Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
July 22
[ITWEEKLY] IT Weekly, July 22, 2016

 

July 15, 2016

New Self-Classification initiative kicked off on July 18th

Beginning on July 18, 2016, faculty and staff who register UT-owned devices for use on UT’s network will be required to classify the system according to the type of information they store, view, or process on the device.  During the first phase of this initiative, we are focusing on newly registered devices.  The primary user of the computer will receive daily email reminders for up to 30 days with instructions on how to accomplish this task.  Subsequent phases of this project will begin in 2017 which will require all UT owned devices be classified.  Additional information will be provided at that time.

 

Faculty, staff, and students may notice that the network registration interface has been changed to collect additional information regarding the device that is registered.

 

If you have any questions related to this project, please contact the OIT HelpDesk.

 

Reminder: Changes to UTK Wireless coming on July 25

This summer, OIT will be reducing the number of UTK wireless networks from four to two in order to increase the throughput of the wireless network. On July 25th, the broadcasted networks for connecting to wireless will be ut-open and eduroam.

1.    UT-open: The unsecured network available to faculty, staff, students, and visitors. A new portal will be put in place to manage network registration and visitor access.

2.   Eduroam: The secure network available to faculty, staff, and students. Eduroam will replace the ut-wpa2 network and offers all of the existing functionality. In addition to wireless access at UT, faculty, staff, and students will be able to obtain Internet connectivity when visiting other participating eduroam institutions. More information about eduroam, including a list of participation institutions, is available at the eduroam website.

 

What do you need to do now?

·      If you are connected to ut-open, you will not need to take any action.

·      If you are connected to ut-wpa2, we recommend that you connect to eduroam.

The eduroam network is already available and allows secure access to services like T-Storage and the Microsoft Licensing Server. Instructions for getting connected with eduroam are available in the OIT Knowledge Base.

 

If you have any questions about this change or would like assistance connecting to eduroam, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Introduction to Canvas

As you know, UTK is transitioning from the Blackboard Learn LMS to Canvas over the course of the  next year. Blackboard and Canvas will run in parallel through May 31, 2017, when Blackboard will be retired. Canvas will be available to faculty for the Fall 2016 Semester. We are working hard to stand up the production environment, plan migration of courses, and a myriad of other tasks. 

 

If you are interested in using Canvas for Fall 2016 classes, please complete a HelpDesk Support Ticket as soon as possible. Additionally, you may wish to attend an Introduction to Canvas Workshop or drop in for an open consultation. We are also happy to schedule special group workshops by request. Keep an eye to your email and the online.utk.edu website for updates and online training opportunities.

 

You may register for any of the following opportunities at our Training/Workshop Registration page:

 

Getting to Know Canvas Workshops:

9:00am – 11:00am, Greve 520: 25, 27, 29

1:00pm – 3:00pm, Greve 520: August 8, 12

 

Open Consultations for Transition to Canvas:

9:00am – 11:00am, Greve 520: August 2, 4

 

Software Update: SAS by SAS Institute

What is it? SAS is a software suite for statistical analysis, data management and graphics. There are three major products available: the SAS System, which is the primary tool for writing SAS programs and contains the data processing and analytics engine that is at the core of most SAS products; SAS Enterprise Guide, which provides a graphics user interface to much of the power of SAS; SAS Enterprise Miner, which is used for data mining or investigating patterns in large amounts of data to create descriptive or predictive models.

 

Where can I run it? SAS is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows and Linux PCs. The download and installation instructions are on OIT's software download page. It is also available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and on the computers in the OIT public computer labs. There is no simultaneous user limit for SAS.

 

How can I learn it? OIT offers workshops each semester. You can schedule a one-on-one tutorial any time by calling the OIT HelpDesk at 974-9900. The SAS Institute support web site offers free video tutorials.

 

Where can I get support? OIT offers Full Support for SAS. You can request assistance by calling the OIT HelpDesk at 974-9900. The SAS Institute support web site also offers “support communities” where you can ask questions and it provides a comprehensive set of online manuals.

 

Workshops for July 25-29, 2016

Instructor-Focused:

·   Getting to Know Canvas, July 25, 9:00am - 11:00am

·   Adobe Captivate Interactive Practice and Assessment Templates, July 25, 1:00pm - 3:00pm

·   Getting to Know Canvas, July 27, 9:00am - 11:00am

·   Cloud Storage Options at UTK (Faculty / Staff Focused), July 28, 9:00am - 11:00am

·   iPad 3 (Make It & Take It), July 28, 10:00am - 12:00pm

·   Getting to Know Canvas, July 29, 9:00am - 11:00am

 

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Five Security Tips

This week's security awareness tip courtesy of the SANS Institute. www.sans.org:

 

1.       If you don't understand the warning message, say NO and consult the OIT HelpDesk at (865) 974-9900. It's easier to go back and say yes if you need to than be sorry and have to rebuild your machine.

2.      Certificates: If you don't understand a website certificate message, say NO and consult the HelpDesk at (865) 974-9900. It is easier to go back and say yes if you need to than be sorry and have to rebuild your credit.

3.      Antivirus: Running antivirus does not slow your computer down nearly as much as a virus does.

4.      Back-up: Backing up your data may seem like a waste of time — until you spill coffee all over your laptop.

5.      Passwords: Writing down your password around your desk is about as secure as leaving a $20 bill lying on the dashboard of your car. How well do you trust anyone these days?

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 15
[ITWEEKLY] IT Weekly, July 15, 2016

 

July 15, 2016

Adobe Products are Available

In May 2016, UT signed a new contract with Adobe for Creative Cloud, Captivate, and Presenter. The new contract licensing for Creative Cloud is based on specific, named users, and requires UT to assign licenses to a specific employee for all products.

 

Benefits of the named license for Creative Cloud include the ability for the employee to use the software on 2 different computers, one of which may be a home computer. This benefit is not available for Captivate or Presenter. Departments may also purchase licenses for use by their student employees engaged in departmental (non-academic) work.

 

Departments who support a student computer lab or a staff training lab may get a packaged version of Creative Cloud for the cost of one license per machine. Note that dual boot machines will require a license for both operating systems.

 

UT Knoxville departments may purchase licenses for Creative Cloud, Captivate, and Presenter through VolTech. If you purchased Adobe Acrobat DC, Creative Cloud DC, Captivate, or Presenter under the former contract and still have need of this software, please contact VolTech to purchase a new license. Installations made under the former contract need to be removed from all university computers.

 

Additional information, including pricing and download/installation instructions, is available at oit.utk.edu/adobe. If you are with another campus or unit, such as UT System Administration, Institute of Agriculture, Institute for Public Service, Health Science Center, Chattanooga, or Martin, please check with your respective Chief Information Officer for additional information regarding the distribution of Adobe products

 

If you have any questions, please contact the OIT HelpDesk at (865) 974-9900 or help.utk.edu.

 

Clicker Swap

Turning Technologies, UTK’s vendor for personal response systems (clickers), is upgrading for Fall 2016. All ResponseCard XR or ResponseCard NXT devices can be exchanged for a QT or QT2 clicker. Students will also receive a $10 voucher towards the purchase of a 1 or 4-year bundle at the UTK Volshop store. The bundle includes a New QT2 device, ResponseWare license, and $20.99 mail-in rebate.

