Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
January 13
[ITWEEKLY] IT Weekly,  January 13, 2017

 

January 13, 2017

 

OIT Services to be interrupted on January 15

The Office of Information Technology will be making infrastructure improvements between 10:00 PM EST on Sunday, January 15 and 2:00 AM EST on Monday, January 16. During this time, most of our core services will experience several brief interruptions lasting a few minutes per service. 

 

Specific programs that will be affected by the planned outage include, but are not limited to: online registration, advising and financial services through MyUTK, T-Storage, IRIS, ANDI, Archibus, SharePoint, OIT UNIX systems, Online@UT (Blackboard), Apps@UT, VolPrint and the OIT Computer Labs,  Network Registration and Classification, and access to Digital Media Services and online web streaming.Backup services for hosted servers, Volcard deposits, Parking Services, and several other OIT applications will also be unavailable. 

 

Email sent through Office 365 or Google will not be affected; however, system messages sent through smtp.utk.edu and Listserv will be briefly unavailable.  

 

Many web pages hosted by the utk.edu and tennessee.edu domains, including many departmental sites, the OIT website, and personal web pages may also be offline.   NetID authentication, as well as the website for changing your password, will be affected. 

 

Voice over IP phones will be intermittently unavailable during the maintenance. Traditional phones and voicemail will not be affected. 

 

Access to the Internet from the campus network, including university housing, will not be impacted by these brief interruptions.   

 

If you have questions or concerns regarding this announcement, please contact the OIT HelpDesk at 865-974-9900. 

 

Need Help in Your Technology Enhanced Classroom (TEC)? 

More than 200 classrooms across campus have technology enhancements, which include touch panel controls for system components, computer display via projector, and in most cases a high-quality document camera and interactive devices, such as SMARTboards, SMART Podiums, or Epson interactive projectors. 

 

Faculty, GTAs, and staff can request one-on-one or group training to learn how to use the technology in your classrooms. Training workshops are also offered at the beginning of each spring and fall. Quick Start guides are available in each classroom that will remind you how to connect your laptop to the projector and SMART device. 

 

If you find yourself in a jam at the beginning of class, call the TEC Hotline, 974-9110, for immediate assistance. 

 

For non-emergency requests, contact the HelpDesk at (865) 974-9900 or online at http://help.utk.edu. Additional information about the technology-enhanced classrooms is available onOIT’s TEC website

 

Looking for Certain Classroom Features?

Don’t forget to use the online classroom search, which exists to aid faculty in determining if their assigned classroom meets their needs. Faculty can search by building and room number, room capacity, or even down to specific equipment (technology) or furniture features of a classroom. A link to the “Classroom Search” tool can be found in the myUTK portal, in the My Services list. 

 

Several classrooms are now equipped with the new Wolfvision Cynap, which allows for ‘untethered’ remote access for the instructor within the classroom and additional classroom interaction. If your room is equipped with a Cynap, contact the OIT HelpDesk at 865-974-9900 about leveraging the Cynap to engage your class today.

 

Report wireless problems in your classroom 

Did you know that the Office of Information Technology offers a service to report classroom wireless issues via text message? To report areas on campus where there may be issues with the wireless network, text “UTKwifi” followed by your building and room number information to 55000. 

 

This initiative allows OIT to collect crowdsourced data provided by you, the students, staff, and faculty that are in the classrooms using the Wi-Fi every day. It is recommended to check that your device has been registered for use on the wireless network and was working normally in other areas of campus before texting in your location. This will help ensure that we have the most accurate data possible. As an added benefit of this service, if we receive several text messages in a short time frame for a specific area (for example an academic classroom in Alumni Memorial Building), OIT will investigate the issue and dispatch network engineers if necessary. This information, including a screenshot example of how to text in your location, is available in the OIT Knowledge Base. If you have any questions about the pilot, contact the OIT HelpDesk online or call (865) 974-9900. 

 

Maple by Maplesoft

What is it? Maple is a technical computing environment for problem-solving designed for students in mathematics, statistics, engineering, and science. Maple features palettes, interactive assistants, context-sensitive menus, and tutors. Maple has Clickable Math tools for solving complex mathematical problems in small steps, adding to the student learning process. The Smart Popups and Drag-to-Solve tools help students learn mathematics through guided experimentation. Maple also includes a large number of Math Apps that provide both students and teachers interactive illustrations and insight into concepts from math, statistics, physics and finance.

 

Where can I run it? Maple is available at no additional charge to faculty, staff and students at UTK, UTSI, UTC, UTM for installation on university-owned and personally-owned Windows, Mac and Linux computers. The download and installation instructions are at OIT's software download page. For UTK, Maple is also available on OIT’s Apps@UT server, the Newton Linux Cluster, and on the computers in the OIT public computer labs. There is no simultaneous user limit for Maple.

 

How can I learn it? Maplesoft, Inc. provides learning materials on their training page.

 

Where can I get support? OIT offers Minimal Support by contacting the OIT HelpDesk at 974-9900. If you need assistance from Maplesoft, visit their support web page. There you can browse the FAQs, request assistance via the Technical Support Request Form or contact the Technical Support Team by sending an email to support@maplesoft.com or call (800) 267-6583 Ext 413 Monday – Friday, 9 AM to 5 PM EST. You can view or download manuals from their documentation center.

 

Workshops for January 16-20, 2017

Instructor-Focused:

·   Cloud Storage Options at UTK, January 17, 9 am – 11 am

·   Creating Accessible Documents on a Mac, January 17, 1 pm – 3 pm

·   Open Consultations for Transition to Canvas, January 17, 1 pm – 2 pm

·   Teaching in a Technology Enhanced Classroom (TEC) 1, January 17, 2 pm – 3 pm

·   Creating Accessible Documents with Adobe Acrobat DC, January 18, 9 am – 11 am

·   Getting to Know Canvas, January 18, 9 am – 11 am

·   iPads and Instruction, January 19, 1 pm – 3 pm

·   Getting to Know Canvas, January 20, 10 am – 12 pm

·   Using Skype for Business for Online Office Hours, January 20, 1 pm – 2 pm

 

Researcher-Focused:

·   NVivo11 Fundamentals, January 17, 11 am - 12:30 pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Physical Cyber-Security

Many times, we become so conscious about "technical" cyber-security that we forget about “physical” cyber-security. All of the technical safeguards in the world will not protect against someone being able to sit at your computer and access your information. Therefore we must remember that leaving our computer unattended for only a moment without locking it allows private and confidential information to become vulnerable. Locking your computer prevents unauthorized access to secure files, e-mail conversations and prevents data from being altered. It must become routine that you lock your computer whenever it is unattended. This seems like a simple thing, but physical security is so often neglected.

 

Physical cyber-security isn’t restricted to your laptop, desktop or smartphone. Clearing your desk before you leave or before you’re away from the office for a few days can greatly protect paper documents that contain sensitive information related to our work. So, what does this

have to do with cyber-security? Besides just looking tidy, clearing your desk reduces the threat of an information security incident, as confidential information will be locked away when unattended. Sensitive documents left in the open can be stolen by a malicious entity.

