Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
January 19
[ITWEEKLY] IT Weekly, January 19, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

January 19, 2018

 

Stay Connected to OIT

You have several options when it comes to keeping informed of what’s happening at OIT:

 

The OIT HelpDesk posts updates about technology on campus, reported issues and problems, HelpDesk closings, and will respond to most questions and comments on Twitter. Twitter and Facebook are great resources for timely updates on OIT announcements.

 

If you have any questions about any OIT Service, please contact the OIT HelpDesk online or call (865) 974-9900.

 


GTA@OIT Grant Opens

Spring deadline: Friday, February 21, 2018

Do you know of a Graduate Teaching Associate interested in reworking the content of a course for delivery in Online@UT (Canvas)?

Twice a year (fall and spring), OIT offers GTAs an opportunity to receive a GTA@OIT Grant, which includes one-on-one instructional design consulting, classroom technology training, and help in using Canvas features such as communication, assessment, and evaluation.

 

Recipients of this grant also receive a monetary award to be used for travel and professional development purposes.

For more information, visit
GTA@OIT.

 


New Apple iMovie Workshop

Are you looking for some software to help you create movie-quality videos? Apple iMovie may be the solution for you!

 

Apple iMovie is an easy to use application that will help you turn your photos and videos into eye-catching presentations.  Video is an effective way to get your message across to your viewers, and Apple iMovie makes creating an engaging video easy.  With Apple iMovie, you will choose your video clips, photos, and music; then add your titles, and you’re ready to share with the world. You can begin your movie on any of your Apple devices and then finish it off on your Mac.

 

Come learn how to use Apple iMovie on Monday, January 22, from 1:25 to 3:00 p.m. in Greve Hall room 520.  Register online for this introductory training class to help you get started.  

 

If you are unable to attend this session and want to learn more about Apple iMovie, check out the iMovie 11 Essential Training videos on Lynda.com.*

*For easy access to the training videos, log in to Lynda.com first from oit.utk.edu/lynda

 

If you have questions about this workshop or other OIT workshops, contact the OIT HelpDesk online or at 865-974-9900.

 


JMP by SAS Institute

What is it? JMP is software for data management, analysis, and visualization and it is commonly used in applications such as the design of experiments, scientific research, and quality control. It is particularly strong in visualizing data interactively, offering tools such as multiple linked graphs and 3D rotating scatterplots. The software consists of two products: JMP and JMP Pro.JMP Pro contains everything in JMP plus advanced techniques for predictive modeling, cross-validation, model comparison and one-click bootstrapping. A scripting language is also available in JMP and JMP Pro.

 

What can I use it for? Students, faculty, and staff can use JMP for university-related academic (not administrative) purposes. Use that benefits outside organizations requires the purchase of a commercial license.

 

Where can I run it? JMP is made available at no additional charge to faculty, staff and students at UT Knoxville, UT Space Institute and UT Health Science Center through their respective technology fees for installation on Windows and Mac computers. The download and installation instructions are at OIT’s download site. For UTK, JMP is also available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for JMP.

 

How can I learn it? The JMP User Community web page provides Web Resources where you can watch on-demand webcasts, a Learning Library that includes guides, tutorials and demos and a JMP Discussion Forum where you can ask questions and share information about the JMP software.

 

Where can I get support? OIT offers Full Support for JMP. The JMP User Community web page also provides JMP Support Resources which include the JMP Knowledge Base, JMP FAQs on the JMP software features and how-to use JMP for various statistics, and a library of JMP documentation. SAS Institute offers free telephone support at (919) 677-8008, online support by submitting a SAS Technical Support Form located at http://www.jmp.com/support/ and email support.

 


OIT Workshops, January 22 - 26

Apple

Apple iMovie, January 22, 1:25 pm – 3:00 pm

 

Adobe

Adobe Photoshop 3, January 23, 12:40 pm – 2:40 pm

Adobe Photoshop 4, January 25, 12:40 pm – 2:40 pm

 

 

Canvas

Canvas Assignments/Assessments/Grades – January 25, 10:30 am – 12:00 pm

 

LiveOnline (Zoom)

What's New in LiveOnline@UT (Zoom), January 24 9:00 am – 10:00 am

 

Microsoft

Office 365:  OneNote, January 26, 2:10pm – 3:25pm

 

All workshops meet on the Knoxville campus, and attendees must register to attend a workshop. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 


Beware Fake IRS Phishing Expeditions

Every year, tax time brings a wave of new phishing attacks based on people's desire to get their IRS refund as quickly as possible. Don't fall for these scams. The IRS will not email you to request information to process your refund faster. In fact, the IRS does not initiate contact with taxpayers by email, text message, or social media channels to request personal or financial information like PIN numbers, passwords, information related to credit cards, banks, or other financial accounts. So what do you do if you receive a suspicious IRS-related communication? Follow standard phishing practices. Do not respond to the email, do not click on any included links, and notify the OIT HelpDesk at 865-974-9900, as well as the IRS to ensure that the scam is properly addressed. The IRS requests and welcomes that any form of fraudulent communication, whether that be via email, telephone, or paper mail, be reported to them directly.

 

Prevent Data Loss/Leakage – Don’t send your personal tax information (e.g., copies of your returns or other tax-related information that contains you or your family’s social security numbers) through your university email. While we do everything we can to protect the university's email system’s integrity, we have no control over the account(s) you’re sending it to. Better to send it using a secure courier service or, at a minimum, encrypt the documents with a password that you share with the recipient.

 

If you use Office365 (Outlook) as your email client, did you know you can type the word “ENCRYPT” (without the quotes; upper or lower-case) in the subject line and your email will be sent securely to the recipient? This can be used when sending email to recipients OUTSIDE the university as well as INSIDE. The recipient will receive an email with information on how to access the email.

 

For more information on how to spot and avoid suspicious IRS-related communications see the official IRS link. For more information on sending secure emails, contact the OIT HelpDesk online or by phone, 865-974-9900, or check out the OIT Knowledge Base.

 

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

January 12
[ITWEEKLY] IT Weekly, January 12, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

January 12, 2018

 

Report Wireless Problems in your Classroom

Did you know that the Office of Information Technology offers a service to report classroom wireless issues via text message? To report areas on campus where there may be issues with the wireless network, text “UTKwifi” followed by your building and room number information to 55000. 

 

This initiative allows OIT to collect crowdsourced data provided by you, the students, staff, and faculty that are in the classrooms using the Wi-Fi every day. It is recommended to check that your device has been registered for use on the wireless network and was working normally in other areas of campus before texting in your location. Your input will help ensure that we have the most accurate data possible. As an added benefit of this service, if we receive several text messages in a short time frame for a specific area (for example an academic classroom in Alumni Memorial Building), OIT will investigate the issue and dispatch network engineers if necessary. This information, including a screenshot example of how to text in your location, is available in the OIT Knowledge Base. If you have any questions, contact the OIT HelpDesk online or call 865-974-9900. 

 


Need Help in Your Technology Enhanced Classroom (TEC)?

More than 300 classrooms across campus have technology enhancements, which include touch panel controls for system components, computer display via projector, interactive touchscreens, and in many cases, WolfVision Cynap, a high-quality document camera, and interactive projector screens.

 

Faculty, GTAs, and staff can request one-on-one or group training to learn how to use the technology in your classrooms. Training workshops are also offered at the beginning of each spring and fall. Quick Start guides are available in each classroom that will remind you how to connect your laptop to the projector and if your room is equipped with one, the SMART device.

 

If you find yourself in a jam at the beginning of class, call the TEC Hotline, 865-974-9110, for immediate assistance.

 

For non-emergency requests, contact the HelpDesk at 865-974-9900 or online. Additional information about the technology-enhanced classrooms is available on OIT’s TEC website.

 


Use Lynda.com to Supplement your Course

Are you looking for a way to provide learning aids for upcoming classes or to make the most of class time by increasing student engagement?  Your class can explore concepts at their own pace and refer back to these lessons later in the semester. 