 

The Clicker Swap will be held weekdays from Tuesday, Aug. 16 - Wednesday, Aug. 24, 2016, from 8:30 AM – 4: 30 PM at the Student Union, G3, near VolBooks.

 

If students have a QT device, and need to purchase a bundle or Turning Account, they are also eligible for the mail-in rebate. All faculty and students using clickers need to create a Turning Account. For more information, visit OIT’s website or contact the OIT HelpDesk.

 

Software Update: R by the R Core Team (open source)

What is it? R is a free, open source software environment for statistical computing, data management and graphics. While all of its features can be controlled by its programming language, several user interfaces exist that make it easy for non-programmers to use. It is very extensible and supports a wide range of methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.

 

Where can I run it? Being free, you can install R on any Linux, Mac or Windows computer. R is available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and on the computers in the OIT public labs. There is no simultaneous user limit for R.

 

How can I learn it? OIT offers workshops each semester and there are a set of two-minute tutorials at the “twotorials” web site. The main R web site lists addresses for support “mailing lists” and manuals.

 

Where can I get support? OIT offers Full Support for R. The best web site to ask questions or look up answers regarding R programming is Stack Overflow. The best place to ask questions or look up answers regarding statistical analysis in R is Cross Validated. You can request assistance by calling the OIT HelpDesk at 974-9900. 

 

Workshops for July 18-22, 2016

Instructor-Focused:

·   Creating Accessible Word, PPT, and PDF Files Using Office 2013, July 22, 9:00am - 11:00am

Researcher-Focused:

·   Introduction to SQLite Database, July 18, 12:00pm - 1:30pm

 

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Mobile Apps

The good thing about mobile applications is that they’re easy to obtain and easy to install. The bad thing about mobile applications is that they’re easy to obtain and easy to install. With this convenience comes great responsibility. Users should be aware that these applications may be giving up more of their personal information than they would like.

 

For example, take the recent “Pokémon Go” craze that hit the American market in the past few weeks. There have been so many downloads of this application that it has boosted Nintendo’s market value by $9 billion (and counting)! As millions of users wander the country collecting Pikachus and Jigglypuffs, the company that developed the application, Niantic, Inc. was collecting information about the collectors.

 

Like most apps that work with the GPS in your smartphone, Pokémon Go can tell a lot of things about you based on your movement as you play: where you go, when you went there, how you got there, how long you stayed, and who else was there. And, like many developers who build those apps, Niantic keeps that information. According to the Pokémon Go privacy policy, Niantic may collect — among other things — your email address, IP address, the web page you were using before logging into Pokémon Go, your username, and your location. And if you use your Google account for sign-in and use an iOS device, unless you specifically revoke it, Niantic has access to your entire Google account. That means Niantic could have read and write access to your email, Google Drive docs, and more. (It also means that if the Niantic servers are hacked, whoever hacked the servers would potentially have access to your entire Google account. This is especially worrisome if you have used your UTK Google Account credentials!

 

Take a breath. There’s some good news in all this. Once the complaints started rolling in that the Pokémon GO account creation process on iOS erroneously requested full access permission for the user’s Google account, Niantic started working on a fix for the problem. Google verified that, to-date, no other account information has been accessed or collected. Additionally, Google will soon reduce the game’s permissions to only the basic profile that it needs. You don’t have to do anything.

 

The lesson here is that you need to become aware of what information is being collected by the applications you install on your mobile devices. They have become so powerful and so ubiquitous, that it’s easy to forget that you also “do work” and store personal information on these devices. You could be giving that information away inadvertently. The best way to find out what information is being collected and how your information is being used is to read the privacy statement on the developer’s website. Another location would be in the End User License Agreement. Remember? It’s that EULA that most folks don’t read, hurriedly clicking on, “I accept” just to get to the game. As painful as reading those documents can be, it is the best way to understand the scope of data that is being collected and in some cases, shared with other third-party applications.

 

Happy hunting.

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 08
[ITWEEKLY] IT Weekly, July 8, 2016

 

 

July 8, 2016

NEW: Secure Online Testing and Virtual Proctoring

Want a quick and effective way to secure your online exams, increase student accountability, and reduce potential cheating? Need a way to monitor your students test taking activity in online courses? Respondus LockDown Browser (LDB) and Respondus Monitor are now available to faculty and students at no additional cost based our recently purchased site license. Respondus LockDown Browser is a tool in Blackboard and Canvas that locks down the testing environment to prevent students from browsing to other sites during an exam. In addition, when students use the LDB they are unable to print, copy, go to another URL, or access any other applications on their personal computer. For more information related to the Respondus LDB, please review this web page

 

Respondus Monitor is a tool that will allow for proctored, or supervised, online exams. Monitor can help ensure exam integrity for student taking test online outside of a testing center. Monitor is an option that can be used in conjunction with Respondus LDB. Take a quick look at the capabilities of Respondus Monitor by watching this short video. For more information related to Respondus Monitor, please review this web page.

 

As always, if you need additional assistance, consultation, or training with either Respondus product, contact the OIT HelpDesk online or call (865) 974-9900.

 

Reminder: Changes to UTK Wireless

This summer, OIT will be reducing the number of UTK wireless networks from four to two in order to increase the throughput of the wireless network. On July 25th, the broadcasted networks for connecting to wireless will be ut-open and eduroam.

 

1.       UT-open: The unsecured network available to faculty, staff, students, and visitors. A new portal will be put in place to manage network registration and visitor access.

2.      Eduroam: The secure network available to faculty, staff, and students. Eduroam will replace the ut-wpa2 network and offers all of the existing functionality. In addition to wireless access at UT, faculty, staff, and students will be able to obtain Internet connectivity when visiting other participating eduroam institutions. More information about eduroam, including a list of participation institutions, is available at the eduroam website.

 

Coming Soon: Upgrades to Building Access

One of the many improvements occurring across the UTK campus includes the implementation of a new building access management system called Gallagher. This system will replace an aging access and alarm system with a more robust and comprehensive solution.

 

Over the next several months, Facilities Services, the UT Police Department, Volcard, and the Office of Information Technology will be working together to complete the transition to the Gallagher system. This transition includes replacing current card readers within each building with new, card readers, replacing individual’s access cards, and reviewing the list of individuals who have access to each building to ensure only the appropriate people have access to controlled areas.

 

The project team will work with the appropriate building owner to prepare for each building’s transition.

 

If you have any questions about this upgrade, please contact the OIT HelpDesk at (865) 974-9900 or online at help.utk.edu.

 

Help Us Improve OIT’s Websites!

Which OIT sites are most important to you? Why do you visit, and which tasks do you think should be easier? Take our 5-10 minute survey to let us know.

 

The survey will be open through Friday, July 15. Please email Susannah Finley (sfinley@utk.edu) with any questions. We appreciate your feedback!

 

Software Update: Qualtrics Research Suite

What is it? Qualtrics Research Suite, a powerful online survey research tool, is available to all faculty, staff and students at UTC, UTK and UTM. Once you create your Qualtrics account, you will be able to design simple to complex surveys in a web browser, distribute the survey, run frequencies as it continues to collect data and then download your data. For in depth analysis, you can export your data to an SPSS, CSV, TXT or Excel file. A basic account is available to all faculty, staff and students for university related work such as academic research projects (instructional or academic) and administrative purposes.

 

Where can I run it? Qualtrics is a cloud based service. To create a new account or login to an existing account, use our web surveys page.