 

At known extended periods away from your desk, such as a lunch break, sensitive working papers should be placed in locked drawers. At the end of the working day, put away all office papers. At a very minimum, place sensitive documents in a drawer, away from prying eyes. If in doubt throw it out. If you are unsure of whether a duplicate piece of sensitive documentation should be kept - it will probably be better to shred it or place it in the shred bin designated for sensitive information. Some scan documents and store them in protected or encrypted areas like UTK's Google Drive or One-Drive areas.

 

Lock away portable computing devices. Treat mass storage devices such as CDROM, DVD or USB drives as sensitive and secure them in a locked drawer.

 

All the technical safeguards in the world won’t protect a spreadsheet of sensitive data, printed out for review and left lying on the desk for weeks on end. If possible, locking your desk or filing cabinets go a long way in protecting the university’s information. This seems like a simple thing, but physical security is so often neglected.

 

The idea extends to home as well. Protect your computer with a password and if you’re finished with sensitive personal documents (checkbooks?), place them in a secure place or out of eyesight when you’re done with them or until you need them. Consider purchasing a small lockbox to store those documents until you can get them to the safety deposit box. Scanners are affordable and fast. Scanning old bills or correspondence with sensitive information and disposing of the original (shredders are cheap too!) is good practice.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

January 06
[ITWEEKLY] IT Weekly, January 6, 2017

 

January 6, 2017

 

Zoom Test Flights

If you are taking an entirely online course, you may just be using Zoom! Zoom, our UTK cloud-based conferencing technology, allows faculty, staff, and students to have high-quality interaction in real time from their computers and mobile devices. You’re invited to join us online for the Spring 2017 Test Flights! Test Flights provide faculty and students an opportunity to join an online meeting and test the communication tools available to meeting participants. Test Flights will be held via the Zoom application. 

 

Participants are welcome to join either of the meetings below, and you may exit the online meeting at any time.

o Monday, January 9, 11:00am to 1:00pm

o Tuesday, January 10, 5:00pm to 7:00pm

 

You may review the specific instructions and additional information about Zoom before joining a Test Flight.

 

Use Lynda.com to Supplement your Course!

Our Lynda.com campus subscription provides a vast online library of instructional videos covering the latest in software product tutorials, creative design techniques, and professional development training. With more than 2,500 courses taught by industry experts, lynda.com is designed for all levels of learners, and at least 20 new courses are added weekly. Create playlists for yourself or to share with those inside the UTK domain, adding your content for students to access all in one online collection. Enter through the UTK portal here: https://oit.utk.edu/lynda with your NetID and Password and enjoy these benefits and more!

 

o Unlimited access to thousands of courses

o Beginner to advanced courses

o Full courses or segments dedicated to certain tasks

o Closed captioning on many videos, with a time-coded transcript

o Access to course instructor's materials added through playlist creation

o Mobile connections and offline viewing from smartphone, tablet or computer

o Faculty can be group administrator: Upload student group, assign tasks and export reports on student progress.

 

For assistance with these tools in Lynda.com, contact the OIT HelpDesk online or call (865) 974-9900.


Coming Soon: Classification Survey

The Office of Information Technology (OIT) continues to respond to recent security audit findings, including the recommendation that we collect information about the type of information stored, viewed, or processed on all university owned equipment. 

 

eOver the next year, you will be asked to submit a Classification Survey for your university owned equipment.  If you want to get ahead, submit your survey now at  classify.utk.edu.  This survey must be completed annually.

 

Who will be impacted?

Faculty, staff, and student employees using university equipment will be notified by email when they need to complete the survey.

 

Please note: Once you receive your first notice, you will have 30 days to respond.  If the survey is not completed in 30 days, you network registration will be deleted, and you will have to re-register the device before getting back online.

 

What do you need to do now?

Review your devices online at classify.utk.edu

 

If any of your personally-owned devices are on the list, you should change the status to reflect that it is your personal device.  If you are not the owner of the record, contact the owner or the OIT HelpDesk and request the change.

 

Questions?

Contact the OIT HelpDesk at 865-974-9900.

 

LISREL by Scientific Software International

What is itLISREL analyzes Structural Equations Models (SEM). Variations of these models include confirmatory factor analysis, analysis of covariance structures, path analysis, or causal modeling. LISREL is viewed by many as the most powerful and most difficult to learn of the SEM packages we have available.

 

Where can I run it? For UTK, LISREL is available on Apps@UT and the computers in the OIT public computer labs. There is a two simultaneous user limit for LISREL.

 

How can I learn it? The user and reference guides are available in the software's Help Menu.

 

Where can I get support? OIT offers Minimal Support for this software. The Structural Equation Modeling Discussion Network is a useful source of assistance.

 

Workshops for January 9-13, 2016

Instructor-Focused:

BYOD with WolfVision Cynap

January 10, 1:00pm - 2:30pm

January 13, 1:00pm - 2:30pm

 

Getting to Know Canvas

January 9, 1:00pm - 3:00pm

January 11, 2:00pm - 3:00pm

January 13, 10:00am - 12:00pm

 

Open Consultations for Transition to Canvas

January 10, 2:00pm - 3:00pm

January 12, 9:00am - 10:00am

January 13, 11:00am - 12:00pm

 

Teaching in a Technology Enhanced Classroom (TEC) 1

January 10, 3:30pm - 5:00pm

January 11, 3:30pm - 5:00pm

January 12, 12:35pm - 2:05pm

January 13, 9:00am - 10:30am

 

TurningPoint Cloud Basics

January 9, 1:00pm - 2:30pm

January 10, 8:30am - 10:00am

January 10, 10:30am - 12:00pm

January 11, 8:30am - 10:00am

January 11, 10:30am - 12:00pm

January 11, 12:30pm - 2:00pm

January 12, 1:00pm - 2:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

It’s Tax Season! Don’t be a victim!

Its tax season and soon, the W-2’s and associated forms will start circulating, which means we must be aware of tax scams. In past years, there have been three popular scams criminals have used that people fall victim too. The three scams include falsifying tax returns and filing them in a victim’s name, calling a victim and pretending to be Internal Revenue Service (IRS) agents and phishing e-mails.

 

Falsifying tax returns and filing them in a victim’s name can occur when a malicious actor finds or receives information about the tax filer, including the filer’s name, address, date of birth and Social Security number. The malicious actor then uses this information to file a malicious tax return, citing as many deductions as possible, in order to create the largest tax return possible.

 

Another scam occurs when the malicious actor contacts the victim and tries to convince the victim to do something, such as immediately paying a fine or providing their financial information so a refund can be issued. In these instances, the malicious actor uses what they know about the victim, often information gained for a data breach or social networking website, to convince the victim that the caller has access to the victim’s tax information. Frequently during these calls, the caller will pretend to be an IRS agent.

 

In the third type of tax scam, malicious actors use tax-related spam, phishing emails, and fraudulent websites to trick victims into providing login names, passwords, or additional information, which can be used in further fraud. Other emails or websites may also download malware to a person’s computer that may make them vulnerable to tax fraud.