 

Our Lynda.com campus subscription provides a vast online library of instructional videos covering the latest in software product tutorials, creative design techniques, and professional development training. With more than 2,500 courses taught by industry experts, lynda.com is designed for all levels of learners, and at least 20 new courses are added weekly. Create playlists for yourself or to share with your class, adding your content for students to access all in one online collection. Enter through the UTK portal here: https://oit.utk.edu/lynda with your NetID and Password and enjoy these benefits and more!

 

  • Unlimited access to thousands of courses
  • Beginner to advanced courses
  • Full courses or segments dedicated to certain tasks
  • Closed captioning on many videos, with a time-coded transcript
  • Access to course instructor's materials added through playlist creation
  • Mobile connections and offline viewing from smartphone, tablet or computer
  • Faculty can be group administrator: Upload student group, assign tasks and export reports on student progress.

 

For assistance with these tools in Lynda.com, contact the OIT HelpDesk online or call 865-974-9900.

 


Canvas Tips and Tricks

As much as we work with technology on a daily basis, have you ever heard a colleague say, “I didn’t know you could do that!”? Want to be the one sharing the knowledge that makes them say that? Do you like discovering hidden gems? How about uncovering tucked-away secrets? If you answered yes, then our Canvas Tips & Tricks workshop is just for you!

 

Join us as we reveal and illustrate several lesser-known features and strategies within Canvas. At the conclusion of our session, you will have learned several things you didn’t know before to make you a more successful and efficient Canvas user.

 

Sign up for Canvas Tips & Tricks online. It’s new! It’s different! You’ll walk away empowered!

 


ImageJ by National Institutes of Health (open source)

What is it? ImageJ is a free, open source image processing program that can display, edit, analyze, process, save and print various image types. ImageJ, written in Java, was designed with an open architecture that provides extensibility via Java plugins. Custom acquisition, analysis, and processing plugins can be developed using ImageJ’s built-in editor and Java compiler.

 

What can I use it for? Since the ImageJ is open source software, anyone can use it for almost any purpose. Here are it's license details.

 

Where can I run it? Being free, you can install it on any Linux, Mac or Windows computer. It is available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for ImageJ.

 

How can I learn it? OIT offers workshops on ImageJ each semester. For UTK, you can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 865-974-9900. To learn on your own, read the Getting Started tutorial, then peruse the User Guides, additional tutorials, and presentations.

 

Where can I get support? OIT offers Full Support for ImageJ. For assistance, contact the OIT HelpDesk at 865-974-9900. The software’s main website also offers many sources of assistance.

 


OIT Workshops, January 8 - 12

Accessibility

Accessibility:  One Shot Video and Captioning Basics, January 18, 2018, 9:55am – 10:45am

 

Adobe

Adobe Photoshop 2, January 16, 2018, 12:40pm – 2:40pm

Adobe Photoshop 3, January 18, 2018, 12:40pm – 2:40pm

 

Canvas

Canvas Tips & Tricks, January 16, 2018, 11:00am – 12:30pm

Canvas Assignments/Assessments/Grades – January 17, 2018, 9:00am – 10:30am

 

Microsoft

Office 365:  OneNote, January 19, 2018, 2:10pm – 3:25pm

 

Research

SPSS 1, January 18, 2018, 11:00am – 1:00pm

Overview of Research Software and Services, January 19, 2018, 10:00am – 11:00am

 

All workshops meet on the Knoxville campus, and attendees must register to attend a workshop. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 


Spectre & Meltdown

The media is buzzing with news about new “bugs” affecting the Central Processing Unit (CPU) of virtually every computer device there is. The vanity names that have been given to these bugs are, “Meltdown” and, “Spectre.”

 

A vulnerability labeled “Meltdown” has been found in modern computer processors that allows one program to steal data from another program on the same computer.  Computer programs are supposed to keep their data separate and not allow one to talk to another without permission.  Think of it like this, you log into your bank in one browser tab, and then into a social media account in a second.  You probably wouldn't want your banking information to be available on the second tab and accidentally post your spending habits.  Not only is this a possibility, but think of your banking password itself being shared. This issue is called, “Meltdown” as it basically melts security boundaries which are normally enforced by the hardware (the CPU). Virtually every server, desktop, laptop, or Cloud computer with Intel Processors may be affected by Meltdown. But wait; there’s more!

 

As if a “meltdown” isn’t bad enough, a second vulnerability affecting virtually every system (desktops, laptops, Cloud Servers, as well as Smartphones), labeled “Spectre,” was announced at the same time. Spectre is named after something called “Speculative Execution.” BOTH Meltdown and Spectre take advantage of this “Speculative Execution” vulnerability. Unfortunately, each does this differently so each must be addressed differently. While Meltdown breaks the hardware mechanism that keeps applications from reading arbitrary memory, Spectre “tricks” other applications into accessing that arbitrary memory. The people that discovered this condition found that they could have the processor try to guess at what is likely going to be asked for next and prefetch it.  If the term, “Speculative Execution” makes your head hurt, think of the character Radar from the old TV show M.A.S.H.  He was always able to anticipate what Colonel Potter needed before he knew himself. However, the computer chip in your devices does this extremely fast and efficiently. What’s worse is that all of our anti-virus applications, our intrusion detection devices, and malware detection software are going to miss this issue for a while.

 

We care about these because if our systems are affected, content that is stored in memory on our devices can be read by other applications; content that may include passwords or other sensitive data. The “good news” is that although both of these conditions allow for a possible leak of information, the bad guys don’t know what information they’re going to be gathering. They have a BIG collection of information from memory but figuring out what is a password or what is sensitive is difficult.

 

What can YOU/WE do?

 

  1. Don’t panic. Mistakes are made when that happens.
  2. Continue to install updates on ALL of your devices; don’t forget your devices at home. If an update has been released, verify it and install it. This includes updating your browsers (i.e., Firefox, Chrome, etc.)

 

This article is not meant to scare you. It’s also not meant to be comprehensive as there are still notifications and information coming out in droves. If you are an IT Professional and want a more “technical” account of these vulnerabilities, you can read about them online at  https://tiny.utk.edu/meltdown

 

OIT will continue to monitor the breaking analyses and updates.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

January 05
[ITWEEKLY] IT Weekly, January 5, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

January 5, 2018

 

Welcome Back!

OIT staff were busy over the last few weeks, and we wanted to make sure you knew about the recent upgrade to T-Storage.

 

Departmental Shares (I: Drive)  and Home Areas (H: drive) and were upgraded on December 27th and January 3rd, respectively.  If you are unable to connect to your H: or I: drive, rebooting your computer may quickly restore your access. If a reboot does not work, give the OIT HelpDesk a call, and we’ll help you get connected.  If you are looking for a place to save your files, check out the three options from OIT: T-Storage, Microsoft OneDrive, and Google Drive.

 

If you have any questions or would like assistance with this or any OIT Service, please contact the OIT HelpDesk online or by phone, 865-974-9900.

 


Zoom Test Flights

Are you taking an online course?  If so, you may be using Zoom, our UTK cloud-based conferencing technology which allows faculty, staff, and students to have high-quality interaction in real time from their computers and mobile devices.

 

You’re invited to join us online for the Spring 2018 Test Flights!

Test Flights provide faculty and students an opportunity to join an online meeting and test the communication tools available to meeting participants. Test Flights will be held via the Zoom application.

 

Participants are welcome to join either of the meetings below, and you may exit the online meeting at any time.

  • Monday, January 8, 11:00 am – 1:00 pm EST
  • Tuesday, January 9, 5:00 pm – 7:00 pm EST

 

Check out the Getting Start Guide and System Requirements information page for more information about Zoom and Test Flights.  Contact the OIT HelpDesk at 865-974-9900 for assistance setting Zoom up or getting connected.

 


New OIT Workshop Topics

OIT spring workshops are available for registration. OIT offers a variety of topics to help instructors, students, staff, and researchers stay current with technology. Take a look at our offerings and join us for class! 