 

How can I learn it? For UTK, OIT offers workshops on Qualtrics each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 974-9900. Qualtrics also provides a variety of training materials on their support page.

 

Where can I get support? OIT offers Full Support for Qualtrics. For assistance, contact the OIT HelpDesk at 974-9900.

 

Workshops for July 11-15, 2016

Instructor-Focused:

·   Getting to Know Canvas, July 11, 1:00pm - 3:00pm

·   Getting to Know Canvas, July 13, 1:00pm - 3:00pm

·   Prezi for Faculty 1 (Basics), July 14, 3:00pm - 4:30pm

·   Open Consultations for Transition to Canvas, July 15, 1:00pm - 3:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Peopleware

A landmark study was released in 2007 that helped confirm conventional wisdom about the large number of re-used passwords and the poor quality of user passwords. The study looked at the password usage habits of over 500,000 users. What the study found is that the average user used an average of 7 passwords/week. The study showed that those passwords were shared with an average of 25 sites! If a user is using the same password on Facebook as they use for the NETID login, which is the same for their Gmail AND their banking passwords, it is immediately evident that there’s a perfect storm coming. The study also contains information on successful phishing attempts. The data indicates that something on the order of .4% of the population falls victim to a phishing attack each year. Remember that this study was performed in 2007. Social networking has grown; mobile devices have multiplied like rabbits, and every site wants a login and a password and the phishermen are out in force.

 

The news is full of stories of high-profile individuals whose accounts are compromised. Their phones are erased; their email accounts are emptied; their photos are GONE. The vulnerabilities aren’t technical – they’re human. Whether it’s a phishing attempt that lands the user or a “guessed”-password that unlocks multiple accounts, the technology is working as it should. We can add more layers of technology such as multi-factor authentication (bio-metrics, tokens, voice recognition) but in the end, it’s the “peopleware” that we have to keep patched.

 

Peopleware is the term used to describe the interaction a person has with technology, and it’s time to update your peopleware! The latest version doesn’t allow clicks on embedded links in unsolicited emails. However, there are still bugs that haven’t been addressed. Be diligent in your password creation and its reuse.

 

If you’re one of those .4% of the population that clicked on a link that “looked okay” and you suspect your UT credentials have been compromised, please notify the OIT HelpDesk immediately at 865-974-9900.

Title: Dividing line graphic 

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 01
[ITWEEKLY] IT Weekly, July 1, 2016

 

July 1, 2016

Security Awareness Training!

On July 5, 2016, the UTK Information Security Office (ISO) will be enabling the campus information security awareness training program called “Securing the Human.” Securing the Human is an online computer-based program that provides faculty and staff with information they need to engage in effective information security behavior.

 

The Office of Information Technology, by way of SANS, will be sending an email to all UTK faculty and staff containing the link to the UTK security training web page – security.utk.edu/awareness. The email will come from noreply@securingthehuman.org. If you have Clutter enabled on your Office365 Email account, there’s a chance that the email will end up in the Clutter Folder. All participates must complete the information security awareness training, as awareness is an integral part of protecting the University’s resources.

 

The Security Awareness program consists of a number of videos that cover specific security topics. The videos range anywhere from 1 to 5 minutes in length and are intended to influence user behavior that will reduce security risks. Users are allowed to complete the training at their own pace, monitor their progress, and revisit completed training. Upon completion, the user will receive a security awareness training certificate. For more information about this program, visit the Securing the Human website (http://www.securingthehuman.org).

 

If you do not receive a training email, check your Clutter, Junk or Spam folders in your email client. For questions regarding your personalized security awareness training, please contact the OIT HelpDesk at (865) 974-9900.

 

Coming Soon: Changes to Network Registration

As previously announced in IT Weekly, OIT will be modifying the network registration process to comply with UT Policy IT0115, which requires all UT owned devices be classified according to the type of data they store or process. During the first phase of this initiative, we will focus on the newly registered devices. The primary user of the computer will receive daily email reminders for up to 30 days with instructions on how to accomplish this task. Subsequent phases of this project will begin in 2017 which will require all UT owned devices be classified. Additional information will be provided at that time.

 

Faculty, staff, and students may notice that the network registration interface has been changed to collect additional information.

 

If you have any questions, please contact the OIT HelpDesk at (865) 974-9900.

 

Help Us Improve OIT’s Websites!

Which OIT sites are most important to you? Why do you visit, and which tasks do you think should be easier? Take our 5-10 minute survey to let us know.

 

The survey will be open through Friday, July 15. Please email Susannah Finley (sfinley@utk.edu) with any questions. We appreciate your feedback!

 

Software Update: QDA Miner by Provalis Research, Inc.

What is it? QDA Miner is a software package that aids in the qualitative analysis of text or images. In addition to purely qualitative functions like creating and applying coding structures, QDA Miner also provides more numerical functions such as analysis of coding co-occurrences and analyzing coding by other variables such as age or gender.

 

Where can I run it? QDA Miner is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs. The download and installation instructions are at OIT's software download page. For UTK, QDA Miner is also available on OIT’s Apps@UT server and on the computers in the OIT public computer labs. There is no simultaneous user limit for QDA Miner.

 

How can I learn it? For UTK, OIT offers workshops on QDA Miner each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 974-9900. Tutorials are also available on QDA Miner's tutorial website.

 

Where can I get support? OIT offers Full Support for this software. For assistance, contact the OIT HelpDesk at 974-9900.

 

Anything else I need to know? A trial version of QDA Miner is available for download here. A license file can be downloaded from the OIT's software download page, which turns the evaluation software into a fully licensed copy.

 

Workshops for July 5-8, 2016

Instructor-Focused:

·   Getting to Know Canvas, July 5, 9:00am - 11:00am

·   Captivate 1 (Hands-On With Adobe Captivate), July 6, 9:00am - 11:00am

·   Getting to Know Canvas, July 7, 9:00am - 11:00am

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: A Clean Desk

Clearing your desk before you leave or before you’re away from the office for a few days can greatly protect paper documents that contain sensitive information related to our work. So what does this have to do with security? Besides just looking tidy, clearing your desk reduces the threat of a security incident, as confidential information will be locked away when unattended. Sensitive documents left in the open can be stolen by a malicious entity.

 

At the end of the working day, put away all office papers. At a very minimum, place sensitive documents in a drawer, away from prying eyes. If you are unsure of whether a duplicate piece of sensitive documentation should be kept - it will probably be better to shred it or place it in the shred bin designated for sensitive information. Some scan documents and store them in protected or encrypted areas on T-Storage.

 

Lock away portable computing devices such as laptops or PDA devices. Treat mass storage devices such as CDROM, DVD or USB drives as sensitive and secure them in a locked drawer.

 

We’re always so conscious about cyber-security that we forget “physical” security. All of the technical safeguards in the world won’t protect a spreadsheet of sensitive data, printed out for review and left lying on the desk for weeks on end. If possible, locking your desk or filing cabinets go a long way in protecting the university’s information. This seems like a simple thing but physical security is so often neglected.