 

Be Cautious

o Watch for “spoofed” websites that look like the official website but are not.

o Don’t be fooled by unsolicited calls. The IRS will never call to demand an immediate payment or require you to use a specific payment method such as pre-loaded debit or credit cards, or wire transfers. They will never claim anything is “urgent” or due immediately, nor will they request payment over the phone. If you owe taxes, the IRS will first mail you a bill, before contacting you through another medium.

o The IRS will not be hostile, insulting, or threatening, nor will they threaten to involve law enforcement in order to have you arrested or deported.

o Sometimes malicious actors change their Caller ID to say they are the IRS. If you’re not sure, ask for the agent’s name, hang up, and call the IRS (or your state tax agency) back using a phone number from their official website.

Recommendations

If you believe you are the victim of identity theft or identity fraud, there are a couple of steps you should take:

 

1.            File a report with your local law enforcement agency.

2.           File a report with the Federal Trade Commission (FTC) at www.identitytheft.gov.

3.           File a report with the three major credit bureaus and request a “fraud alert” for your account (Equifax – www.equifax.com, Experian – www.experian.com, TransUnion – www.transunion.com)

 

If you receive spam or a phishing email about your taxes, do not click on the links or open any attachments, instead, forward the email to phishing@irs.gov. Other tax scams or frauds can be reported according to the directions on this IRS Suspected Tax Fraud web page.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

December 22
[ITWEEKLY] IT Weekly, December 22, 2016

 

 

December 23, 2016

 

OIT HelpDesk Closed for the Winter Break

The OIT HelpDesk will be closing at 8:00 p.m. on Friday, December 23, for the Winter Break. While the university is closed, OIT will continue to monitor the network, email, and major computer applications. To check the current status of IT systems, please visit the online IT System Status Center at http://help.utk.edu/status.

 

The Telephone OIT HelpDesk will reopen on Tuesday, January 3. We will follow up on any normal support requests received over that break beginning at 8:00 a.m. on this day.   

 

Reminder: Upgrades Scheduled for December 26

The Office of Information Technology (OIT) will be making infrastructure improvements between Monday, December 26, at 8:00 AM and Tuesday, December 27, at 8:00 AM EST.  This project will interrupt many services including, but not limited to, MyUTK, Volcard deposits, Parking Services, and several other OIT applications

 

If you have any questions or concerns regarding the maintenance, please contact the OIT HelpDesk at (865) 974-9900.

 

UT accounts not affected by Lynda.com breach

Last week, Lynda.com contacted many of its users regarding a security breach.  Some of the Lynda.com accounts were compromised, however, only contact information and learning histories of the UT accounts were accessed during this event.  Lynda.com has contacted all the affected users, and you do not need to take any action if your UT Lynda.com account was affected.

 

If you have any questions, please contact the OIT HelpDesk at (865) 974-9900.

 

LabVIEW by National Instruments  

What is it? LabVIEW is a graphical program commonly used by scientist and engineers for data acquisition, instrument control, and industrial automation. UT’s NI Academic Site License for LabVIEW Teaching and Research (Large) includes the LabVIEW Professional Development System (LabVIEW PDS) and several add-on modules and toolkits. View the lists of all the application-specific modules and toolkits available, including current and previous versions, at the company's academic software download site.

 

Where can I run it? LabVIEW is available at no additional charge to UTK and UTSI faculty and staff for installation on university-owned Windows, Macs and Linux PCs. Students typically use LabVIEW in a lab environment; however, LabVIEW can be installed on student-owned PCs for use when doing research only.  Student installation for course work is prohibited.  The download and installation instructions are on OIT's software download site.

 

How can I learn it? The source of learning LabVIEW is at NI academic training page. Note: Login Required for LabVIEW online training. LabVIEW Core 1, 2, and 3 is free under UT’s NI Subscription Service Program (SSP) contract; LabVIEW Self-Paced Video Training for Students website geared toward students and offers videos, exercises and self-quizzes.

 

Where can I get support? OIT offers Minimal Support for LabVIEW.For assistance, see the company's support website.

 

Anything else I need to know? NI Field Engineers visit UTK periodically to provide LabVIEW training and to help researchers set up LabVIEW projects. You can connect with the NI Southeast Academic Field Engineer for Tennessee on their NI Academic Community web page.

 

Workshops for January 3-6, 2017

Instructor-Focused:

Getting to Know Canvas

o   January 3, 9 am – 11 am

o   January 5, 10am – 12pm

TurningPoint Cloud Basics

o   January 3, 1 pm – 2:30 pm

o   January 4, 9:30 am – 11 am

o   January 5, 9:30 am – 11 am

Open Consultations for Transition to Canvas

o   January 4, 10 am – 11 am

o   January 6, 1 pm – 2 pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Holiday Season Scams

The season of Santa, reindeer, gifts and eggnog is upon us, which means we must be cautious of common holiday ploys to steal credit card and personal information. With the mass amount of on-line gift buying during the holiday season, cyber security criminals believe this presents a prime opportunity to steal your information. Be aware of e-mails or any on-line advertising that seems too good to be true. False advertisements and phishing e-mails are two ways in which cyber security criminals will try to lure you in to steal your information. Remember, if the deal looks too good to be true, it probably is.  

 

Here are some additional tips you can use to avoid being a victim of cyber fraud: 

o    Check your credit card statement routinely.

o    Protect your credit card numbers from “wandering eyes.”

o    Do not respond to unsolicited (spam) e-mail.

o    Do not click on links contained within an unsolicited e-mail.

o    Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.

o    Avoid filling out forms contained in e-mail messages that ask for personal information.

o    Always compare the link in the e-mail to the link you are actually directed to and determine if they match and lead you to legitimate site.

o    Log on directly to the official website for the business identified in the e-mail, instead of “clicking” to it from an unsolicited e-mail.

o    If you are requested to act quickly, or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.

o    Verify any request for personal information from any business or financial institution by contacting them using the main contact information for their official website. Remember if it looks too good to be true, it probably is.

o    Be cautious when using public ATM's; paying attention to prying eyes or equipment that just doesn't look right. Contact the owners of the business or your financial institution and report it.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

December 16
[ITWEEKLY] IT Weekly, December 16, 2016

 

December 16, 2016

 

Reminder: OIT Services to be interrupted on Dec 19

The Office of Information Technology will be making infrastructure improvements on Monday, December 19, between 10:00 PM and 2:00 AM EST. Many of our core services will be impacted during this maintenance period.  Additional information is available on OIT’s System Status Center.

 

If you have questions or concerns regarding this announcement, please contact the OIT HelpDesk at 865-974-9900.

 

Away from your email during the Winter Break?

It’s almost time for UT’s Winter Break! If you’re heading out of town or will be away from your email, you can set up your email to send an Out of Office reply on your behalf. Instructions for configuring automatic replies are in the OIT Knowledge Base:

 

If you have any questions or would like assistance, please contact the OIT HelpDesk at 865-974-9900.

 

Information about setting your Volmail password options is available in the OIT Knowledge Base, or you may contact the OIT HelpDesk online or call 865-974-9900 for assistance.