 

New workshop topics include:

  • Managing Digital Distractions in the Classroom 
  • Using OER Technologies to Create Copyright-free Learning Materials
  • Make Photos Better
  • Canvas Tips and Trick
  • Canvas Assignments/Assessments/Grades
  • Canvas Analytics for Student Success

 

Check out these workshops and more on our website.

 


Mark Your Calendar: January 9 and 12

Need help with your clickers or how to use the Cynap, projector, and document camera in your Technology-Enhanced Classroom (TEC) but are just too busy to try to find a specific time to attend a workshop? Check out our drop-in consultations where you can get help. No registration required!

 

Clicker Help – Tuesday, January 9 from 9:30 a.m. to 3:30 p.m. in Greve 520 – drop in any time.

 

Cynap and Technology in the Classroom Help –Friday, January 12 starting at 9 a.m. at the top of the hour in the Practice Presentation Room 220E Hodges Library, Commons North. The last session will start at 4 p.m.

 


JMP by SAS Institute

What is it? JMP is software for data management, analysis, and visualization and it is commonly used in applications such as the design of experiments, scientific research, and quality control. It is particularly strong in visualizing data interactively, offering tools such as multiple linked graphs and 3D rotating scatterplots. The software consists of two products: JMP and JMP Pro. JMP Pro contains everything in JMP plus advanced techniques for predictive modeling, cross-validation, model comparison and one-click bootstrapping. A scripting language is also available in JMP and JMP Pro.

 

What can I use it for? Students, faculty, and staff can use JMP for university-related academic (not administrative) purposes. Use that benefits outside organizations requires the purchase of a commercial license.

 

Where can I run it? JMP is made available at no additional charge to faculty, staff, and students at UT Knoxville, UT Tullahoma, and UT Health Science Center through their respective technology fees for installation on Windows and Mac computers. The download and installation instructions are at OIT’s download site. For UTK, JMP is also available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for JMP.

 

How can I learn it? The JMP User Community web page provides Web Resources where you can watch on-demand webcasts, a Learning Library that includes guides, tutorials and demos and a JMP Discussion Forum where you can ask questions and share information about the JMP software.

 

Where can I get support? OIT offers Full Support for JMP. The JMP User Community web page also provides JMP Support Resources which include the JMP Knowledge Base, JMP FAQs on the JMP software features and how-to use JMP for various statistics, and a library of JMP documentation. SAS Institute offers free telephone support at (919) 677-8008, online support by submitting a SAS Technical Support Form located at http://www.jmp.com/support/ and email support.

 


OIT Workshops, January 8 - 12

Accessibility

Accessibility:  Creating Accessible Course Documents, 1/11/2018 (Thu), 9:55 am – 10:45 am

 

Adobe

Adobe Photoshop 1 (Selections and Manipulations), 1/11/2018 (Thu), 12:40 pm – 2:40 pm

 

Canvas

Canvas Foundations:  Getting Started, 1/8/2018 (Mon), 9:00 am – 10:30 am

Canvas Foundations:  Getting Started, 1/10/2018 (Wed), 2:00 pm – 3:30 pm

 

Technology Enhanced Classrooms

TurningPoint Basics, 1/9/2018 (Tue), 9:30 am – 3:30 pm

Cynap and Technology in Your Classroom, 1/12/2018, 9:00 am – 5:00 pm

 

All workshops meet on the Knoxville campus, and attendees must register to attend a workshop. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 


UPDATE NOW!

Have you ever hurriedly gotten into your car to get to an appointment, which you’re running late for, to have your, “Low Tire” warning-light pop-up? You tell yourself, “…it’s cold; probably just the weather” and ignore it, thinking you will “Google” what stations have Nitrogen to check your tires are nearby and do it LATER. If you’re like everyone else, you might forget to do it and put yourself at risk for having a blow-out either on that same trip or an equally important trip.

 

It’s the same for your IT devices (i.e., your phone, your workstation, your laptop or your tablet). You’re in a hurry to get your taxes submitted, or you’re trying to get that grant submitted and the dreaded, “You have updates waiting to install” (warning-light?) pops up. Or worse, the thing starts the update automatically, subjecting you to an hour of watching your device update its operating system. You ignore the notification or worse yet, you stop the auto update by forcing a reboot of your computer, thinking, “…I’ll do this later.” Just like ignoring the “Low Tire” light, this way of thinking is a mistake. Applying software updates is the most important thing you can do if you want efficient IT - what's more, if you don't perform updates, you're leaving yourself at risk.

 

Be honest; you get a computer, get it connected to the internet or network and use it until something goes horribly wrong (i.e., virus attack, computer malfunction, new device doesn't work, etc.). At which point up you’re forced to call for help (I can't tell you how many times friends have asked me to fix their computers) or, more likely out of frustration, just go out and order a new computer or tablet. This costly decision can be avoided most of the time. It doesn't take much to keep your computer lean and mean. In fact, some of the best solutions are free and take little to no time as long as they are done before the problems happen.

 

An update, often in the form of a patch or service pack, comes from the vendors, Microsoft for example, to address vulnerabilities and problems with their products. They are not just creating these things for fun or to keep you from submitting your grant. Updates are vital for the health of your computer and the improvements they send include improvements to the software you rely on every day as well as drivers for new devices you may want to use. Mostly, these patches fall into two categories: “Security Vulnerability Fixes” or, “Bug Fixes and Enhancements.”

 

-          Security vulnerability fixes - There are a lot of risks out there for IT users and hackers are always finding new ways to attack systems. You don't want security holes in your software any more than you want a flat tire. Most malicious malware is aimed at exploiting weaknesses caused by users not updating their systems. Your vendor's IT experts fight the good fight against hackers by sending you security patches, but they are no good unless you install them when you're told.

-          Bug fixes and enhancements - Such patches and upgrades are aimed at improving the performance of your computer and fixing bugs that have become apparent.  Most vendors put their software programs through rigorous checks before release, but some bugs only become apparent over time. This is what many updates are designed to address.

 

Staying informed and updated just makes sense - and saves you money in the long run. If you are still using Internet Explorer 6, you should update your system immediately. Gone are the days of "It is too difficult to update my computer." Manufacturers and developers are making it easy to keep your computer & software running smoothly. For your privacy, security, and reliability update your system today. Threats like the recent, “WannaCry” exploit would have been avoided if computers had been updated WHEN the patch was released instead of waiting for a better time. Don’t put it off. An ounce of prevention is worth a pound of cure.

 

At UT, it’s mandated by policy IT0110 that we keep our operating systems and software up-to-date. This isn’t about Cyber Security; it’s just good practice and common sense (like driving on tires that have the right amount of air in them?).

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

December 21
[ITWEEKLY] IT Weekly, December 21, 2017

 

 

December 21, 2017

 

The Year in Review

It’s December, and a time to reflect on all that has happened this year and it’s been a busy year for OIT.  Here are a handful of projects that we worked on in 2017:

 

·         Migrated from Blackboard to Canvas

·         Renewed Lynda.com

·         Launched the new OIT website

·         Launched Hyland OnBase for document imaging

·         Updated the technology in 52 classrooms

·         Provided communications, wireless, and classroom technology in Strong Hall, Stokely Residence Hall, Orange Hall, and White Hall.

 

Throughout the year, all of the teams within OIT work to support your technology efforts.  Contact us after the winter break if you need assistance getting the semester started.

 

Happy Holidays from all of us at OIT!

 


OIT HelpDesk Closed for the Winter Break

The OIT HelpDesk will be closing at 8:00 p.m. on Friday, December 22, for the Winter Break. While the university is closed, OIT will continue to monitor the network, email, and major computer applications. To check the current status of IT systems, please visit the online IT System Status Center at http://help.utk.edu/status.

 

The Telephone OIT HelpDesk will reopen on Tuesday, January 2. We will follow up on any normal support requests received over that break beginning at 8:00 a.m. on this day.   