 

The idea extends to home as well. If you’re finished with sensitive personal documents (checkbooks?), place them in a secure place or out of eyesight when you’re done with them or until you need them. Consider purchasing a small lock-box to store those documents until you can get them to the safety deposit box. Scanners are affordable. Scanning old bills or correspondence with sensitive information and disposing of the original (shredders are cheap too!) is good practice.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

June 24
[ITWEEKLY] IT Weekly, June 24, 2016

Title: OIT IT Weekly Banner

June 24, 2016

Introduction to Canvas

As you know, UTK is transitioning from the Blackboard Learn LMS to Canvas over the course of the  next year. Blackboard and Canvas will run in parallel through May 31, 2017, when Blackboard will be retired. Canvas will be available to faculty for the Fall 2016 Semester. We are working hard to stand up the production environment, plan migration of courses, and a myriad of other tasks. 

 

If you are interested in using Canvas for Fall 2016 classes, please complete a Helpdesk Support Ticket as soon as possible. Additionally, you may wish to attend an Introduction to Canvas Workshop or drop in for an open consultation. We are also happy to schedule special  group workshops by request. Keep an eye to your email and the Online.utk.edu website for updates and online training opportunities.

 

You may register for any of the following opportunities at our Training/Workshop Registration page:

 

Getting to Know Canvas Workshops:

9:00am – 11:00am, Greve 520: July 1, 5, 7, 25, 27, 29

1:00pm – 3:00pm, Greve 520: July 11, 13, 15, 19, 21 and August 8, 10, 12

 

Open Consultations for Transition to Canvas:

9:00am – 11:00am, Greve 520: August 2 and 4

 

Mobile Printing Now Available

OIT is happy to announce that student printing on the UTK campus is now more convenient and easier than ever to use. Thanks to an upgrade of the VolPrint system and the addition of a mobile printing module, students may now print from not only their own personal laptops, but also from their tablets, iPads and smartphones. Students have been asking for this convenience and we are happy to announce it is now available and ready for their use.

 

Utilizing money loaded on their UTK VolCard accounts, students can print from virtually anywhere to any VolPrint printer. VolPrint printers are located in many convenient locations across campus including the OIT labs as well as other departmental areas. Full instructions for using mobile printing, as well as other VolPrint information, can be found at Printing on campus. Please contact the OIT HelpDesk at (865) 974-9900 for any additional questions.

 

Software Update: Origin Pro by OriginLab Corporation

What is it? Origin Pro is graphing and data analysis software that provides a comprehensive solution for scientists and engineers who need to analyze, graph and professionally present data. Origin Pro's point-and-click interface allows you to start using it quickly, yet its wide range of advanced features provides for your growing needs.

 

Where can I run it? For UTK, Origin Pro is available on Apps@UT and the computers in the OIT public computer labs. The simultaneous user limit for Origin Pro is five. 

 

How can I learn it? Origin's online documentation at is an excellent source of information including the User Guide, Tutorials, Quick Help on specific topics, programming examples and reference information. The Video Tutorials page has many great Origin software videos. Plus, OriginLab provides free, live training webinars that teach you how to perform various tasks in Origin Pro.

 

Where can I get support? For UTK, OIT offers Minimal Support for Origin Pro. Free technical support from Originlab is included with UTK's Maintenance Package. OriginLab provides four ways for you to contact their technical support representatives: (1) call 1-800-969-7720 and select Option 6, Monday through Friday from 8:30AM to 6PM EST; (2) use the Online Chat option available through the company website; (3) send email to their tech support email address tech@originlab.com or (4) select Support on the main web page for links to the additional support resources, such as the Technical Support FAQ, the User Forums and the File Exchange that provides a venue for sharing files and custom applications with other users.

 

Workshops for June 27 – July 1, 2016

Instructor-Focused:

·   Getting to Know Canvas, June 27, 9:00am - 11:00am

·   Improving Your Web Pages' Visibility in Search Engine Results, June 27, 12:00pm - 1:30pm

·   Using Skype for Business for Online Office Hours, June 28, 9:00am - 11:00am

·   Camtasia for Windows 1, June 28, 1:00pm - 3:00pm

·   Open Consultations for Transition to Canvas, June 29, 9:00am - 11:00am

·   iPad 2 (Mobile Learning for the Classroom), June 29, 10:00am - 12:00pm

·   Getting to Know Canvas, July 1, 9:00am - 11:00am

 

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

October: National Cyber Security Awareness Month (NCSAM)

Recognizing its 13th year, NCSAM is a collaborative effort between the U.S. Department of Homeland Security (DHS) and its public and private partners, including the National Cyber Security Alliance, to raise awareness about the importance of cybersecurity and individual cyber hygiene.

 

NCSAM 2016 Themes:

 

Each week in October is dedicated to a specific cybersecurity theme with corresponding messaging. The themes listed below offer the opportunity for government and industry to get involved in cybersecurity activities most relevant to them. To engage Americans across the Nation, key events will be coordinated in geographically diverse locations. We encourage you to align your NCSAM plans to the following weekly themes:

 

Week 1:   October 3-7, 2016 – Topic: Every Day Steps Towards Online Safety with Stop.Think.Connect.™.

Week 2:  October 10-14, 2016 – Topic: Cyber from the Break Room to the Board Room

Week 3:  October 17-21, 2016 – Topic: Recognizing and Combatting Cybercrime

Week 4:  October 24-28, 2016 –Topic: Our Continuously Connected Lives:
What’s Your ‘App’-titude?

Week 5:  October 31, 2016 – Topic: Building Resilience in Critical Infrastructure

 

The hashtag for NCSAM will be #CyberAware – we encourage you to use this both before and during the month of October to promote your organization’s involvement in raising cybersecurity awareness.

 

For more information, please contact the Stop.Think.Connect.™ Campaign.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

 

June 17
[ITWEEKLY] IT Weekly

Title: OIT IT Weekly Banner

June 17, 2016

Reminder: Changes to UTK Wireless

This summer, OIT will be reducing the number of UTK wireless networks from four to two in order to increase the throughput of the wireless network. On July 25th, the broadcasted networks for connecting to wireless will be ut-open and eduroam.

1.    UT-open: The unsecured network available to faculty, staff, students, and visitors. A new portal will be put in place to manage network registration and visitor access.

2.   Eduroam: The secure network available to faculty, staff, and students. Eduroam will replace the ut-wpa2 network and offers all of the existing functionality. In addition to wireless access at UT, faculty, staff, and students will be able to obtain Internet connectivity when visiting other participating eduroam institutions. More information about eduroam, including a list of participation institutions, is available at the eduroam website.

 

What do you need to do now?

·   If you are connected to ut-open, you will not need to take any action.

·   If you are connected to ut-wpa2, we recommend that you connect to eduroam. The eduroam network is already available and allows secure access to services like T-Storage and the Microsoft Licensing Server. Instructions for getting connected with eduroam are available in the OIT Knowledge Base.

 

If you have any questions about this change or would like assistance connecting to eduroam, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Self-Classification

Beginning in July 2016, faculty and staff who register UT-owned devices on the UT Network will be required to classify the system according to the type of information they store or process on the device.

 

Why?

1.    We have to - UT Policy IT0115 requires users to identify and document information types stored or processed by each information system. The policy further requires that each campus must develop or adopt and adhere to a formal documented program for categorizing information.

2.   We ought to - Threats to our data (your data) grow every day. Victims of Phishing emails, Drive-By-Downloads from compromised websites, or BRUTE force attacks to our systems all contribute to leak sensitive information to unauthorized users. We all are stewards of the university’s data and the first layer of defense.