 

Coming in January 2017
The Office of Information Technology (OIT) continues to take steps to improve our information security posture, including recommendations from our security assessor that we collect information about the type of data stored, viewed, or processed on all university owned equipment.  In July 2016, we began collecting this information for any new devices connecting to the UT network.  In 2017, we will collect this information on all the current university owned equipment.  We will send email to the appropriate faculty, staff, or student when it is time for them to provide us this information.  Additional information about this initiative will be available next month.

 

LabVIEW by National Instruments (NI)

What is it? LabVIEW is a graphical program commonly used by scientist and engineers for data acquisition, instrument control and industrial automation. UT’s NI Academic Site License for LabVIEW Teaching and Research (Large) includes the LabVIEW Professional Development System (LabVIEW PDS) and several add-on modules and toolkits. View the lists of all the application-specific modules and toolkits available, including current and previous versions, at the company's academic software download site.

 

Where can I run it? LabVIEW is available at no additional charge to UTK and UTSI faculty and staff for installation on university-owned Windows, Macs and Linux PCs. Students typically use LabVIEW in a lab environment; however, LabVIEW can be installed on student-owned PCs for use when doing research only. Student installation for course work is prohibited. The download and installation instructions are on OIT's software download site.

 

How can I learn it? The source of learning LabVIEW is at NI academic training page. Note: Login Required for LabVIEW online training. LabVIEW Core 1, 2, and 3 is free under UT’s NI Subscription Service Program (SSP) contract; LabVIEW Self-Paced Video Training for Students website geared toward students and offers videos, exercises and self-quizzes.

 

Where can I get support? OIT offers Minimal Support for LabVIEW. For assistance, see the company's support web site.

 

Anything else I need to know? NI Field Engineers visit UTK periodically to provide LabVIEW training and to help researchers setup LabVIEW projects. You can connect with the NI Southeast Academic Field Engineer for Tennessee on their NI Academic Community web page.

 

Workshops for December 19-23, 2016

Instructor-Focused:

·   Open Consultations for Transition to Canvas, December 20, 2:00pm - 3:00pm

·   Open Consultations for Transition to Canvas, December 21, 11:00am - 12:00pm

 

Researcher-Focused:

·   Qualtrics 1 (Web Survey Design), December 19, 10:00am - 12:00pm

·   Qualtrics 2 (Reporting and Analysis Tools), December 19, 1:00pm - 3:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

2016 Security Awareness Training Ending on 12/31

Faculty and staff members of the University of Tennessee have an obligation to protect sensitive information and the IT systems we use. To enhance the safety of user information, computers, and IT systems, the University of Tennessee offers access to “Securing the Human,” an on-line training program that provides faculty and staff with the information needed to engage in informative and efficient security training.

 

The training is produced by SANS, one of the most trusted and by far the largest source for information security training and security certification in the world.

 

The training consists of several videos that cover specific security topics. The videos range from 1 to 5 minutes in length and are intended to raise awareness and influence user behavior that will reduce security risks. The training allows the users to complete the training at their own pace, monitor their progress and revisit completed training.

This training is refreshed on an annual basis. Therefore, you have through December 31, 2016 to take advantage of this year’s Securing the Human videos.

 

Users having difficulty in completing the training should call the OIT HelpDesk at (865) 974-9900.

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

 

December 09
[ITWEEKLY] IT Weekly, December 9, 2016

 

December 9, 2016

 

OIT Services to be interrupted on Dec 19

The Office of Information Technology will be making infrastructure improvements on Monday, December 19, between 10:00 PM and 2:00 AM EST. Many of our core services will be impacted during this maintenance period.

 

Specific programs that will be affected by the planned outage include, but are not limited to, online registration, advising and financial services through MyUTK, T-Storage, IRIS, ANDI, SharePoint, OIT UNIX systems, and access to Digital Media Services and online web streaming.Backup services for hosted servers, Volcard deposits, Parking Services, and several other OIT applications will also be unavailable.  

 

Email sent through Office 356 or Google will not be affected, however, system messages sent through smtp.utk.edu and Listserv will be unavailable.  

 

Many web pages hosted by the utk.edu and tennessee.edu domains, including many departmental sites, the OIT website, and personal web pages may also be offline.   The website for changing your password will not be available and some authentication services will be impacted. 

 

If you have questions or concerns regarding this announcement, please contact the OIT HelpDesk at 865-974-9900.

 

Email Access After Leaving UT

Faculty and staff retain access to their UT email account for one year after leaving the University. Retirees with 10+ years of creditable service can request a permanent email account.

 

Students are allowed to retain their Volmail account when they graduate or leave UT. OIT encourages students to go ahead and set up the Volmail password reset options now. If you forget your password or have trouble signing in, you will be able to answer your security questions and create a new password. Once your NetID access has expired, OIT will be unable to reset your password.

 

Information about setting your Volmail password options is available in the OIT Knowledge Base, or you may contact the OIT HelpDesk online or call 865-974-9900 for assistance.

 

Reminder: Faculty First Grant 2017 Call for Proposals

OIT Instructional Support invites UTK faculty to apply for the 2017 Faculty First Grant. Proposals are due by Monday, December 12, 2016. The program runs from February to December 2017.

Read the Call for Proposals at the Faculty First website.

Please contact the Program Coordinator Tonya Mathis at 974-9670 or tmathis9@utk.edu.

 

KNIME by KNIME GmbH

What is it? KNIME is free and open source software for data science. It uses a workflow (flowchart) interface that lets you control the flow of your analysis by connecting icons with arrows. Each icon represents one step in your analysis and is configured with dialog boxes. This makes it easy to learn and yet able to perform complex analyses without having to learn a programming language.

 

Where can I run it? You can download it from KNIME.org to run on your PC, Mac, or Linux computer. Any number of users can also run it at the same time on the Apps.utk.edu server.

 

How can I learn it? OIT teaches workshops each semester on it. The company also has a KNIMETV channel on YouTube as well as an online self-training page.

 

Where can I get support? OIT offers Minimal Support for KNIME. The company runs a discussion forum where people can help one another with technical support issues.

 

Workshops for December 5-9, 2016

Instructor-Focused:

o Open Consultations for Transition to Canvas, December 12, 1:00pm - 2:00pm

o Getting to Know Canvas, December 13, 9:30am - 11:30am

o Getting to Know Canvas, December 14, 1:30pm - 3:30pm

o Open Consultations for Transition to Canvas, December 16, 10:00am - 11:00am

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

T-Storage vs. OneDrive for Business

Many faculty and staff have become familiar with the functions of T-Storage, UT’s on premise file storage solution. OIT has made available to faculty and staff cloud offerings with both Google Drive and Microsoft OneDrive for Business that not only provide users with more

storage, but additional levels of security (encryption at rest) and additional ease of access from a variety of end point devices.

 

First, there is a drastic increase in storage space available. T-Storage provides users 50 GB of file storage. The cloud offerings from OneDrive and Google Drive have increased their offerings considerably in the recent months (more than we were originally told) and are now touting

‘unlimited’ storage being made available to customers.

