on text data. This process is also known as text mining. You may create your own categorization dictionaries within WordStat or import pre-existing subject dictionaries. WordStat provides many of the same types of analyses as QDA Miner such as co-occurrence analysis and analyzing text categories by other variables such as age or gender. WordStat can only be started from within QDA Miner or Stata.

 

Where can I run it? WordStat is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs and Macs. The download and installation instructions are available at the OIT Software Download web page. It is also available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is no simultaneous user limit for WordStat.

 

How can I learn it? OIT offers workshops on WordStat each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 865-974-9900. Tutorials are also available online at the company's web page for tutorials.

 

Where can I get support? OIT offers Full Support for this software. For assistance, contact the OIT HelpDesk at 865-974-9900.

 

Workshops for October 10-14, 2016

Instructor-Focused:

·         Getting to Know Canvas, October 10, 2:00pm - 4:00pm

·         BYOD Wirelessly with Wolfvision Cynap, October 12, 9:00am - 10:00am

·         Getting to Know Canvas, October 12, 9:00am - 11:00am

·         Creating Accessible Documents with Adobe Acrobat DC, October 13, 1:00pm - 2:30pm

 

Researcher-Focused:

·         Introduction to ArcGIS Online  October 13, 3:00pm - 5:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Using Cloud Technologies Safely

The cloud is a service provider that stores and manages data for its customers. The advantage of using the cloud is that you can access your data from multiple devices and can share the data more easily with who you desire. The reason this service is known as “the cloud” is that you often do not know where your data is physically being stored. Examples of “the cloud” include Google docs, Amazon cloud and Apple iCloud.

 

The cloud has other advantages but you must also take the proper steps in protecting yourself when selecting a cloud provider. For your work computer or work related information, check with your supervisor to see if the cloud servers are allowed. If so, take into consideration a server’s security as the most important aspect. Be sure to understand how your data will get from your computer to the cloud and how your information will be stored in the cloud. Finally, make sure the connection is secured by encryption and understand who can decrypt your data.

 

If you have concerns or questions about “the cloud,” you should contact the OIT HelpDesk at 865- 974-9900. Also check in at the OIT System Status Center as OIT posts email scams to the Recent Email Scams tab.

 

Remember, no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password via email.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

September 30
[ITWEEKLY] IT Weekly, September 30, 2016

 

September 30, 2016

New Access Request System Announced

OIT has worked closely with Facilities Services to create the new Access Request System which will launch on October 10. The new online system will be used to request, approve, or relinquish access to secured campus locations.  Not only will these changes increase the security and control over who can access campus buildings and departmental spaces, but these changes will also eliminate the need to pass paper between campus departments, foster better management of request and recovery processes, and provide automatic user notifications.

 

Active, regular employees will log in with their NetID and password to request keys or swipe card access, check the status of a request, and review their current key records.  Students and contractors will NOT have direct access.  Building access for these individuals will need to be requested by a regular employee.

 

Each request will have two levels of approvals.  First, cost center approvers will approve the access request for their employees, and then the campus building representatives will approve the access request for the building.  In certain cases, sensitive areas or questions, will be directed to a third level of approval. Cost center approvers and campus building representatives will be able to review who has access to their areas.

 

Emails sent to the appropriate employee’s UT email address will be used for notification as requests move through the system.  Please contact Facilities One Call at 946-7777 with questions about the Access Request System.

 

Additional Adobe Creative Cloud Offerings

Adobe Creative Cloud users have been asking how they can get access to the ten free stock images advertised by Adobe.  Creative Cloud users receive the following error when they try to access these images:

 

 

Although this error indicates that your administrator can add Adobe Stock to your account, these images are not included in the current university contract and cannot be added to your account.   Adobe often advertises additional services that are not part of our contract; most often these will require a monthly subscription along with an additional charge.    Please note that all of the applications that are included as part of our contract will be visible in your Creative Cloud Desktop App with an Install option.   Please contact the OIT Helpdesk at (865) 974-9900 for any additional questions.