3.   In order to protect our data (your data), we must first identify where it “lives” and take measures to protect it.

 

How?

1.    Require users to identify the type of information they store or process on the UT-Owned device they operate at the time of registration.

2.   Require users to re-classify the device on an annual basis or whenever the type of information they process changes.

 

What?

1.    The implementation of an online system where primary users for newly registered devices will have 30-days to classify their device by selecting the type of information they process or store (e.g. Academic Data, Financial Data, Research Data, or General Identification information)

2.   Under the new process, the primary user of a device will receive an email reminder every day for 30-days or until the device is classified.

3.   Under the new process, users will receive an email reminder prior to the annual re-classification date (one-year after registration).

4.   All UT-Owned systems must be classified by the primary user of the device. Failure to classify a UT-owned system will result loss of network access for the device, requiring the user to register the device again.

5.   Beginning in January 2017, OIT will programmatically phase-in the legacy systems that were registered prior to July 15, 2016.

 

Questions regarding data-classification should be directed to the OIT HelpDesk at (865) 974-9900.

 

Software Update: NVivo by QSR International

What is it? NVivo is a qualitative analysis software package that supports both qualitative and mixed methods research. It lets you collect, organize, and analyze content from interviews, focus groups, discussions, surveys, documents, audio and visual files, images, social media data, web pages, and spreadsheets. It also offers multiple ways to visualize and report data, including graphs, charts and cluster analysis. Within the program, one can search and all or parts of data, sort data based on variable attributes or classifications and display a matrix of codes or coding structures. Video and Audio files can be transcribed and analyzed within the program. It also interfaces with EndNote, Mendeley, and Zotero for conducting a paperless literature review.

 

Where can I run it? NVivo is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs and Macs. The download and installation instructions are at OIT's software download page. For UTK, NVivo is also available on OIT’s Apps@UT server.

 

How can I learn it? For UTK, OIT offers workshopson NVivo each semester, and you can schedule a one-on-one tutorial any time by calling the OIT HelpDesk at 974-9900. You can also visit NVivo’s Support page or watch tutorials from QSR International’s YouTube channel.

 

Where can I get support? OIT offers Full Support for NVivo. For assistance, contact the OIT HelpDesk at 974-9900.

 

Workshops for June 20-24, 2016

Instructor-Focused:

·   Implementing the UTK Search Engine in Your Website, June 20, 12:00pm - 1:30pm

·   Creating Accessible Word, PowerPoint, and PDF Files on a Mac, June 20, 1:30pm - 4:00pm

·   Getting to Know Canvas, June 21, 1:00pm - 3:00pm

·   Creating Accessible Word, PowerPoint, and PDF Files on a Mac, June 23, 9:00am - 11:30am

·   Getting to Know Canvas, June 23, 1:00pm - 3:00pm

Researcher-Focused:

·   SPSS 2 (SPSS Data Analysis), June 22, 2:00pm - 4:00pm

SharePoint:

·   SharePoint Lists (Manage Projects and Organize Processes), June 20, 1:30pm - 3:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Ransomware

Regardless of the name, Cryptolocker, Cryptowall, or CryptoDefense, the principle is the same. These are malicious software (MALWARE) that encrypt files on your system’s hard drive using an unbreakable key which may be decrypted by the attacker once a ransom is paid, typically by online currency, such as Bitcoin.

 

Most ransomware is delivered via email, typically as shipping notices from delivery companies. These types of emails are getting better, looking more and more legitimate with near-perfect language. Ransomware is also delivered via drive-by-download attacks on compromised websites. Just by visiting an infected website, you can pickup ransomware.

 

The most common defense against ransomware is a backup of your device. In order to be most effective, a backup should be “serialized,” with older versions of files available in case newer versions have been corrupted or encrypted. There are automated backups that come native on Windows or on Apple computers but they require that you configure them, allowing more frequent backups. OIT also provides backup and recovery services for filesystems and databases. To find out more about purchasing these services, call the OIT HelpDesk at (865)974-9900.

 

It’s always a good idea to keep the systems on your devices patched and up-to-date with the most current versions as attackers prey on vulnerable systems.

 

Ransomware is real. CryptoWall alone generated over $325 Million for its developer in 2015. The average ransom, paid in Bitcoin, is typically between $200 and $10,000. It’s also a moving target with variations being deployed constantly. Save your data, back it up AND by all means, TEST your ability to recover your data. It is your best defense.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

June 10
[ITWEEKLY] IT Weekly, June 10, 2016

Title: OIT IT Weekly Banner

June 10, 2016

Upcoming Changes to www.utk.edu

The Office of Communications and Marketing will be launching the new www.utk.edu website in the coming weeks. (You may have already seen email sent to the CAMPCOMM mailing list regarding this initiative.)

 

If you are using the 2007 or 2012 templates and have not already taken action to prepare for this change, your website may not load images, javascript, or stylesheets. If you are currently referencing an asset on www.utk.edu in your website’s HTML or CSS, you should update all of those references to point to “images.utk.edu”.

 

For example: Change your reference from “http://www.utk.edu/stylesheets/templates/stylesheets/oldbrowsers.css” to “http://images.utk.edu/stylesheets/templates/stylesheets/oldbrowsers.css”

 

If you are using the current 2015-16 website template, or if you host a WordPress site through the Office of Communications & Marketing, you will not be affected by this change.

 

If you have any questions regarding this change, please contact the Office of Communciations and Marketing at 865-974-0765 or webteam@utk.edu.

 

Adobe Contract Update

Our contract with Adobe was signed on May 20, 2016 and OIT is actively working on the new packages and distribution methods for Creative Cloud, Captivate, and Presenter. The grace period with the old version continues while we prepare the new versions for deployment. Detailed below are the options for software under the new contract. We expect access to the software to be available on July 11, 2016. However, orders for the UT Knoxville campus can be made through VolTech now.

 

In our new contract, Adobe has changed how the software is licensed. We no longer have a site license for Acrobat DC and Creative Cloud for all institutional machines. We are unable to split out Acrobat DC into a separate purchase. If you need Acrobat DC, you will need to purchase the Creative Cloud suite. Individuals who purchase Creative Cloud will be assigned named licenses and can install the software on two computers; one must be an institutional machine. Once available, individual copies will be distributed through Adobe’s online portal. Users will be able to pick and choose which applications can be installed on their computer. A named license for Creative Cloud may be purchased through VolTech for $50/year.*

 

We will also be offering a packaged version Captivate and Presenter for faculty & staff. Automatic software updates do not work Captivate and Presenter, however, OIT will repackage these versions a minimum of twice a year to update the software. Captivate and Presenter are $349/computer/year and $149/computer/year, respectively.*

 

*All prices are valid for UT Knoxville departmental purchases between now and June 30, 2017. Purchases made using this cost structure before July 1, 2016 will be grandfathered in for the first year of the Adobe agreement. If you are with the UT System, Institute of Agriculture or the Institute for Public Service, please check with your respective Chief Information Officer for additional information.

 

*All prices are valid for UT Knoxville departmental purchases between now and June 30, 2017. Purchases made using this cost structure before July 1, 2016 will be grandfathered in for the first year of the Adobe agreement. If you are with the UT System, Institute of Agriculture or the Institute for Public Service, please check with your respective Chief Information Officer for additional information.