 

T-Storage is managed by OIT, located on the UT network, requires that users be on UT’s network or connecting through the VPN in order to access their home area, and is associated with a user’s NetID. OneDrive for Business and Google Drive, though accessible using your UT

credentials, are hosted by their respective vendors and users can access these from a variety of devices anywhere they have Internet access.

 

Finally, OneDrive and Google Drive ensure that your data and information are encrypted in transit, as well as encrypted at rest. Essentially, this ensures that your information has an extra level of security when being uploaded and stored in these cloud service accounts.

 

There is one significant distinction with our Microsoft OneDrive terms: OneDrive for Business is certified to store HIPPA and PHI information. Please keep this in mind if you deal with this type of information. We have discussed the same provision with Google, but at this time are

unwilling to concede to some of the restrictions they require.

 

UT does not contract with nor does OIT endorse the use of any other third-party providers other than OneDrive or GoogleDrive (institutional account only). UT information should not be stored or shared using any other cloud service (e.g. Dropbox, BOX, iCloud).

 

A general summary of all these services is available in the OIT Knowledge Base.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

December 02
[ITWEEKLY] IT Weekly, December 2, 2016

 

December 2, 2016

 

New UT Mobile App is now available

The UT mobile app has been redesigned with a new look and many new features - like the ability to check grades or see holds on accounts.

 

The app will continue to provide all of the features from the previous version and will now include student accounts, student holds, course grades, Canvas, A to Z index, and Need to Know reminders.

 

The Tennessee app is available for iPhones, iPads, and Android devices. Download the free app from the Apple App Store or Google Play.

 

Get Canvas Ready Now

The transition to the Canvas LMS has been met with enthusiasm from both faculty and students. Over 300 faculty in over 400 courses involving over 10,000 students have adopted Canvas for the Fall Semester. Spring 2017 course shells in Canvas are available now. We have also moved over 12,000 older courses from Blackboard to Canvas. We encourage all faculty to make the move to Canvas as soon as they are ready. If you are interested in using Canvas this spring for your class, please contact the OIT HelpDesk online or at 865-974-9900. Let us know now so that we can move your content over from Blackboard or simply attach you to your content in Canvas and get you Canvas Ready for Spring.

 

Blackboard and Canvas will continue to run side-by-side through May 17, 2017, when Blackboard will be retired and unavailable. Check our workshop offerings to take advantage of our face-to-face workshops. You might also be interested in our online self-paced workshop which takes about 2 hours to complete.  Additionally, we are available for Departmental workshops, small group, and individual consultations.

 

Plan now! It is not too early to get Canvas Ready!

 

Reminder: Upgrades Scheduled for December 26

The Office of Information Technology (OIT) will be making infrastructure improvements between Monday, December 26, at 8:00 AM and Tuesday, December 27, at 8:00 AM EST.  This project will interrupt many services including, but not limited to, MyUTK, Volcard deposits, Parking Services, and several other OIT applications.  For a more complete list, please visit the OIT Knowledge Base.  If you have any questions or concerns regarding the maintenance, please contact the OIT HelpDesk at (865) 974-9900.

 

JMP by SAS Institute 

What is it? JMP is software for data management, analysis, and visualization and is commonly used in applications such as design of experiments, scientific research, and quality control. It is particularly strong in visualizing data interactively, offering tools such as multiple linked graphs and 3D rotating scatterplots. The software consists of two products: JMP and JMP Pro. JMP Pro contains everything in JMP plus advanced techniques for predictive modeling, cross-validation, model comparison and one-click bootstrapping. A scripting language is also available in JMP and JMP Pro.

 

Where can I run it? JMP is made available at no additional charge to faculty, staff and students at UT Knoxville, UT Tullahoma, and UT Health Science Center through their respective technology fees for installation on Windows and Mac computers. The download and installation instructions are at OIT's download site. For UTK, JMP is also available on OIT’s Apps@UT server and in the OIT public computer labs. There is no simultaneous user limit for JMP.

 

How can I learn it? The JMP User Community web page provides Web Resources where you can watch on-demand webcasts, a Learning Library that includes guides, tutorials and demos and a JMP Discussion Forum where you can ask questions and share information about the JMP software.

 

Where can I get support? OIT offers Full Support for JMP. The JMP User Community web page also provides JMP Support Resources which include the JMP Knowledge Base, JMP FAQs on the JMP software features and how-to use JMP for various statistics, and a library of JMP documentation. SAS Institute offers free telephone support at (919) 677-8008, online support by submitting a SAS Technical Support Form located at http://www.jmp.com/support/ and email support.

 

Workshops for December 5-9, 2016

Instructor-Focused:

o Getting to Know Canvas, December 5, 9 am - 11 am

o Getting to Know Canvas, December 6, 1:30 pm - 3:30 pm

o Getting to Know Canvas, December 7, 1 pm - 3 pm

o Getting to Know Canvas, December 9, 2 pm - 4 pm

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

What is this "Internet of Things" (IoT)?

In the past, technology was relatively simple; you just connected your computer to the Internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges.

 

The next big technical advancement is the Internet of Things. The Internet of Things, often shortened to IoT, is all about connecting everyday devices to the Internet, devices from doorbells and light bulbs to toy dolls and thermostats. These connected devices can make our lives much simpler; for example, having your lights automatically activate as your phone recognizes when you get close to home. The IoT market is moving at an amazing pace, with new devices appearing every week. However, like mobile devices, IoT devices also come with their own individual security issues and risk.

 

What Can I Do to Protect Myself?

Connect Only What You Need

The simplest way to secure an IoT device is to not connect it to the Internet. If you don’t need your device to be connected and online, don’t connect it to your Wi-Fi network.

 

Separate Wi-Fi network

If you do need your IoT devices online, consider creating a separate Wi-Fi network just for them. Many Wi-Fi access points have the ability to create additional network sand this keeps your IoT devices on an isolated network, where they cannot be used to harm or attack any computer connected to your primary home network.

 

Update When Possible

Just like your PC and mobile devices, keep your IoT devices up to date. If your IoT device has the option to automatically update the application or firmware, do it.

 

Strong Passwords

Change any passwords on your IoT device to a unique, strong passphrase only you know.

 

Privacy Options

If your IoT device allows you to configure privacy options, limit the amount of information it shares. One option is to simply disable any information sharing capabilities.

 

Consider Replacement

At some point, you may want to replace an IoT device when your existing one has too many known vulnerabilities that cannot be fixed or there are newer devices that have far more security built into them.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 18
[ITWEEKLY] IT Weekly, November 18, 2016

 

November 11, 2016

 

GTA@OIT Grant Recipients to Enhance Teaching and Learning for Many

OIT is pleased to announce the recipients of the fall 2016 GTA@OIT Grant who will be making a major impact on teaching and learning at UTK.

From general education courses to secondary teacher education, this semester's GTAs are poised to guide students and peer instructors into deeper learning, enhanced evaluation, and greater knowledge retention for many years to come. 

Visit the
GTA@OIT grant website for more information on their proposal abstracts and the program.