 

Software Update: Stata MP by Stata Corp

What is it? Stata MP is a general purpose package for statistics, data management, and graphics. You can control it using its programming language or its graphical user interface. Stata is designed to be easily extendable and there are many hundreds of free add-ons available for it in Internet repositories. Stata is particularly strong in time series, panel data, and the analysis of complex, non-random samples. Its data must fit into your computer’s main memory, limiting the amount of data it can handle.

 

Where can I run it? Stata MP is available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is a 14 simultaneous user limit for Stata MP.

 

How can I learn it? To get started with Stata, you can watch the tutorials on the company's YouTube training channel.

 

Where can I get support? OIT offers Minimal Support for Stata; however, there is a very active and helpful support group named StataList.

 

Anything else I should know? You can purchase Stata for your own computer directly from the company. UT has "GradPlan" educational pricing. Don Bruce in CBER is the campus representative. Feel free to contact him with your questions at dbruce@utk.edu or (865) 974-6088.

 

Workshops for Oct 3-7, 2016

Instructor-Focused:

·        Camtasia for Mac, October 4, 9:40am - 11:40am

·        Creating Accessible Documents on a Windows PC, October 4, 1:00pm - 3:00pm.

Researcher-Focused:

·        Mathematica 1 (Basics), October 5, 1:30pm - 3:30pm

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

October is National Cyber Security Awareness Month (NCSAM)

Since its inception under leadership from the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM has grown exponentially, reaching consumers, small and medium-sized businesses, corporations, educational institutions and young people across the nation. 2016 marks the 13th year of National Cyber Security Awareness Month.

 

STOP. THINK. CONNECT.™:

The Basic Steps to On-line Safety and Security: Staying safer and more secure online starts with STOP. THINK. CONNECT. – simple, actionable advice anyone can follow.

 

·        STOP: make sure security measures are in place.

·        THINK: about the consequences of your actions and behaviors on-line.

·        CONNECT: and enjoy the Internet.

 

Week 1 will cover user-friendly ways we can protect ourselves and our communities, along with actions to take if impacted by a breach, cyber-crime or other online issue.

 

For more information on National Cyber Security Awareness Month, go to:

https://staysafeonline.org/ncsam/about

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

September 23
[ITWEEKLY] IT Weekly, September 23, 2016

 

September 23, 2016

macOS Sierra, version 10.12 Now Available

Don’t push that upgrade button just yet!    Earlier this week, Apple released its latest operating system, MacOS Sierra. You may be chomping at the bit to upgrade to this latest OS; however, several software and hardware vendors, such as Mathworks and Fujitsu, have announced that their products are NOT compatible with Sierra. Past experience indicates that the most prudent course would be to bide your time for a few months until the first patch is released and vendors have an opportunity to correct incompatibilities between their products and Sierra. OIT’s recommendation is always to proceed with caution until users can verify that their favorite applications will work with any new OS. And as always, if you are going to upgrade anyway, please be sure to back up your data prior to initiating an upgrade.

 

If you have any questions or need assistance, please contact the OIT HelpDesk online or call (865) 974-9900.

 

TurningPoint Cloud and UTK

Turning Technology has been on campus working with the Office of Information Technology and several faculty members to resolve the conflicts between TurningPoint Cloud and our dual Learning Management Systems, Blackboard and Canvas.

 

At this time, all connections to our Blackboard Learning Management System have been resolved. All students currently enrolled in a Blackboard-connected course which uses TurningPoint Cloud have been linked to their course for the Fall 2016 semester. Once Instructors update their participant lists and export the previous classes' session data to Blackboard, students should see their points displayed within the Grade Center. For information on doing this, refer to the UTK Participant List Updates.

 

Students who are not receiving points should verify the following:

        The student is attending class.

        The device is on the correct channel.

        The device is working properly (the check mark beside the response within the device's LCD screen confirms the response was recorded by your Instructor's receiver).