 

If you have any questions, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Software Update: Mplus by Muthén & Muthén

What is it? Mplus analyzes Structural Equations Models (SEM) that can include both continuous and categorical latent constructs. As their web site states, it can also analyze "both cross-sectional and longitudinal data, single-level and multi-level data, and data that come from different populations with either observed or unobserved heterogeneity. Analyses can be carried out for observed variables that are continuous, censored, binary, ordered categorical (ordinal), unordered categorical (nominal), counts, or combinations of these variable types."

 

Where can I run it? For UTK, Mplus is available on OIT’s Apps@UT server and on the computers in the OIT public computer labs. There four people can run it at the same time.

 

How can I learn it? There are short courses at the Muthén & Muthén web site, and general SEM information is at SEMNET . To learn Mplus, we also recommend the program's help files.

 

Where can I get support? OIT offers Minimal Support for this software.

 

Workshops for June 13-17, 2016

Instructor-Focused:

·   Open Consultations for Transition to Canvas, June 17 (Fri), 1:00pm - 3:00pm

Researcher-Focused:

·   Qualtrics Web Survey Design 1, June 14 (Tue), 10:00am - 12:00pm

·   Introduction to NVivo, June 15 (Wed), 1:30pm - 3:30pm

·   Introduction to NVivo, June 16 (Thu), 1:30pm - 3:30pm

·   Using Data Analysis Features of NVivo, June 17 (Fri), 10:00am - 12:00pm

·         

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Compromised Workstations

Is your workstation or laptop running “slow”? Does it take FOREVER for an application to start? Do you come in after being away from your desk to often find that your computer has restarted, displaying some sort of cryptic message about a problem? Your machine may be compromised or infected.

 

Security incidents come in all varieties. We are constantly under attack through web applications, emails, infected media (even new ones, fresh out of the package). It’s important that you report any of the symptoms like the ones listed above to your departmental IT staff or to the OIT HelpDesk. It’s especially important if you routinely work with or have access to sensitive information like social security numbers, credit cards, or student information. Federal Law may require that the compromised information be reported.

 

So…you don’t work with sensitive information or have access to any of the above? You should still let your departmental IT person know about the peculiar behavior or call the OIT HelpDesk for guidance. Remember that we are all at risk when a device or a NetID is compromised.

 

If it looks like a duck; walks like a duck; sounds like a duck – it just might be a compromised machine.

 

What do you do? Let someone know! Don’t turn your computer off (if you can avoid it). Departmental IT: Don’t just “slick” the drive and rebuild the machine. Crucial information about the compromise could be lost. Don’t rebuild a machine until you’re instructed to do so. Keep your devices patched to the latest versions and keep your anti-virus up-to-date. UT Policy IT0110 requires that ALL UT-Owned devices MUST be running the latest, supported operating system and be patched. Exceptions must be approved by the Chief Information Officer.

 

For guidance, call the OIT HelpDesk at (865) 974-9900.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

June 03
[ITWEEKLY] IT Weekly, June 3, 2016

Title: OIT IT Weekly Banner

June 6, 2016

Changing Campus Landscape affects Cellular Coverage

As new buildings are erected on campus, some have noticed that the signal bars on their wireless devices have decreased. While the campus is surrounded by cellular towers, as new buildings go up, the signals from the towers can be blocked in certain areas. For example, the carriers have a large tower presence in the CSX rail yard on the west end of campus. As the new Stokely residence hall was raised, users on the east side of the building noticed a significant drop in service. This is due to the energy efficient way the new buildings on campus are constructed and the sheer size of the structures themselves. The more energy efficient the buildings are, the less wireless signals can penetrate the building. When construction has concluded, OIT will be working with the carriers to conduct a study of on-campus signal strength to determine future steps. In the meantime, if your carrier offers a WiFi-calling feature, you may want to activate it and join the UTK wireless network to better enhance your cellular capability. Contact your carrier for a complete list of supported devices, but below are a few from the three major carriers in this area.

 

Verizon offers the service but only if their signal is unavailable. The devices on their network that support the feature are:

·   Apple iPhone 6, 6 Plus, 6s, 6s Plus, SE

·   HTC10, LG- G4 & G5,

·   Samsung Note 5,

·   S6 Edge, S& & S7 Edge

 

AT&T offers the service and will handoff conversations between WiFi and cellular. The devices on their network that support the feature are:

·   Apple iPhone 6, 6Plus, 6S, 6S Plus, SE

 

Sprint offers the service but will not hand off between cellular and WiFi. At this time we do not have a complete list of Devices but All Apple iPhone 6 and above are supported and we believe most Android devices are supported.

 

Below is a map showing the cellular towers that the majority of the carriers use primarily to serve campus.

 

If you need help getting your cell phone connected to UT’s wireless network, contact the OIT HelpDesk at (865) 974-9900.  If you have questions regarding your phone’s or carrier’s capabilities, please contact your carrier

 

 

 

 

Open Source KNIME Now Available on Apps@UT Server

KNIME (pronounced “nime”) is a free and open source data science tool that is easy to learn and use. Each step in an analysis is represented by icons that you drag onto a diagramming surface. The order of the steps is determined by arrows that show the flow of data or models from icon to icon. You can reuse analyses on new data sets simply by pointing the data import icons to the new data and telling KNIME to execute the entire workflow again. KNIME is also available for Windows, Mac, and Linux from KNIME.org.

 

Software Update: MATLAB and Simulink

What is it? MATLAB and Simulink by Mathworks, Inc. are computational software environments used to perform a variety of computational tasks such as in engineering, science, mathematics, statistics and finance. The UT system-wide Total Academic Headcount (TAH) license includes MATLAB, Simulink and more than 50 add-on products called Toolboxes. The Toolboxes are collections of functions for solving particular classes of problems, such as signal processing, image processing, control systems, curve fitting, etc. Simulink and the Toolboxes require MATLAB.

 

Where can I run it? The MATLAB products are available at no additional charge to faculty, staff and students at UTK, UTSI, UTHSC and UTC for installation on university-owned and personally-owned Windows, Mac and Linux computers. The download and installation instructions are on the OIT software download site. For UTK, the MATLAB products are also available on OIT’s Apps@UT server, the Newton Linux Cluster and on the computers in the OIT public computer labs. There is no simultaneous user limit for the MATLAB products.

 

How can I learn it? For UTK, OIT offers MATLAB workshops each semester. You can also learn Matlab from Mathworks videos and webinars and on Lynda.com from OIT’s online training library. Manuals for all products are online at the Mathwork help site. MATLAB and Simulink tutorials are online at the Mathworks support site.

 

Where can I get support? OIT offers Full Support for MATLAB. For assistance, contact the OIT HelpDesk at 974-9900. For free online and telephone support with the MathWorks Support team, or call (508) 647-7000 from 8:30am – 10:00pm EST, Monday – Friday.

 

Workshops for June 6-10, 2016

Instructor-Focused:

·   Camtasia for Mac, June 7 (Tue), 2:00pm - 4:00pm

Researcher-Focused:

·   SAS Programming Basics 1, June 7 (Tue), 12:00pm - 2:00pm

·   Image Processing Using ImageJ, June 8 (Wed), 10:00am - 12:00pm

·   SAS Data Analysis, June 8 (Wed), 1:30pm - 3:30pm

·   R 1 (R Programming) , June 9 (Thu), 9:10am - 11:30am

·   JMP Basics, June 9 (Thu), 12:00pm - 2:00pm

·   SPSS 1 (Basics), June 10 (Fri), 1:00pm - 3:00pm

SharePoint:

·   SharePoint Overview, June 6 (Mon), 1:30pm - 3:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: How to spot a phishing email

It could be a phishing email if…

·   There are misspelled words in the e-mail or it contains poor grammar. They’re getting better so don’t depend on “just” this indicator alone.