Recipients are:

o Lindsey Fox, Mathematics, Utilizing the Web to Enhance Hands-On Learning

o Amy Heger, Psychology, Turning Metacognition into Mobile-cognition: Educational Benefits of Experience Sampling

o Tricia Phillips, Mathematics, Creating Online Components for a Calculus Course 

o Vincent Price, Theory & Practice in Teacher Education, Using Video Recordings as a Means of Self- and Peer Reflection/Evaluation in an Introductory Pedagogical Course

o Cara Sulyok, Mathematics, Group Activities in Online Basic Calculus

 

Reminder: Faculty First Grant 2017 Call for Proposals

OIT Instructional Support invites UTK faculty to apply for the 2017 Faculty First Grant. Proposals are due by Monday, December 12, 2016. The program runs from February to December 2017.

 

Read the Call for Proposals at the Faculty First website.

Please contact the Program Coordinator Tonya Mathis at 974-9670 or tmathis9@utk.edu.

 

OIT HelpDesk Closed for the Thanksgiving Break
The OIT HelpDesk will be closed November 24-25 for the Thanksgiving Holiday and Administrative Closing. While the university is closed, OIT will continue to monitor the network, email, and major OIT applications. To check the current status of IT systems, please visit the online IT System Status Center at http://help.utk.edu/status.

 

The Telephone OIT HelpDesk will reopen on Saturday, November 26 at 12:00 a.m. The OIT HelpDesk Walk-in Service Center will observe normal operating hours on Sunday, November 27.  

 

ImageJ by National Institutes of Health

What is it? ImageJ is a free, open source image processing program that can display, edit, analyze, process, save and print various image types. ImageJ, written in Java, was designed with an open architecture that provides extensibility via Java plugins. Custom acquisition, analysis and processing plugins can be developed using ImageJ's built in editor and Java compiler.

 

Where can I run it? Being free, you can install it on any Linux, Mac or Windows computer. It is available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is no simultaneous user limit for ImageJ.

 

How can I learn it? OIT offers workshops on ImageJ each semester. For UTK, you can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 974-9900. Documentation, including the ImageJ User Guide, tutorials, and examples, can be downloaded from the software's main website.

 

Where can I get support? OIT offers Full Support for ImageJ. For assistance, contact the OIT HelpDesk at 974-9900. The software's main website also includes a user's guide and FAQs, and the ImageJ Information and Documentation Portal has still more helpful information.

 

 

Workshops for November 7-11, 2016

Instructor-Focused:

o Open Consultations for Transition to Canvas, November 21, 2 pm – 3 pm

o Getting to Know Canvas, November 22, 10 am – 12 pm

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Phishing: Don't bite!

As the holiday season approaches, phishing e-mails become more rampant as cyber attackers try to take advantage of consumers purchasing items over the internet. Phishing e-mails are fake messages with the purpose of tricking the recipient into clicking on a link and submitting your

credentials or opening an attachment that will infect your computer with malware. These phishing e-mails sometimes seem as if they are coming from an official organization or someone you know, but will have poor grammar or spelling issues. Be cautious of any e-mail that looks

odd, has grammatical mistakes, spelling mistakes or in any way seems unofficial; it could turn out to be a phishing e-mail that infects your computer or steals your credentials.

 

By falling victim to phishing e-mails, you become vulnerable to having sensitive information stolen. Therefore, it is important to take the proper precautions in protecting yourselves and your colleagues if you receive a phishing e-mail.

 

OIT has recently seen several user accounts compromised through emails delivered as SPAM that looks and sounds like an email from the HelpDesk. Users have clicked on the link and been taken to a website that looks like the Microsoft Office365 login page. They continue to submit their UT NetID and password and are passed on to the Office365 site. Meanwhile, the bad actors have taken the user’s credentials, logged into Office365 as the user and set up forwarding email addresses so that a copy of ALL email sent to the user is also sent to the forwarding address. The user would not notice that this had happened. Consider what content may be in your email: personal information and university information. If you took the bait, ALL of that is accessible by an unauthorized person.

 

If you receive a phishing e-mail you should first check the OIT System Status Center website at https://help.utk.edu/status/#scams to determine if the phishing scam has been reported. If you notice the phishing e-mail has NOT been reported, please forward the message, along with the

email headers, to abuse@utk.edu and allow the OIT office to take the proper precautions.

 

If you have further questions or concerns about an email that you find odd or if you mistakenly clicked on a link and submitted your UT credentials, contact the OIT Help Desk at (865) 974-9900 immediately.

 

Remember, no one in OIT, the OIT HelpDesk, or any legitimate on-line entity will ever ask you for your password via email. Be safe this Holiday season.

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 11
[ITWEEKLY] IT Weekly, November 11, 2016

 

November 11, 2016

 

Digital Signage

Is your department interested in digital signage? Talk to OIT about your digital signage needs!

 

Earlier this year, OIT worked with representatives from several departments to select a vendor and establish a contract to provide a digital signage solution for the University. This allows the University to utilize a standard solution for campus-wide communication that is supported by OIT. If you have any questions about digital signage, please contact the OIT HelpDesk at 865-974-9900.

 

IT Community of Practice: Canvas - Making the Move
Join us on Wednesday, November 16 for the next Instructional Technology Community of Practice (ITCoP) meeting. In our final meeting of the fall semester, Lisa Yamagata-Lynch, along with OIT staff, will share insights on course design, collaboration, accessibility for the online teaching and learning environment, as well as other tips for making your move to Canvas successful.

 

·         When: 12:20 – 1:10 pm on Wednesday, November 16

·         Where: Hodges Library, room 200E (Practice Presentation Room) 

·         About the Speaker:  Lisa Yamagata-Lynch is an online instructor in Educational Psychology and one of the 2016-2017 OIT Faculty Fellows.

 

Plan now to attend the ITCoP meetings this spring on February 22, March 22, and April 26 from 12;20 – 1:10 pm.  Add the spring events to my calendar.

 

Project Management Community of Practice
The UT Project Management Community of Practice will meet on Thursday, November 17 from 12-1pm in Hodges Library Room 605. The agenda will include a demo of Office 365 Planner, a brief presentation by Creative Services on their PM Career Ladder, and a BYOP (Bring Your Own Project) discussion time to solicit feedback and ideas from attendees on project issues and pain points. If you’d like to attend the meeting, please contact The PM CoP Advisory Board to receive an email invitation to this event. All are welcome, and we look forward to seeing you there.

 

 

HLM by Scientific Software International, Inc.

What is it? HLM from Scientific Software International is a package that does Multilevel Models that are also often called Hierarchical Linear Models (HLM). An example of a multilevel model is a regression equation showing how studying increases grades.That relationship may differ at different levels, such as teachers within schools within districts.

 

Where can I run it? For UTK, HLM is available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is a two simultaneous user limit for HLM.

 

How can I learn it? You can learn HLM from the Help files, which contain the entire manual. However, to understand the manual, you also need the book by the program's developers, Raudenbush and Bryk, Hierarchical Liner Models, Applications and Data Analysis Methods. The web page is at the company's main website.

 

Where can I get support? OIT offers Minimal Support for this software. We can help you analyze HLM models using other software that we fully support. For assistance, contact the OIT HelpDesk at 865-974-9900.