 


Mark Your Calendar: Drop-In Consulting

Need help with your clickers or how to use the Cynap, projector, and document camera in your Technology-Enhanced Classroom (TEC) but are just too busy to try to find a specific time to attend a workshop? Check out our drop-in consultations where you can get help. No registration required!

 

Cynap and Technology in the Classroom HelpThursday, January 4 and Friday, January 12 starting at 9 a.m. at the top of any hour in the Practice Presentation Room 220E Hodges Library, Commons North. The last session will start at 4 p.m.

 

Clicker HelpTuesday, January 9 from 9:30 a.m. to 3:30 p.m. in Greve 520 – drop in any time.

 

 


Need Software for Your New Computer?

Did you get a new computer or laptop over the holidays?  Before you head out and buy a bunch of new software, check out the OIT Software webpage first.  With your UT account, you have access to several different software packages at no additional cost, including:

 

·         Microsoft Office 365 ProPlus – the full desktop versions and mobile versions

·         Virtual Private Network (VPN) – allows access to UT resources from off-campus

·         Research software, such as MATLAB, SPSS and more

·         Antivirus

 

If you have any questions, contact the OIT HelpDesk after the holidays.

 


ImageJ by National Institutes of Health

What is it? ImageJ is a free, open source image processing program that can display, edit, analyze, process, save and print various image types. ImageJ, written in Java, was designed with an open architecture that provides extensibility via Java plugins. Custom acquisition, analysis and processing plugins can be developed using ImageJ’s built in editor and Java compiler.

 

What can I use it for? Since the ImageJ is open source software, anyone can use it for almost any purpose. Here are its license details.

 

Where can I run it? Being free, you can install it on any Linux, Mac or Windows computer. It is available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for ImageJ.

 

How can I learn it? OIT offers workshops on ImageJ each semester. For UTK, you can schedule a one-on-one tutorial any time by calling the OIT HelpDesk at 865-974-9900. Documentation, including the ImageJ User Guide, tutorials and examples, can be downloaded at the software’s main web site.

 

Where can I get support? OIT offers Full Support for ImageJ. For assistance, contact the OIT HelpDesk at 865-974-9900.The software’s main web site also includes a user’s guide and FAQs. The ImageJ Information and Documentation Portal also has additional helpful information.

 


Workshops for January 2-5, 2018

Cynap and Technology in the Classroom Help, January 4, 9:00 am – 5:00 pm, at the top of any hour in the Practice Presentation Room 220E Hodges Library, Commons North. The last session will start at 4 p.m.   No Registration Required.

 

Additional workshops return January 8. The schedule is online at workshops.utk.edu

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 


IT Security When Traveling

Whether you're on vacation or traveling during the holidays, you could be a target of cyber-criminals, especially when traveling abroad.

 

Personal information or university data may be the target of a foreign country to obtain information or technologies in order to increase their market share, build their economies, or modernize their military. Targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from laptop computers.

 

Here are a few facts and tips from the Federal Bureau of Investigation to consider when traveling during the holidays:

 

1.             Sanitize your laptop, telephone, & PDA, prior to travel and ensure no sensitive contact, research, or personal data is on them. Back-up all information you take and leave that at home. If feasible, use a clean laptop, phone and a new email account while traveling. Or, if you can do without the device, Do Not Take It. Cell phones can be hacked to steal contact lists, usernames, passwords, and browser history.

 

2.            Use up-to-date protections for antivirus, spyware, security patches, and firewalls.

 

3.            Remove and secure ALL papers or files that contain sensitive information from off of your desk. Spreadsheets that contain FERPA, HIPAA or some other regulated information are targeted by criminals.

 

4.            Clean out your voicemail. When you access your messages, the passcode may become compromised, and others may then retrieve your messages.

 

5.            Beware that your conversations may not be private or secure. Unlike the United States, most other countries do not have legal restrictions against technical surveillance. Most foreign security services have various means of screening incoming visitors to identify persons of potential intelligence interest. They also have well-established contacts with hotels and common hosts that can assist in various forms of monitoring you. Electronic eavesdropping has been reported on airlines, in hotel rooms, taxis, and meeting rooms.

 

6.            Do not leave electronic devices unattended. Do not transport them (or anything valuable) in your checked baggage. Shield passwords from view. Avoid Wi-Fi networks if you can. In some countries they are controlled by security services; in all cases they are insecure.

 

7.            Clear your Internet browser after each use: delete history files, caches, cookies, and temporary internet files.

 

8.           If your phone or laptop is stolen, report it immediately to the local authorities. If you're out of the country, report it immediately to the US Embassy or Consulate. 

 

9.            Do not use non-company computers to log into the university network. Always consider any information conveyed through a non-company computer to be compromised, even if encrypted. Cyber criminals from numerous countries buy and sell stolen financial information including credit card data and login credentials (usernames and passwords)

 

10.        Do not allow foreign electronic storage devices to be connected to your computer or phone. They may contain malware or automatically copy your stored electronic data. Do not use thumb drives given to you; they may be compromised.

 

11.         In most countries, you have no expectation of privacy in Internet cafes, hotels, airplanes, offices, or public spaces. All information you send electronically can be intercepted, especially wireless communications. If information might be valuable to another government, company or group, you should assume that it will be intercepted and retained. Security services and criminals can track your movements using your mobile phone and can turn on the microphone in your device even when you think it is turned off.

 

12.         Beware of "phishing.” Foreign security services and criminals are adept at pretending to be someone you trust in order to obtain personal or sensitive information.

 

13.         When you return, change ALL of your passwords, including your voicemail and scan your computer for malware.

 

14.        Lastly, report any unusual circumstances or incidents to the Information Security Office by calling the OIT HelpDesk at 865-974-9900.

 

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

December 15
[ITWEEKLY] IT Weekly, December 15, 2017

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

December 15, 2017

 

Away from your email during the Winter Break?

It’s almost time for UT’s Winter Break! If you’re heading out of town or will be away from your email, you can set up your email to send an Out of Office reply on your behalf. Instructions for configuring automatic replies are in the OIT Knowledge Base:

 

 

If you have any questions or would like assistance, please contact the OIT HelpDesk at 865-974-9900.

 


How to get your tech toys online after the holidays

Do you plan on picking up a new phone over the holidays?  A new laptop? Gaming System? Streaming device?  Kindle?  Have you wondered how easy it would be to get your new gadgets online at UT?

 

For your laptops, phones, tablets, or any device with a web browser, the first step is to connect to UT’s guest wireless network, ut-open, and open up a web browser.  Once there, new devices are are automatically directed to support.utk.edu.  Follow the instructions to get registered. Once your device is registered, we recommend students, faculty and staff then use the eduroam wireless network for secure access.

 

For anything without a web browser, go to netreg.utk.edu/games and follow the instructions. To register your device, you will need to know the MAC address. Choose your device below for instructions on finding your MAC address.

 

If you have any questions or need assistance, contact the OIT HelpDesk at 865-974-9900.

 


Take Lynda Along for your Holiday Travels

If you know you’ll be traveling and without WIFI during the break, consider downloading the Lynda.com mobile app for iOS, Android, Windows. Select a course for download and learn while you are offline.

 

Lynda.com, an online training resource, is available to all students, faculty, and staff at UTK. Its online library provides thousands of training videos by which users can learn the latest software tools and skills.

 

So, make sure you are all packed and ready for the road by downloading the Lynda.com app now. After downloading the app, select and download a course by following these instructions.

 


Faculty and Staff: Access to OIT Services After Leaving UT

Are you retiring from UT? Have you accepted a position at another university? 

 

While you will always be part of the Volunteer family, access to OIT services will vary once you leave UT.   Below are some basic guidelines for faculty and staff who leave the university in good standing.   Additional information about the account retention policies for other OIT services is available online.  If you have questions about a specific service not addressed, please contact the OIT HelpDesk online or at 865-974-9900.