·   The message is asking for personally identifiable information, such as credit card numbers, account numbers, passwords, PINs, or Social Security Numbers.

·   The domain name in the message isn't the one you're used to seeing. It's usually close to the real domain name but not exact. For example:

-         Phishing website: www.regionsbanking.com

-         Real website: www.regions.com

 

Remember, no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password. We know who you are and have other ways of accessing your accounts if we need to.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

 

May 27
[ITWEEKLY] IT Weekly, May 27, 2016

Title: OIT IT Weekly Banner

May 27, 2016

SPSS Data Collection (mrInterview) To Be Retired

SPSS Data Collection (formerly called mrInterview) will be retired at the end of June 2016. Any data you wish to keep will need to be downloaded from the server before the end of the June.  Qualtrics Insight Platform is the currently supported web survey software and replaces SPSS Data Collection.

 

Qualtrics Insight Platform is a powerful online survey research tool. A basic account is free to all faculty, staff and students for university-related work (e.g., instructional or academic research projects, administrative purposes). To create a new account or log into an existing account, go to Research Support's "Web Surveys" page. (oit.utk.edu/research/websurveys)

Need help migrating your old surveys to Qualtrics or creating new surveys? To request an appointment for assistance, call the OIT HelpDesk at 974-9900 or complete the OIT HelpDesk Contact Form.

 

Changes to UTK Wireless coming in July

This summer, OIT will be reducing the number of UTK wireless networks from four to two in order to increase the throughput of the wireless network. Starting on July 25th, the broadcasted networks for connecting to wireless will be ut-open and eduroam.

 

UT-open: The unsecured network available to faculty, staff, students, and visitors. A new portal will be put in place to manage network registration and visitor access.

 

Eduroam: The secure network available to faculty, staff, and students. Eduroam will replace the ut-wpa2 network and offers all of the existing functionality. In addition to wireless access at UT, faculty, staff, and students will be able to obtain Internet connectivity when visiting other participating eduroam institutions.

 

What do you need to do now?

         If you are connected to ut-open, you will not need to take any action.

         If you are connected to ut-wpa2, we recommend that you start connecting to eduroam. The eduroam network is already available and allows secure access to services like T-Storage and the Microsoft Licensing Server. Instructions for getting connected with eduroam are available in the OIT Knowledge Base.

 

More information about eduroam, including a list of participation institutions, is available at the eduroam website.

 

If you have any questions about this change or would like assistance connecting to eduroam, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Software Update: Mathematica by Wolfram Research, Inc.

What is it? Mathematica is computational software used in science, engineering, finance and other areas of computing that require mathematics. The Mathematica system is now based on the Wolfram Language, which is a knowledge-based symbolic language that grew out of the Mathematica Language. The Wolfram Language provides an extensive collection of more than 5,000 mathematical functions that support a wide range of symbolic operations as well as efficient numerical evaluation. Mathematica uses the Wolfram Notebook interface which allows you to organize everything you do in documents that contain text, runnable code, dynamic graphics and user interfaces.

 

Where can I run it? Mathematica is available at no additional charge to faculty, staff and students at UTK, UTSI for installation on university-owned and personally-owned Windows, Mac and Linux computers. Each UT campus maintains its own download and installation instructions. The download and installation instructions for UTK are on OIT's software download site. For UTK, Mathematica is also available on OIT’s Apps@UT server, the Newton Linux Cluster and on the computers in the OIT public computer labs. There is no simultaneous user limit for Mathematica.

 

How can I learn it? For UTK, OIT offers a Mathematica workshop each semester. You can schedule a one-on-one tutorial any time by calling the OIT HelpDesk at 974-9900. The Mathematica Learning Center provides an extensive collection of Mathematica tutorials, examples, and other resources to learn about Mathematica. Use the Wolfram Mathematica Documentation Center to learn Mathematica using the definitive guide that covers all functions and provides extensive tutorials and examples. It also provides How-Tos, which describe how to carry out tasks with step-by-step instructions. The Lynda.com online training library also offers Mathematica training videos for the UT community.

 

Where can I get support? OIT offers Full Support for Mathematica. For assistance, contact the OIT HelpDesk at 974-9900. The Wolfram support page has links to Documentation and How-Tos, Support Articles and the Wolfram Community. UT is a Premier Service subscriber, which means you have telephone and email access to Wolfram experts who can help with Mathematica programming. For Advanced Technical Support, call (217) 398-6500 or submit a message form .

 

Workshops for May 30 – June 3, 2016

Instructor-Focused:

·   Teaching in a Technology Enhanced Classroom (TEC), June 1, 10:00am - 11:30am

·   Teaching in a Technology Enhanced Classroom (TEC), June 1, 3:00pm - 4:30pm

·   Using Skype for Business for Online Office Hours, June 2, 9:00am - 11:00am

Researcher-Focused:

·   JMP Basics, June 2 (Thu), 10:00am - 12:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Data Loss Prevention: The Key is YOU!

One of the biggest risks that we face is the loss of our data. Whether it is cyber-breach, a stolen mobile device or a stack of spreadsheets accidentally thrown away in an unsecure receptacle, the result is the same: our information falls into the hands of folks who are not authorized to view it. We can mitigate or reduce the effects of data loss in some of these cases but there are less obvious ways that data “leaks” out that are harder to control.

 

Scenario 1: In the normal process of doing their job, a UT employee sends an unprotected spreadsheet full of sensitive information to Human Resources or to Payroll for processing student pay. The spreadsheet contains information such as the name and SSN of an employee. They copied 30 others on the email.

Scenario 2: A UT employee is in the process of booking a room for their supervisor and, for whatever reason, sends the supervisor’s credit-card, complete with the credit-card number, the card-holder’s name, expiration date and CVN to the conference hotel through email.

Scenario 3: A UT employee just finishes their family’s 2015 Tax Return in TurboTax and sends a PDF of the return through their UT email account, complete with their SSN, their spouse’s SSN, and their children’s SSN’s to their Yahoo! Gmail or Hotmail account.

 

Regardless of the intention, the results are the same: personally identifiable information just leaked out. None of these examples of sending the information is “okay” not to mention that it violates UT policy. Moreover, the information is now stored in the sender and all of the recipient’s email box. Given the synchronous nature of email now where it’s also conveniently pushed to a mobile device, the information is also on the sender AND recipient’s phone, laptop or workstation. IF the mobile device isn’t protected by a PIN or a password or by encryption, neither is the data.

 

These are tough actions to mitigate. Data Loss Prevention (DLP) controls allow us to put technical controls in place that examine outgoing email BEFORE the user presses “Send” and reminds you that it “looks” like you’re sending information that should be protected. The warning can be acknowledged; the email sent. However, the system also logs the event and alerts Information Security staff. The event can be investigated and a follow-up notice sent to the sender, informing them that there are other options for transmitting sensitive information. OIT is testing the DLP capabilities of Office365 and hopes to implement the controls soon. These controls won’t prohibit the sending of sensitive information in an un-secure fashion but can serve as a reminder that there are other ways of communicating sensitive information.