        The device that is being used is the one registered with the student’s Turning Account.

        The device is NOT in your Instructor's Unassigned Devices listing.

 

If the student has verified these items and is not receiving points within the Blackboard Grade Center, please contact the OIT HelpDesk at (865) 974-9900 or online at help.utk.edu.

Turning Technologies continues to work on providing a similar solution for Canvas. We will be providing updates regarding the TurningPoint Cloud integration with Canvas as they are available.

 

Are you Canvas Ready?

The transition to the Canvas LMS has been met with enthusiasm from both faculty and students. Over 300 faculty in over 400 courses involving over 10,000 students have adopted Canvas for the Fall Semester. Spring 2017 course shells in Canvas will be created on or about November 11, 2016. We encourage all faculty to make the move to Canvas as soon as they are ready. If you are interested in using Canvas this spring for your class, please contact the OIT HelpDesk online or at 865-974-9900. Let us know now so that we can move your content over from Blackboard and get you Canvas Ready.

 

Blackboard and Canvas will continue to run side-by-side through May 17, 2017 when Blackboard will be retired and unavailable. Check our workshop offerings frequently as we will continue to add workshops to the schedule throughout the fall semester. Additionally, we are available for Departmental workshops, small group and individual consultations.

 

Plan now! It is not too early to get Canvas Ready!

 

Software Update: SPSS Text Analytics for Surveys by SPSS

What is it? SPSS Text Analytics for Surveys is a linguistic package designed to help you categorize open-ended survey items. Its ability to differentiate positive from negative responses is quite helpful. It is limited to around 5,000 responses, one page or less in length.

 

Where can I run it? SPSS Text Analysis for Surveysis available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs. The download and installation instructions are available at the OIT Software Download web page.

 

How can I learn it? This package is easy to learn using the manual that is included with it.

 

Where can I get support? OIT offers Minimal Support for SPSS Text Analysis for Surveys.

 

Workshops for Sept 19-23, 2016

Instructor-Focused:

·   Cloud Storage Options at UTK (Faculty / Staff Focused), Sept. 26, 10:30am - 11:30am

·   iPads and Instruction, Sept. 26, 1:00pm - 3:00pm

·   Getting to Know Canvas, Sept. 26, 2:00pm - 4:00pm

·   TurningPoint Clickers 2 (Advanced Uses), Sept. 27, 1:00pm - 3:00pm

·   Getting to Know Canvas, Sept. 28, 9:00am - 11:00am

·   Creating Accessible Documents on a Mac, Sept. 29, 1:00pm - 3:00pm

Researcher-Focused:

·   KNIME Basics, Sept. 27, 10:00am - 12:00pm

·   Data Visualization with NVivo11, Sept. 28, 3:30pm - 5:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Social Engineering

According to Verizon’s 2016 Data Breach Investigation Report, 30 percent of phishing messages were opened by their intended target, and about 12 percent of recipients went on to click the malicious attachment or link that enabled the attack to succeed. A year earlier, only 23 percent of users opened the email, which suggests that employees are getting worse at identifying phishing emails -- or the bad guys are finding more creative ways to outsmart users.

 

Reasons That the Scams Are Still Working?

  1. ‘Well it looked official’
    Official-looking emails that appear to be work related – with subject lines such as “Invoice Attached,” “Here’s the file you needed,” or “Look at this resume” -- still have employees stumped, experts say. A recent survey by Wombat Technologies found that employees were more cautious when receiving “consumer” emails regarding topics like gift card notifications, or social networking accounts, than they were with seemingly work-related emails. A subject line that read, “urgent email password change request,” had a 28 percent average click rate, according to the report.


  2. ‘You missed a voicemail!’
    Scammers have been trying to install malicious software through emails designed to look like internal voicemail service messages since 2014. Businesses often have systems set up to forward audio files and messages to employees, which is convenient but hard for users to discern as a phishing hoax.