Faculty and Staff

·         Office 365 Email*/OneDrive and Google Apps: you will retain access for one calendar year after leaving the university.  At the end of the year, your email account and forwarding will be deleted, and files stored in OneDrive and Google Drive will be removed.

·         Microsoft Office:  Once you have left the University, your Microsoft Office ProPlus subscription will end, and access to the desktop suite will be unavailable. Your license for the Home Use Program will no longer be valid.  After this time, you will need to enroll in other available consumer or commercial offers from Microsoft or other third-party retailers.

* Retirees with at least ten years of service are eligible to retain an email account by contacting Benefits and Retirement, http://humanresources.tennessee.edu/benefits

 


HLM by Scientific Software International, Inc.

What is it? HLM from Scientific Software International is a package that does Multilevel Models that are also often called Hierarchical Linear Models (HLM). An example of a multilevel model is a regression equation showing how studying increases grades. That relationship may differ at different levels, such as teachers within schools within districts.

 

What can I use it for? Students, faculty, and staff can use HLM for university-related academic (not administrative) purposes. Use that benefits outside organizations requires the purchase of a commercial license.

 

Where can I run it? For UTK, HLM is available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is a two simultaneous user limit for HLM.

 

How can I learn it? You can learn HLM from the Help files, which contain the entire manual. However, to understand the manual, you also need the book by the program’s developers, Raudenbush and Bryk, Hierarchical Liner Models, Applications and Data Analysis Methods.That book’s web page is at the company’s main website.

 

Where can I get support? OIT offers Minimal Support for this software. We can help you analyze HLM models using other software that we fully support. For assistance, contact the OIT HelpDesk at 865-974-9900.

 


Upcoming Workshops

OIT Workshops will return in January!  The schedule is online at workshops.utk.edu

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 


2017 Security Awareness Training Ending on 12/31

Faculty and staff members of the University of Tennessee have an obligation to protect sensitive information and the IT systems we use. To enhance the safety of user information, computers, and IT systems, the University of Tennessee offers access to “Securing the Human,” an online training program that provides faculty and staff with the information needed to engage in informative and efficient security training.

 

The training is produced by SANS, one of the most trusted and by far the largest source for information security training and security certification in the world.

 

The training consists of several videos that cover specific security topics. The videos range from 1 to 5 minutes in length and are intended to raise awareness and influence user behavior that will reduce security risks. The training allows the users to complete the training at their own pace, monitor their progress and revisit completed training.

 

This training is refreshed on an annual basis. Therefore, you have through December 31, 2017, to take advantage of this year’s Securing the Human videos.

 

Users having difficulty in completing the training should call the OIT HelpDesk at (865) 974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

December 08
[ITWEEKLY] IT Weekly, December 8, 2017

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

December 8, 2017

 

Changes to the Online Password Change website

In an effort to increase security awareness, we have updated the online password change website.  Using the website when creating or changing your password will present account security tips. The tips are broken up into four sections: Accounts and Passwords, Email Scams, Browsing the Web, and Protect Your Account when Away from Campus. 

 

We have set up a complimentary page on OIT’s website, oit.utk.edu/security/tools/tips-for-protecting-your-ut-accounts/,

 

If you have any questions about this change or protecting your UT account, contact the OIT HelpDesk online or at 865-974-9900.

 


Deleting Emails

Office 365 and Gmail (student email) have different email retention policies for the Deleted Items (Trash) folders and mail that has been permanently deleted.  When you delete a message using Outlook, the Outlook Web App, or the Gmail Web App, messages are moved to either your Deleted Items folder or your Trash folder.

 

Office 365: Messages are NOT automatically purged from your Deleted Items folders. Once you permanently delete (“empty your trash”) messages from this folder, they can be recovered for up to 14 days through the Recover Mailbox Tool within Outlook and the Outlook Web App. 

·         Outlook 2010/2016 for Windows

·         Outlook 2016 for Mac

·         Outlook on the Web 

 

Gmail (Students only): Messages ARE automatically purged from your Trash folders.  Messages that have been in Trash more than 30 days will be automatically deleted.  Once a message has been permanently deleted, it cannot be recovered.

 

If you would like more information about your storage options, please call the OIT HelpDesk at 865-974-9900.

 


Students: Access to OIT Services After Leaving UT

Are you graduating or taking a semester off?  While you will always be a Vol for Life, access to OIT services will vary once you leave UT.   Below are some basic guidelines for students who leave the university in good standing.   Additional information about the account retention policies for other OIT services is available online.  If you have questions about a specific service not addressed, please contact the OIT HelpDesk online or at 865-974-9900.

 

  • Volmail Email: you will retain access to your Office 365 or Gmail netid@vols.utk.edu email account and email address indefinitely. One year after you leave the University your @utk.edu, @tennessee.edu, and other email addresses will no longer receive email.
  • Office 365 OneDrive and other online apps: you will retain access for one calendar year after your LeftUT date in the UT Directory. At the end of this year, access to the files stored in your UTK OneDrive for Business will be unavailable and the files will be deleted by Microsoft. OIT recommends backing up and transferring your files to another third-party service or your UTK Google Drive.
  • Google Drive and other online apps: Access to the G-Suite Apps, including Google Drive, will remain available after you leave the university via netid@vols.utk.edu.
  • Microsoft Office: Once you have left the University, your Microsoft Office ProPlus subscription will end and access to the full Office desktop suite will be unavailable.  For the one year you still have access to Microsoft OneDrive, you can get to your files with the online version of Office.

ChemDraw Professional by PerkinElmer Informatics

What is it? ChemDraw Professional is a drawing tool for chemists and biologists used to create publication-ready, scientifically intelligent drawings for use in ELNs, databases and publications, and for querying chemical databases.

 

What can I use it for? Students, faculty, and staff can use ChemDraw for university-related academic (not administrative) purposes. Use that benefits outside organizations requires the purchase of a commercial license.

 

Where can I run it? ChemDraw Professional is available at no additional charge to UTK and UTSI faculty, staff and students for installation on university-owned and personally-owned Windows PCs and Macs. The download and installation instructions are at OIT’s software distribution site. For UTK, the software is also available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for its use.

 

How can I learn it? To watch Webinar videos, read informative articles and watch feature demos, go to their main web page and select Chemistry and then ChemDraw.

 

Where can I get support? OIT offers Full Support for ChemBioDraw. For additional technical support, browse the Cambridgesoft Technical Support  site. You may also download manuals for free, search or ask a question in the Support Forum, or contact the support team via their web form.

 


Upcoming Workshops

We are working on our workshop schedule for the Spring Semester.  Until then, check out our online training offerings (including Lynda.com).

 


Holiday Scams

The season of Santa, reindeer, gifts, and eggnog is upon us, which means we must be cautious of common holiday ploys to steal credit card and personal information. With the mass amount of online gift buying during the holiday season, cyber security criminals believe this presents a prime opportunity to steal your information. Be aware of e-mails or any online advertising that seems too good to be true. False advertisements and phishing e-mails are two ways in which cyber security criminals will try to lure you in to steal your information. Remember, if the deal looks too good to be true, it probably is.  

 

Here are some additional tips you can use to avoid being a victim of cyber fraud: 

·         Check your credit card statement routinely.

·         Protect your credit card numbers from “wandering eyes.”

·         Do not respond to unsolicited (spam) e-mail.

·         Do not click on links contained within an unsolicited e-mail.

·         Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.

·         Avoid filling out forms contained in e-mail messages that ask for personal information.

·         Always compare the link in the e-mail to the link you are actually directed to and determine if they match and lead you to a legitimate site.

·         Log on directly to the official website for the business identified in the e-mail, instead of “clicking” to it from an unsolicited e-mail.

·         If you are requested to act quickly, or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.

·         Verify any request for personal information from any business or financial institution by contacting them using the main contact information for their official website. Remember if it looks too good to be true, it probably is.