 

As specified in the UT Acceptable Use Policy (IT0110-AUP), The University reserves the right to access, monitor, review, and release the contents and activity of an individual User’s account(s) as well as that of personal Internet account(s) used for University business. The AUP also states that, “… users WILL NOT: Include or request personally identifiable or generally protected information such as passwords, social security numbers, or credit card numbers be included in electronic communication (email, instant message, text message, etc.).” Whether it’s an SSN, a credit-card, or a grade-roll, there are ways to transmit this data SECURELY.

 

1.       If it’s a Microsoft Office Document or an Adobe Acrobat PDF file that contains the sensitive information, it can be PASSWORD-ENCRYPTED before it’s sent. The sender would need to share the password (verbally) with the recipients so they could un-encrypt the document. (GOOD)

2.      The document can be sent via the UTK Secure Courier (https://vault.utk.edu) both to internal and external recipients. (BETTER)

3.      Internal to UT, the sensitive information can be shared securely through GoogleDrive or Microsoft’s OneDrive for Business. Documents saved in OneDrive for Business can be added to an email in Outlook as a link so no data is really attached to the email but would require the recipient to authenticate using their NetID and password to access the information. (BETTER)

 

The message is still the same: regardless of what controls are in-place, the only control that can reduce the exposure of sensitive information (data loss) is the USER. All of these methods require effort. They’re not expedient. It’s the nature of the world we live in. Expediency can be interpreted as good customer service. However, knowingly putting the customer’s personal information – your information – at risk is not good customer service and a violation of policy.

 

For help or assistance with any of the methods listed, please call the OIT HelpDesk at (865) 974-9900. If you don’t know or aren’t sure: ASK.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

 

May 20
[ITWEEKLY] IT Weekly, May 20, 2016

Title: OIT IT Weekly Banner

May 20, 2016

Adobe Contract Update

We have received several questions this week regarding the May 21st deadline for Adobe and wanted to address them.

 

We received word today the UT System Office has gotten the contract with Adobe signed. As noted below, you will have a grace period with the old version while we prepare the new versions for deployment. If you purchase now Creative Cloud now for $50/year, you will be good for one year from the contract date.  

 

If you purchased and installed software from our current contract (May 20, 2013-present), you are currently in compliance and will be until further notice. We will start next week working on the build out of the appropriate processes to deal with individual connections to Creative Cloud, lab or group management of Creative Cloud and individual installs for Presenter and Captivate. Once these are in place, you will be expected to uninstall the old version and re-install the updated version. To gain access to the software under the new contract, you must purchase a new license from VolTech.

 

When and where can I purchase the new software?

Purchases can be made at VolTECH and any purchase made using the price structure below will be grandfathered in for the first year of the next Adobe agreement, regardless of when it actually starts.

 

   Reminder: To get Acrobat DC, you will need to purchase the Creative Cloud suite.

   Creative Cloud* (includes Acrobat DC)- $50/annually; once purchased, you will be entitled to install the software on 2 devices, one of which MUST be a UT owned machine.  One license will need to be purchased for each machine in a lab environment.

   Captivate* - $349/annually; one license per device

   Presenter*-$149/annually; one license per device

 

* The costs above apply only to UT Knoxville departmental purchases. If you are with the UT System, Institute of Agriculture or the Institute for Public Service, please check with your respective Chief Information Officer for additional information.

 

Once purchased, where do I go to download Adobe software?

For immediate use, you can continue to download the software from OIT’s Software Download site.

 

Once the new software is available, we will send email with instructions to those users who have purchased the software under the new contract.  Additional details pertaining to each product are below.

 

Creative Cloud, including Acrobat Pro

Once we have access to the Adobe portal, we will make the software available to those users with named licenses first. 

 

For those who plan to manage a lab environment or manage their unit’s desktops through SCCM, distribution will come as soon as possible after the individual access is implemented.  These distributions must be packaged separately and will take some time to prepare the software.

 

Captivate and Presenter

Captivate and Presenter distributions will be made available after the Creative Cloud distributions.  These distributions must be package separately and will take some time to prepare the software.

 

Safety Tips for Outlook and Outlook on the Web

Exchange Online Protection (EOP) already protects users at UTK with industry-leading spam and malware prevention.  However, these attacks are so well-crafted that they may appear to be legitimate. Over the coming weeks, Microsoft will be providing additional information when users check their email in Outlook on the Web and in the Outlook desktop clients.

 

Moving forward, as an example, a red Safety Tip in an email message will mean that the received message contains something suspicious. It is recommended to delete these types of email messages without opening them. Continual updates will be made to add more features to Safety Tips to ensure that users have the best, most protected experience. Users will not need to do anything to prepare for this change and may be notified in both Outlook and Outlook on the Web that the feature is available to them.

 

For complete information on the new Safety Tips feature, visit the Office 365 blog. For questions about this feature or other aspects of handling suspicious messages, contact the OIT HelpDesk online or call (865) 974-9900.

 

Software Update: Maple by Maplesoft

What is it? Maple is a technical computing environment for problem solving designed for students in mathematics, statistics, engineering and science. Maple features palettes, interactive assistants, context sensitive menus and tutors. Maple has Clickable Math tools for solving complex mathematical problems in small steps, adding to the student learning process. The Smart Popups and Drag-to-Solve tools help students learn mathematics through guided experimentation. Maple also includes a large number of Math Apps that provide both students and teachers interactive illustrations and insight into concepts from math, statistics, physics and finance.

 

Where can I run it? Maple is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows, Mac and Linux computers. The download and installation instructions are at OIT's software download page. For UTK, Maple is also available on OIT’sApps@UT server, the Newton Linux Cluster, and on the computers in the OIT public computer labs. There is no simultaneous user limit for Maple.

 

How can I learn it? Maplesoft, Inc. provides learning materials on their training page.

 

Where can I get support? OIT offers Minimal Support by contacting the OIT HelpDesk at 974-9900. If you need assistance from Maplesoft, visit their support web page. There you can browse the FAQs, request assistance via the Technical Support Request Form or contact the Technical Support Team by sending email to support@maplesoft.com or call (800) 267-6583 Ext 413 Monday – Friday, 9AM to 5PM EST. You can view or download manuals from their documentation center.

 

Workshops for May 23-27, 2016

Instructor-Focused:

·   Office 365 Overview (Faculty / Staff focused), May 23, 10:00am - 12:00pm

·   Google Forms (Faculty / Staff Focused), May 25, 9:00am - 10:00am

Researcher-Focused:

·   Image Processing Using ImageJ, May 26, 10:00am - 12:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security Update: Don’t Click!

Did you know that the root of the word 'security' comes from the Latin 'securus'; SE + cura meaning "to care" so feeling no care; safe, certain. The thought also comes to mind that there might be diametrically opposed way to look at this, as in; "security is something that results when you do care."

 

Make sure you take the time to care about security today and every day. Think about the simple things that you've been taught to be more security aware, to make it so that you and others have one less thing to care, or worry, about because you did it right the first time.

 

Don't click suspicious links in emails, don't open attachments from unknown sources, don't give out your password to anyone, use a password protected screensaver and activate it anytime you walk away from your computer. Be more aware so that you can feel secure and be secure!

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

1 - 10Next