 

Workshops for November 7-11, 2016

Instructor-Focused:

·         TurningPoint Clickers (Basics & Transitioning to TurningPoint Cloud, Nov 14, 1 pm – 3 pm

·         Open Consultations for Transition to Canvas, Nov 14, 3:30 pm - 4:30 pm

·         Getting to Know Canvas, Nov 15, 1 pm – 3 pm

·         BYOD Wirelessly with Wolfvision Cynap, Nov 15, 3:45 pm - 4:45 pm

·         Getting to Know Canvas, Nov 16, 9:30 am - 11:30 am

·         Creating Accessible Documents on a Mac, Nov 18, 9 am – 11 am

·         Using Skype for Business for Online Office Hours (faculty/staff focused), Nov 18, 1 pm – 2 pm

·         Open Consultations for Transition to Canvas, Nov 18, 3 pm – 4 pm

 

Researcher-Focused:

·         Introduction to SAS Proc GLIMMIX, Nov 15, 10am - 11:30am

·         Crossover Design Analysis, Nov 16, 12pm - 1:30pm

·         Repeated Measures Crossover Designs in SAS, Nov 17, 10am - 11:30am

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Malvertising

What is “Malvertising”? How can you protect yourself?

Malvertising is the use of online advertising to spread malware.  Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and

web pages.  With the increase in online shopping and news browsing, Malvertising is a fairly-new concept for spreading malware that can easily go undetected until it is too late.

 

How does Malvertising work? 

Websites or web publishers unknowingly incorporate a corrupted or malicious advertisement into their page. Once the advertisement is in place, a visitor of the website can click on the advertisement causing their computer to become infected.

 

What is so scary about malvertising is that it often involves the exploitation of trustworthy companies.  Those attempting to spread malware place “clean” advertisements on trustworthy sites first in order to gain a good reputation, then they later insert a virus or spyware in the code behind the ad for a short period of time, thus infecting all visitors of the site during that time period.

 

How do you protect yourself from Malvertising?

 

·         Know that even the most reputable websites are not immune. Malvertising is not only engineered to trick unsuspecting victims, but it operates in a way that can make it hard for reputable websites to detect.

·         Know what to look for. Malvertising can often come in the form of pop-up ads, drive-by downloads, in-text advertising, or even third-party advertisements on webpages.

·         Use a smart internet browser. There are many internet browsers that can detect websites that have malware advertisements on them. Their added levels of security can make attacks more difficult.

·         Run up-to-date Anti-Virus software on your computer. This can protect you and your computer against threats and remove malicious software from your system.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

November 04
[ITWEEKLY] IT Weekly, November 4, 2016

 

November 4, 2016

Upgrades Scheduled for December 26

The Office of Information Technology (OIT) will be making infrastructure improvements between Monday, December 26, at 8:00 AM and Tuesday, December 27, at 8:00 AM EST.  This project will interrupt many services including, but not limited to, MyUTK, Volcard deposits, Parking Services, and several other OIT applications.  For a more complete list, please visit the OIT Knowledge Base at help.utk.edu/kb/entry/2564.

 

During this time, we will be upgrading the storage for the SQL Server Clusters (Julius and Persephone) and access to any application connecting to the SQL clusters will be unavailable.  If you have any questions or concerns regarding the maintenance, please contact the OIT HelpDesk at (865) 974-9900.

 

 

Coming in January 2017
The Office of Information Technology (OIT) continues to take steps to improve our information security posture, including recommendations from our security assessor that we collect information about the type of data stored, viewed, or processed on all university owned equipment.  In July 2016, we began collecting this information for any new devices connecting to the UT network.  In 2017, we will collect this information on all the current university owned equipment.  We will send email to the appropriate faculty, staff, or student when it is time for them to provide us this information.  Additional information about this initiative will be available as we get closer to the start date.

If you have any questions, please contact the OIT HelpDesk online or at 865-974-9900.

ChemDraw Professional by PerkinElmer Informatics

What is it? ChemDraw Professional is a drawing tool for chemists and biologists used to create publication-ready, scientifically intelligent drawings for use in ELNs, databases and publications, and for querying chemical databases.

 

Where can I run it? ChemDraw Professional is available at no additional charge to UTK and UTSI faculty, staff and students for installation on university-owned and personally-owned Windows PCs and Macs. The download and installation instructions are at OIT's software distribution site. For UTK, the software is also available on OIT’s Apps@UT server and the computers in the OIT public computer labs. There is no simultaneous user limit for its use.

 

How can I learn it? To watch Webinar videos, read informative articles and watch feature demos, go to their main webpage and select Chemistry and then ChemDraw.

 

Where can I get support? OIT offers Full Support for ChemBioDraw. For additional technical support, browse the Cambridgesoft Technical Support site. You may also download manuals for free, search or ask a question in the Support Forum, or contact the support team via their web form.

 

Workshops for November 7-11, 2016

Instructor-Focused:

·         Cloud Storage Options at UTK (Faculty/Staff Focused), November 9, 10:30 am - 11:30 am

·         Prezi Tips for Conferences, November 10, 9:30 am – 11 am

·         Tools for Evaluating Accessibility, November 10, 1 pm – 3 pm. NOTE: This section is part of the Fall Accessibility Program. You may register for any or all of the workshops in the Program.

 

Researcher-Focused:

·         Repeated Measures Analysis in SAS Using GLM and Mixed Procedures, November 10, 1 pm - 2:30 pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Safe Online Holiday Shopping

It’s that time of year again – food, fun, parties, and lots of online shopping. Online shopping can be a savior, allowing you to find the perfect gift while saving time, but it can also end with identity theft, malware on your computer, and other cyber unpleasantness. Rather than letting it ruin your holiday season, you can take a few simple security precautions, and be careful where you shop, to help reduce the chances of you being a cyber-victim. When purchasing online keep these tips in mind to minimize your risk:

 

1.       Be cautious what devices you use to shop online. Mobile devices, such as smartphones and tablets, make shopping convenient at any time and place, but they frequently lack the security precautions of a regular computer. If you use a mobile device to shop, make extra sure you are taking all the precautions listed below.

2.      Do not use public computers or public wireless for your online shopping. Public computers and wireless networks may contain malicious software that steals your information when you place your order, which can lead to identity theft.

3.      Secure your computer and mobile devices. Be sure to keep the operating system, software, and apps updated/patched on all of your computers and mobile devices. Use up-to-date antivirus protection and make sure it is receiving updates.
Use strong passwords. The use of strong, unique passwords is one of the simplest and most important steps to take in securing your devices, computers, and online accounts. If you need to create an account with the merchant, be sure to use a strong, unique password. Try to use more than ten characters, with numbers, special characters, and upper and lower case letters. Use a unique password for every unique site.

4.      Know your online shopping merchants. Limit your online shopping to merchants you know and trust. If you have questions about a merchant, check with the Better Business Bureau or the Federal Trade Commission. Confirm the online seller's physical address, where available, and phone number in case you have questions or problems. Do not create an online account with a merchant you don’t trust.