·         Be cautious when using public ATM's; paying attention to prying eyes or equipment that just doesn't look right. Contact the owners of the business or your financial institution and report it.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

December 01
[ITWEEKLY] IT Weekly, December 1, 2017

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

December 1, 2017

 

macOS High Sierra

Earlier this fall, Apple released its latest operating system, macOS High Sierra. While you may be tempted to upgrade, be cautious and upgrade your operating system only after you have verified that your favorite applications will work with the newer OS. Some vendors have cautioned against upgrading due to incompatibilities with their software packages. Among others, these packages include Parallels, Autodesk AutoCAD. Adobe Illustrator and  Adobe InDesign.

 

To date, Apple has released several patches for High Sierra, including a critical security patch this week.  If you have upgraded High Sierra, OIT recommends enabling Automatic Updates to ensure these critical patches are installed when they are available.

 

Experience indicates that the most prudent course would be to bide your time for a few more months until vendors have an opportunity to correct incompatibilities between their products and High Sierra. OIT’s recommendation is always to proceed with caution when upgrading. If you do go forward, please be sure to back up your data and locate any media and license codes for your applications before initiating an upgrade.

If you have any questions or need assistance, please contact the OIT HelpDesk online or call (865) 974-9900.


Collaboration Tools: Email groups

Have you ever needed to email the same group of people repeatedly?  Does your team need access to your email list? Do you need to archive these messages?

 

OIT has several options to help you communicate with a group of people via email:

 

Active Directory (AD) Email-enabled Group

These groups are very similar to a contact group in Outlook but are stored on the server and are available in the Global Address List in Office 365 and Gmail.  Use these groups to send messages and grant access permissions to resources in Active Directory.  This option is intended for use by internal groups. 

 

LISTSERV®

Create, manage, and control mailing lists on the UTK network or the Internet.  A listserv user can send a single email to a list which distributes the email transparently to the other subscribers on that list.  This option works well for a large group sharing a common area or topic of interest. 

 

Office 365 Groups

If you are looking for a tool that will send email to a group and create shared resources including a shared calendar and OneDrive, you may want to choose an Office 365 Group.  Groups can be managed online through your office 365 account.

 

Learn more about OIT Email Groups or contact the OIT HelpDesk at 865-974-9900 to get started.

 


Reminder: Faculty First 2018 Proposals Due Monday, December 11

Do you have a vision for your course on how to improve student learning and need assistance with development of course materials? Through the Faculty First Grant, the Office of Information Technology (OIT) will build a long-term partnership with you to redesign your course and develop instructional materials. Learn more about the Faculty First Program and download the Call for Proposal instructions.

 


ATLAS.ti by ATLAS.ti Scientific Software Development GmbH

What is it? ATLAS.ti is one of two qualitative analysis software packages offered at UT that allow the researcher to organize, analyze, report and visualize data in both text and multimedia formats. ATLAS.ti also allows users to transcribe directly into the program and has an accompanying iPad and Android app for multimedia data collection.

 

What can I use it for? Students, faculty, and staff can use ATLAS.ti for university-related academic (not administrative) purposes. Use that benefits outside organizations requires the purchase of a commercial license.

 

Where can I run it? ATLAS.ti is funded by the UTK Technology Fee and made available at no additional charge to UTK students, faculty and staff on the Apps@UT server.

 

How can I learn it? ATLAS.ti offers free training and video tutorials from the ATLAS.ti YouTube channel. You can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 865-974-9900. You can also visit ATLAS.ti’s support page.

 

Where can I get support? OIT offers Full Support for ATLAS.ti. For assistance, contact the OIT HelpDesk at 865-974-9900.

Anything else I should know? Users should use the assign function for primary documents while working with ATLAS.ti on the Apps@UT server.

 


Workshops for December 4-8, 2017

Instructors

ePortfolios for Developing and Assessing Student Professional Competencies

December 4, 2:25pm – 4:25pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 


Security Alert: MacOS High Sierra hacked

On Tuesday, security researchers disclosed a bug that allows anyone an easy method of breaking security protection for Apple’s new operating system, High Sierra.  Using this method, hackers could gain full access to your computer with the username of “root” and no password.

 

On Wednesday, Apple announced a security update to High Sierra designed to fix this critical bug. This update is available through the App Store and should be installed immediately.  According to Apple, "a logic error existed in the validation of credentials.  This was addressed with improved credential validation."

 

Contact the OIT HelpDesk for assistance installing this critical update from Apple or with securing your computer.

 

Article Reference: https://www.wired.com/story/macos-high-sierra-hack-root/

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 17
[ITWEEKLY] IT Weekly, November 17, 2017

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

November 17, 2017

 

Nolij to Hyland OnBase Enterprise Document Management System

OIT is currently underway with the conversion to Hyland Onbase Document Managemetn and the retirement of the Nolij document imaging system. As Nolij will no longer be supported in late 2018, OIT is working to set up all current Nolij-using offices in OnBase, and then begin converting Nolij documents to OnBase in late spring, 2018.  

 

This past summer the Registrar’s Office and Financial Aid respectively implemented their Transfer Course Evaluation & Fin Aid Verification solutions within OnBase. By the end of the year, the Student Loan department and Bursar’s Office will begin using OnBase for their document imaging services. 

 

OIT will work with each office using Nolij before their conversion to configure relevant OnBase information such as users, keywords, and document types.  Departments will then work with current & future documents in OnBase while using Nolij to access older ones until their conversion is complete.

 

If you have any questions about this project, please contact the OIT HelpDesk online or at 865-974-9900.

 


Faculty First 2018

Call for proposals are due Monday, December 11, 2017

 

Do you have a vision for your course on how to improve student learning and need assistance with development of course materials? Through the Faculty First Grant, the Office of Information Technology (OIT) will build a long-term partnership with you to redesign your course and develop instructional materials. Learn more about the Faculty First Program and download the Call for Proposal instructions.

As a Faculty First grant recipient, you serve as a subject matter expert, and OIT provides its professional expertise, including instructional designers, graphic and web designers, multimedia developers, Universal Design for Learning specialist, and instructional technology specialists.

Remember, if you have a small project, you do not need to apply for this grant. We are here to help you anytime.
Contact the OIT HelpDesk online or at 865-974-9900 and request faculty assistance with one of our instructional designers.

 


Office 365: New App Launcher Is Here

The new app launcher is rolling out to the UT tenant now.

 

It is personalized to your Office 365 use and will help you open and switch between the apps you use most. On the main app launcher screen, you will see the apps that you most frequently use as well as the most common Office 365 apps, such as Outlook and Calendar.  You will also have access to an alphabetized list of all Office 365 apps.  These apps can be added to your main screen at any time.

 

Have you ever wondered what some of these apps do?  Microsoft is also introducing a new Office 365 gallery page, accessible from www.office.com, that will help you better understand the apps, tools, and services that are part of your Office 365 account.  To access this content, choose “Explore Your Apps” within the app launcher.

 

If you have any questions, contact the OIT HelpDesk online or at 865-974-9900.

 


ArcGIS from Esri

What is it? ESRI’s ArcGIS is an integrated suite of software products used for mapping and spatial reasoning. In addition to creating maps, it can be used to compile and analyze geographic data, manage geographic databases, and allow users to collaborate and perform research as teams. Spatial analytics and 3D modeling features are also integrated into ESRI products. ESRI software allows users to apply location-based analysis tools in order to analyze and visualize data. Users can share findings and collaborate with others via apps, maps, and reports.  It also provides a platform for making maps and geographic information accessible on the Web for the public or UT user communities. Most ArcGIS features can be controlled by menus, but programming using Python and JavaScript will provide advanced functionality.

 

What can I use it for? Students, faculty, and staff can use ArcGIS for university-related academic (not administrative) purposes. Use that benefits outside organizations requires the purchase of a commercial license.

 

Where can I run it?  ArcGIS desktop products are available on Windows machines in most OIT Computer Labs. Students, faculty and staff can download ArcGIS 10.5 for Desktop and ArcGIS Pro software for no additional cost from the OIT software distribution site and install it on UT owned machines. Compatible operating systems include Windows, Windows Server, and Linux Servers. Contact the OIT HelpDesk online or at 865-974-9900 for additional ESRI software that is available for download.