 

  1. Free stuff
    Most people can’t resist free stuff – from pizza to event tickets to software downloads – and they’ll click on just about any link to get it, phishing experts say. Adding to the danger, many of these download sites are bundling software, and you also have to download something else that you don’t even want. You should first check to see if your organization has already licensed the software, or if it’s truly free software, then go directly to the software vendor’s website to download.


  2. Social media surfing at work
    People who surf Facebook, Twitter and a host of other social media sites can potentially open the door for cyber thieves because the scams require less work for them, and it’s also a relatively new area of awareness training for employees. Think about that ROI from the bad actors’ perspective, instead of having to send 1,000 emails to get one hit, they already know a great deal of information about you.

 

Referenced Articles:

Verizon’s 2016 Data Breach Investigation Report

(http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/)

 

Five Social engineering scams employees still fall for

(http://www.networkworld.com/article/3122472/security/five-social-engineering-scams-employees-still-fall-for.html#tk.rss_all)

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center. You can check this site to see if a suspicious email has already been reported. If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

Remember, no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password via email.

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

September 16
[ITWEEKLY] IT Weekly, September 16, 2016

 

September 16, 2016

Office 365: Microsoft Discontinuing Office for Mac 2011

Microsoft announced this week that beginning September 22, 2016, Office for Mac 2011 will cease to be available as an option for download through the Office 365 portal. Due to this change, Macintosh computers running a version of Mac OS older than 10.10 will no longer have access to Office for Mac without upgrading to a more current version of Mac OS. OIT will continue to offer Office for Mac 2011 for University-owned computers through the OIT Software Download Site. Microsoft plans to end mainstream support for Office for Mac 2011 on Oct 10, 2017.

 

Visit the OIT website for more information about Office 365 ProPlus for Staff and Faculty and the Microsoft Student Advantage programs.

 

REMINDER - IT Security Awareness Training

UT Policy “IT0123 - Security Awareness, Training, and Education” requires that each campus develop plans and procedures to ensure that staff have the opportunity to receive role-based security training. The university purchased a program that is hosted by SANS, by far the largest source for information security training and security certification in the world.

 

Earlier this year, notices went out to ALL faculty and staff at UTK instructing them on how to log in and participate. A reminder will go out in the next week to those that have not started the training. If you haven't taken your assigned training, there's still time. You can go to security.utk.edu/awareness, click on the BIG RED image at the top of the page and log in. The 2016 training will remain open until December 31, 2016.

 

The training consists of a number of videos that cover specific security topics. The videos range anywhere from 1 to 5 minutes in length and are intended to raise awareness and influence user behavior that will reduce security risks. The training allows the users to complete the training at their own pace, monitor their progress, and revisit completed training.

 

The program is hosted and maintained by SANS. Therefore, the emails that the system generates are sent automatically to UTK staff on behalf of Bob Hillhouse with a return address of “noreply@securingthehuman.org.” This has led to a number of calls to the OIT HelpDesk from staff who have been taught to question and inspect unsolicited emails where the reply-to address doesn’t “look quite right.” The emails also contain a link to a local, UTK website where users can log into the training program - security.utk.edu/awareness.

 

The training is required on an ANNUAL basis. In January 2017, the cycle will start all over again.

 

Users having questions on the validity of the training emails or having difficulty in completing the training should call the OIT HelpDesk at (865) 974-9900.

 

SharePoint 2016, Office 365 OneDrive, and MySites

Over the last few weeks, OIT  has been ramping up toward a major upgrade to SharePoint 2016.  The first step in our upgrade will be the transition from SharePoint MySites to Office 365 OneDrive.  At their inception, MySites served a key purpose by allowing students, faculty, and staff a place to collaborate and store files. This purpose is now better served by OneDrive, which offers all of the same features backed by a modern interface and wider collaboration and file sharing options. Your OneDrive is already available through your Office 365 account.   MySites that reported no activity for more than a year have been archived.  If you need to access your archived files, please contact the OIT HelpDesk.  OIT will be working with the owners of active MySites to transition to OneDrive. 