 

How can I learn it? To get started with ArcGIS, you can enroll in virtual training classes through the ESRI Virtual Campus. In order to access all the available training, students must first have an ArcGIS Online Account and then request training be added to their AGOL by contacting OIT help desk.  OIT offers introductory workshops on ESRI software throughout the year.   Extensive online help is available from ESRI.  Lynda online training library offers free ArcGIS training videos to registered members.

 

Where can I get support? OIT offers Full Support for ArcGIS. For additional licensing information, contact the OIT Help Desk.

 


Upcoming Workshops

 

Instructors

ePortfolios for Developing and Assessing Student Professional Competencies

December 4, 2:25pm – 4:25pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 


Don’t Fall For Fake Customer Support Scams!

Technical support scams are built on the deception that your computer is somehow broken, and you need to contact technical support to fix it. In some cases, the tech support agent may ask you to install other software or malware disguised as support tools on your computer, bringing in more threats that can cause even more damage.

 

Scammers may call, place alarming pop-up messages on your computer, offer free “security” scans, or set up fake websites – all to convince you that your computer is infected. The scammers try to get you on the phone, and then work to convince you there’s a problem. Finally, they ask you to pay them to fix that non-existent problem.

 

To convince you that both the scammers and the problems are real, the scammers may:

·       pretend to be from a well-known company – like Microsoft, Chase VISA, Dell, AT&T, or Apple

·       use lots of technical terms to convince and confuse you

·       ask you to get on your computer and open some files – and then tell you those files show a problem (when they don’t)

 

Then, once they’ve convinced you that your computer has a problem, the scammers might:

  • ask you to give them remote access to your computer – which lets them change your computer settings, so your computer is vulnerable to attack
  • trick you into installing malware that gives them access to your computer and sensitive data, like user names and passwords
  • try to sell you software that’s worthless, or that you could get elsewhere for free
  • try to enroll you in a worthless computer maintenance or warranty program
  • ask for credit card information so they can bill you for phony services, or services you could get elsewhere for free
  • direct you to websites and ask you to enter your credit card number and other personal information

 

These scammers want to get your money, access to your computer, or both. But there are things you can do to stop them.

  • If you get an unexpected or urgent call from someone who claims to be tech support, hang up. It’s not a real call. And don’t rely on caller ID to prove who a caller is. Criminals can make caller ID seem like they’re calling from a legitimate company or a local number.
  • If you get a pop-up message that tells you to call tech support, ignore it. There are legitimate pop-ups from your security software to do things like update your operating system. But do not call a number that pops up on your screen in a warning about a computer problem.
  • If you’re concerned about your computer, call your security software company directly – but don’t use the phone number in the pop-up or on caller ID. Instead, look for the company’s contact information online, or on a software package or your receipt.
  • Never share passwords or give control of your computer to anyone who contacts you.

 

Article Reference:
https://www.consumer.ftc.gov/articles/0346-tech-support-scams

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 10
[ITWEEKLY] IT Weekly, November 10, 2017

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

November 10, 2017

 

NEW: Accessibility Checker for Canvas

The Accessibility Checker makes it easy for anyone creating content in Canvas to identify and correct some of the most common accessibility issues, saving time, and providing a better experience for all users. When working in the Rich Content Editor within Canvas, you can activate the Accessibility Checker from the toolbar. When activated, it performs an accessibility check on the current content, reports problem areas or concerns and makes it easy to correct any issues. While the Accessibility Checker does not currently examine linked documents, it is extremely useful for everyone using Canvas.

 

If you have any questions about the Accessibility Checker or need assistance with Canvas, contact the OIT HelpDesk online or at 865-974-9900.

 

 


Everyone can learn, but not everyone learns the same way

Attend a new workshop on applying Universal Design Strategies

 

Why is UDL exploding in institutes of higher education around the United States? Because designing and delivering instruction through the UDL framework consistently leads to improved student retention, persistence, and satisfaction.

 

The practice of UDL challenges traditional methods through intentionally, proactively designing as if our students aren't “average” (they aren’t). Development of clear learning objectives, alignment of assessments, and provision of flexibility whenever and wherever it is sensible puts learning squarely in students’ hands. Students in UDL classrooms not only learn to be chemists, teachers, sociologists, etc.… but learn to be expert learners.

 

Sign up for the “Include Diverse Learners on Canvas with UDL” workshop on Wednesday, November 15 from 10:10 am-11:25 am. Attendees will walk away with concrete strategies for using UDL principles to make your Canvas courses better for all of your students.

 

If you are unable to attend this workshop and want to learn more about designing effective assessments, check out our asynchronous, self-paced course, Implementing UDL on Canvas.  For a sneak peek, check out this three-minute clip.


If you have any questions or would like more information about UDL,
contact the OIT HelpDesk online or at 865-974-9900


Learn more about Affordable Resources to Enhance Student Success

Join us on Wednesday, November 15, 12:20 pm to 1:10 pm in Hodges Library Practice Presentation Room (220E) to learn about Accessing Open Educational Resources (OER). 

 

Bring your lunch and a colleague to attend the November Instructional Technology Community of Practice (ITCoP) discussion.  Presenters include Rachel Caldwell, UTK’s Scholarly Communication & Publishing Librarian and Adam Alsamadisi, Geography GA and Geography 101 Instructor. 


Visit the ITCoP website for more information.

 


Amos for Windows by SPSS, an IBM company

What is it? Amos (Analysis of Moment Structures) analyzes Structural Equations Models (SEM) by either drawing a path diagram or via a command language. These models are also known as LISREL models, confirmatory factor analysis, analysis of covariance structures, path analysis, or causal modeling.

 

Where can I run it? Amos is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs. The download and installation instructions are on the OIT software download page. For UTK, Amos is also available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for Amos.

 

How can I learn it? You can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 865-974-9900. A tutorial is also provided as part of the Amos Help files.

 

Where can I get support? OIT offers Full Support for this software. For assistance, contact the OIT HelpDesk at 865-974-9900.

 


Workshops for November 13 – 17, 2017

Adobe

Adobe Photoshop 3 (Banners, Brushes, and Colors), November 14, 9:40 am – 11:40 am

Adobe Photoshop 4 (Photo Manipulation), November 16, 9:40 am – 11:40 am

 

Instructors

Turning Point 8 and Enhanced Learning, November 16, 1:00 pm – 2:30 pm

BYOD with WolfVision Cynap, November 16, 1:00 pm – 2:00 pm

Teaching in a Technology Enhanced Classroom (TEC), November 16, 3:30 pm – 5:00 pm

Using UDL to Design Quality Courses in Canvas, November 15, 10:10 am – 11:25 am

 

Microsoft

Microsoft Excel 3 (Advanced Features), November 17, 9:05 am – 11:00 am

 

Research

Introduction to ESRI tools available to UTK community, November 14, 2:00 pm – 4:00 pm

SPSS AMOS: Structural equation modeling, November 17, 10:00 am – 12:00 pm

Collector for ArcGIS and Survey123: Collecting Qualitative Data in a GIS Context, November 17, 10:00 am – 12:00 pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 


Online Holiday Shopping

With the holiday’s right around the corner, many of us will begin the task of holiday shopping.  As you do so, it is important to be aware that the retail industry is an increasingly attractive target for criminals looking to steal credit card data. 

 

Whether shopping online or in store, it is important that you protect your personal information so that you can avoid being a victim of identity theft. But first, you might ask, “How do I know if my identity has been stolen?”  With the increase in retailer data breaches, consumers must take it upon themselves to closely monitor their account activity. The following are some examples of changes that could indicate someone has accessed your information: 

 

              Unusual or unexplainable charges on your bills

              Phone calls or bills from accounts, products, or services that you do not have

              Failure to receive regular bills or mail 

              New, strange accounts appearing on your credit report

              Unexpected denial of your credit card 

 

Several habits can help protect you from online identity theft: 

 

              Guard your information online. Never provide your personal information to unsolicited emails and advertisements. Holiday deals may be tempting, but checking the retailer’s website first can better protect your information. 