 

Stay tuned for additional information regarding the upgrade to SharePoint 2016.

 

Software Update: SPSS Statistics by SPSS, an IBM company

What is it? SPSS Statistics is the most widely used statistics package at UT. It does a broad range of statistics and graphics, and it is easy to learn and use. It is also easy to transfer data from SPSS into R or SAS to access any esoteric analyses. While most users prefer the SPSS easy-to-use GUI interface, more advanced users can take advantage of its programming language. The SPSS programming language can be used to automate repetitive tasks, to leave an audit trail of the steps you took, and to get the package to do something that it was not originally designed to do.

 

Where can I run it? SPSS is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows, Macs and Linux computers. The download and installation instructions are available at the OIT Software Download web page. It is also available on OIT’s Apps@UT server and on the computers in the OIT public computer labs. There is no simultaneous user limit for SPSS.

 

How can I learn it? OIT offers workshops on SPSS each semester, and you may schedule a one-on-one tutorial by calling the OIT HelpDesk at 974-9900. There is also an introductory tutorial available in SPSS under Help. The other help files are also very detailed and easy to learn from. The Lynda.com online training library offers free SPSS training videos to registered members.

 

Where can I get support? OIT offers Full Support for SPSS. You can request assistance from the OIT HelpDesk at 974-9900.

 

Workshops for Sept 19-23, 2016

Instructor-Focused:

·   Office 365: Overview (Faculty / Staff focused), September 19, 1:30pm - 3:30pm

·   BYOD Wirelessly with Wolfvision Cynap, September 20, 3:40pm - 4:40pm

·   Captivate 1 (Hands-On With Adobe Captivate), September 21, 1:00pm - 3:00pm

·   Creating Accessible One-Shot Videos, September 21, 1:00pm - 3:00pm

·   Getting to Know Canvas, September 22, 2:00pm - 4:00pm

·   Creating Video with a Mobile Device and SWIVL, September 23, 10:00am - 12:00pm

 

Researcher-Focused:

·   Qualtrics 1 (Web Survey Design), September 19, 10:00am - 12:00pm

·   NVivo11 Analysis Features, September 20, 10:00am - 12:00pm

·   SPSS 1 (Basics), September 20, 1:00pm - 3:00pm

·   SAS Programming Basics 1, September 20, 1:30pm - 3:30pm

·   SAS Data Analysis, September 21, 10:00am - 12:00pm

·   Using NVivo11 for Literature Reviews, September 22, 12:00pm - 1:30pm

·   Image Processing Using ImageJ, September 22, 1:30pm - 3:30pm

·   SPSS 2 (SPSS Data Analysis), September 23, 1:30pm - 3:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: What is Malware?

Malware, short for Malicious Software, is computer software that infects a legitimate computer without the owner’s approval. Computers infected with Malware are vulnerable to having all information stored on the processor stolen. Malware was originally created for experiments and pranks. However, it has led to the destruction of machines, stolen personal information and eavesdropping. Statistics have shown Malware creation is currently on the rise because of the advancements in technology and the money that can be generated through forced advertising and organized crime. Therefore, it is imperative that the proper precautions are taken to protect your computer from being infected with Malware.

 

Various factors can make computers more vulnerable to Malware attacks. The most notable are through the internet and via email. Be leery of opening email attachments from unknown or unexpected sources. Also be cautious of any website that seems suspicious by offering opportunities too good to be true.

 

Practices to help minimize risk:

 

1.      Be suspicious of any pop up stating you won a prize.

2.      Do not blindly open e-mails from people or places you do not know.

3.      Do not blindly click on links or attachments from friends.

4.      Keep your computer software updated.

5.      Be careful with whom you allow to use your computer.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  If you have concerns or questions about malware, you should contact the OIT HelpDesk at (865) 974-9900.

 

Remember, no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password via email.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

1 - 10Next