              Clear your logins and passwords. This is especially important if you are working on a public or shared computer.

              Pay for online purchases with your credit card, which has better guarantees under federal law then your online payment services or your debit card. 

              Always verify that you are on a familiar website with security controls before entering personal data.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 03
[ITWEEKLY] IT Weekly, November 3, 2017

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

November 3, 2017

 

The Usual Suspects: Phishing

Are you receiving emails about your email account closing or that you are running out of space?  Do these emails appear to be urgent and from an IT administrator?  Many scammers use fear and intimidation to make you believe you must take action to retain access to your account or to stay in school.

 

This year, we have seen an increase in email scams, known as phishing, sent to our faculty, staff, and students.  Many of these are the result of compromised accounts on our campus.  Responding to these scams leads to more compromised accounts and more phishing scams. When a phishing scam is reported to OIT, we take immediate action to protect you.  However, you also need to be aware and not be caught by the scam. 

 

Watch our video or visit the phishing website to learn how to spot an email scam.

 

 

WHAT YOU SHOULD DO IF YOU RECEIVE A SUSPICIOUS EMAIL

  • Check to see if the email has been reported on OIT's System Status Center: Recent Email Scam.
  • Report suspicious emails and phishing scams to abuse@utk.edu. Once reported, delete the message.
  • If you think the message might be legitimate, or if you are worried about the consequences of ignoring it, look up the organization independently and contact them directly.
  • Do not click on links or call phone numbers provided in the message. They may redirect you to fake sites that mimic the real thing.
  • Do not respond to the email.
  • Do not send your password via email.

 

If you have any questions about an email you receive, contact the OIT HelpDesk at 865-974-9900 or help.utk.edu.

 


OneDrive: Files on Demand

Microsoft recently announced that OneDrive Files on Demand is now available with the Windows 10 Fall Creators Build.  With Files On-Demand, you can access all your files in the cloud without having to download them and use storage space on your computer. You don’t have to change the way you work, because all your files—even online files—can be seen in Windows File Explorer and work like other files on your computer. 

 

OneDrive Files on Demand works with both your personal OneDrive files as well as Office 365 group files.

 

To use this feature, you will need to install the Fall Creators Build and update the OneDrive client for your computer.  Once you have signed in, you can enable the Files On-Demand feature.  Once enabled, files stored in the cloud will have a cloud icon next to the file.  Files downloaded to your computer will have a green checkmark.  You can choose to “Free Up Space” by right-clicking on a file.  The file will continue to be available in the cloud, however, the local copy will be removed, and you will free up space on your hard drive.

 

If you have any questions or would like assistance enabling OneDrive Files On-Demand, contact the OIT HelpDesk at 865-974-9900.

 


Email and the Tennessee Public Records Act

The Tennessee Public Records Act requires that most records related to official business of the university must be made available for inspection by any Tennessee citizen. The law defines a "public record" broadly as a record "made or received pursuant to law or in connection with the transaction of official business of the university, regardless of physical form and specifically including electronic records." Everyone should be mindful in their daily interactions that the use of e-mail to transact official university business is subject to the Public Records Act.

 

It is also important to note that the Public Records Act requires the university to disclose UT employee information such as name, title and salary information upon request by a Tennessee citizen. However, the Public Records Act does not require the university to disclose certain confidential employee information, such as employees' home addresses, Social Security numbers or banking information.

 

To ensure we handle all requests in the same way, the university has established public records request coordinators for each campus. The primary contact for the Knoxville campus is Charles Primm in the Office of Media and Internal Relations.

 

Requests, either written or verbal, for documents that are outside your department's normal business or academic transactions should be referred to Charles Primm at 865-974-2225 or charles.primm@tennessee.edu.

 


WordStat by Provalis Research, Inc.

What is it? WordStat is a supplemental program that works with either QDA Miner or Stata to perform content analysis on text data. This process is also known as text mining. You may create your own categorization dictionaries within WordStat or import pre-existing subject dictionaries. It can also extract topics automatically using latent semantic analysis. WordStat provides many of the same types of analyses as QDA Miner such as co-occurrence analysis and analyzing text categories by other variables such as age or gender. WordStat can only be started from within QDA Miner or Stata.

 

What can I use it for? Students, faculty, and staff can use WordStat for university-related academic or administrative purposes. Use that benefits outside organizations requires the purchase of a commercial license.

 

Where can I run it? WordStat is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs and Macs. The download and installation instructions are available at the OIT Software Download web page. It is also available on OIT’s Apps@UT server and in the OIT public computer lab. There is no simultaneous user limit for WordStat.

 

How can I learn it? OIT offers workshops on WordStat each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 865-974-9900. Tutorials are also available online at the company’s web page for tutorials. There are also several thousand tutorials available in a variety of languages on YouTube.

 

Where can I get support? OIT offers Full Support for this software. For assistance, contact the OIT HelpDesk at 865-974-9900.

 


Workshops for November 6 – 11, 2017

Adobe

Adobe Photoshop 1 (Selections and Manipulations), November 7, 9:40 am – 11:40 am

Adobe Photoshop 2 (Layers, Frames, and Edges), November 9, 9:40 am – 11:40 am

Spark, November 8, 10:10 am – 11:10 am

 

Microsoft

Microsoft Excel 2 (Forms, Charts, and Macros), November 10, 9:05 am – 11:0 am

 

Research

Analysis of Clinical Trials, November 8, 1:00 pm – 3:00 pm

ArcGIS Online Tools: Adding spatial context, data and maps to research, November 9, 2:00 pm – 4:00 pm

 

Other

Social Media, LinkedIn, and Your Resume, November 10, 10:00 am – 11:00 am

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 


How to Guard Against Phishing

According to Verizon's 2017 Data Breach Investigations Report, the education sector saw a rise in social engineering–based attacks. Students, staff, and faculty all suffered losses when personal data and research were disclosed to unauthorized parties. Phishing played a part in more than 40% of these breaches. Knowing what you're up against can help you be more secure. Here are a few things you can do to guard against phishing attacks:

 

  • Limit what you share online. The less you share about yourself, the smaller the target you are for a phishing attack. Cybercriminals use the information you post online to learn how to gain your trust.
  • Protect your credentials. No legitimate company or organization will ask for your username and password or other personal information via e-mail. Your school definitely won't.
  • Beware of attachments. E-mail attachments are the most common vector for malicious software. When you get a message with an attachment, delete it—unless you are expecting it and are absolutely certain it is legitimate.
  • Confirm identities. Phishing messages can look official. Cybercriminals steal organization and company identities, including logos and URLs that are close to the links they're trying to imitate. There's nothing to stop them from impersonating schools, financial institutions, retailers, and a wide range of other service providers.
  • Trust your instincts. If you get a suspicious message that claims to be from an agency or service provider, use your browser to manually locate the organization online and contact them via their website, e-mail, or telephone number.
  • Check the sender. Check the sender's e-mail address. Any correspondence from an organization should come from an organizational e-mail address. A notice from your college or university is unlikely to come from YourIThelpdesk@utk.yahoo.com.
  • Take your time. If a message states that you must act immediately or lose access, do not comply. Phishing attempts frequently threaten a loss of service unless you do something. Cybercriminals want you to react without thinking; an urgent call to action makes you more likely to cooperate.
  • Don't click links in suspicious messages. If you don't trust the e-mail (or text message), don't trust the links in it either. Beware of links that are hidden by URL shorteners or text like "Click Here." They may link to a phishing site or a form designed to steal your username and password.

 

Article Reference: https://er.educause.edu/blogs/2017/9/october-2018-dont-let-a-phishing-scam-reel-you-in

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

1 - 10Next