5.      Pay online with one credit card. A safer way to shop on the Internet is to pay with a credit card rather than debit card. Debit cards do not have the same consumer protections as credit cards. Credit cards are protected by the Fair Credit Billing Act and may limit your liability if your information was used improperly. By using one credit card, with a lower balance, for all your online shopping you also limit the potential for financial fraud to affect all of your accounts. Always check your statements regularly and carefully, though.

6.      Look for "https" when making an online purchase. The "s" in "https" stands for "secure" and indicates that communication with the webpage is encrypted. This helps to ensure your information is transmitted safely to the merchant and no one can spy on it.

7.       Do not respond to pop-ups. When a window pops up promising you cash or gift cards for answering a question or taking a survey, close it by pressing Control + F4 for Windows and Command + W for Macs.

8.      Be careful opening emails, attachments, and clicking on links.  Be cautious about all emails you receive, even those purportedly from your favorite retailers. The emails could be spoofed and contain malware.

9.      Do not auto-save your personal information. When purchasing online, you may be given the option to save your personal information online for future use. Consider if the convenience is really worth the risk. The convenience of not having to reenter the information is insignificant compared to the significant amount of time you’ll spend trying to repair the loss of your stolen personal information.

10.   Use common sense to avoid scams. Don't give out your personal or financial information via email or text. Information on many current scams can be found on the website of the Internet Crime Complaint Center: http://www.ic3.gov/default.aspx and the Federal Trade Commission: http://www.consumer.ftc.gov/scam-alerts.

11.    Review privacy policies. Review the privacy policy for the website/merchant you are visiting. Know what information the merchant is collecting about you, how it will be stored, how it will be used, and if it will be shared with others.

 

What to do if you encounter problems with an online shopping site?

Contact the seller or the site operator directly to resolve any issues. You may also contact the following:

 

·         Your state’s Attorney General's Office or Consumer Protection Agency

·         The Better Business Bureau - www.bbb.org

·         The Federal Trade Commission - http://www.ftccomplaintassistant.gov

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

October 28
[ITWEEKLY] IT Weekly, October 28, 2016

 

October 28, 2016

Plagiarism Prevention and Detection for Canvas

Many instructors have expressed a desire to have a plagiarism checker in Canvas as an equivalent feature to SafeAssign that is currently available in Blackboard. Unplag is now available for use in Canvas for a pilot test. This semester-long pilot will expire at the end of fall 2016. We have issued a Request for Proposal (RFP) seeking a permanent tool that can be used in Canvas. Visit Unplag’s website to learn more about the product.

 

Unplag User Guides:

·        Instructor guide (video): Unplag LTI

·        Student guide: Unplag LTI

 

Office 365: New App Launcher and PDF Previewer for OneDrive for Business

Over the next few weeks, Microsoft is rolling out two new features in Office 365. The first is a new version of the Office 365 App Launcher. The new App Launcher provides improved discoverability for new and recently used apps, additional customization options and search across all the services and applications you use in Office 365.

Additional information about this update is available on Microsoft’s website.

 

Additionally, OneDrive for Business PDF Previewer and high-resolution thumbnails are new features for Office 365. Microsoft is enabling rich previews for your most commonly used business file types. Without leaving OneDrive, you will be able to preview Adobe files, including Illustrator (.ai), Photoshop (.psd) and Encapsulated PostScript (.eps). Email files (.msg and .eml), almost all photo files (including many RAW formats) and streaming video are also supported. Additionally, most of these file types now have high-resolution thumbnails in the folder’s tile view.

 

New Courses Announced for Lynda.com
Lynda.com is constantly adding new courses and as a student, faculty, or staff at UT Knoxville, you have access to everything Lynda has to offer. You can find an up-to-date listing of new courses at www.lynda.com/newcourses.aspx. The list can be filtered by topics such as 3D, Business, Photography, and Web so you can easily find a course that meets your interests. Just sign into Lynda.com using your UT NetID and Password. Some of the courses released this semester are:

·        Learn Office 365 Groups: The Basics

·        Outlook 2016: Advanced Tips and Tricks

·        Excel 2016: Data Validation in Depth

·        PowerPoint for Mac 2016: Tips and Tricks

·        Google Docs: Tips and Tricks

·        Customizing Macs for Accessibility and Ease of Use

·        Customizing Windows 10 for Accessibility and Ease of Use

·        Prezi: Tips and Tricks

·        Universal Principles of Design

·        HTML Essential Training

 

ATLAS.ti by ATLAS.ti Scientific Software Development GmbH

What is it?  ATLAS.ti is one of two qualitative analysis software packages offered at UT that allow the researcher to organize, analyze, report and visualize data in both text and multimedia formats. ATLAS.ti also allows users to transcribe directly into the program and has an accompanying iPad and Android app for multimedia data collection.

Where can I run it? ATLAS.ti is funded by the UTK Technology Fee and made available at no additional charge to UTK students, faculty and staff on the Apps@UT server. At this time only five users can simultaneous use ATLAS.ti.

How can I learn it? ATLAS.ti offers free training and video tutorials from the ATLAS.ti YouTube channel. You can schedule a one-on-one tutorial anytime by calling the OIT HelpDesk at 974-9900. You can also visit ATLAS.ti’s support page.

Where can I get support? OIT offers Full Support for ATLAS.ti. For assistance, contact the OIT HelpDesk at 974-9900.

Anything else I should know? Users should use the assign (and not add to library) function for primary documents while working with ATLAS.ti on the Apps@UT server. More information on these issues can be found on the How to Use Apps@UT web page.

 

Workshops for October 31-November 4, 2016

Instructor-Focused:

·        Getting to Know Canvas, October 31, 9:30 am - 11:30 am

·        Creating Accessible Assessments, November 3, 1 pm - 3 pm. NOTE: This section is part of the Fall Accessibility Program. You may register for any or all of the workshops in the Program.

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Steps To Staying Secure In These Scary Times

As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using or where you are using it, we recommend the following four key steps.

 

What Can I Do?

 

1.                          You: Attackers have learned that the easiest way to bypass even the most advanced security technology is by attacking you. If they want your password, credit card, or personal data, the easiest thing for them to do is to trick you into giving them this information. For example, they can call you pretending to be Microsoft tech support and claim that your computer is infected, when in reality they are just cyber criminals that want you to give them access to your computer. Perhaps they will send you an email explaining that your package could not be delivered and ask you to click on a link to confirm your mailing address, when in reality they are tricking you into visiting a malicious website that will hack into your computer. This is how attacks such as Ransomware work. Ultimately, the greatest defense against attackers is you. Be suspicious. By using common sense, you can spot and stop most attacks.

2.                          Passwords: The next step to protecting yourself involves using a strong, unique password for each of your devices and online accounts. The key words here are strong and unique. A strong password means one that cannot be easily guessed by hackers or by their automated programs. Tired of complex passwords that are hard to remember and difficult to type? Try using a passphrase instead. Instead of a single word, use a series of words that is easy to remember, such as “Where is my coffee?” The longer your passphrase is, the stronger. A unique password means using a different password for each device and online account. This way, if one password is compromised, all of your other accounts and devices are still safe. Can’t remember all those strong, unique passwords? Don’t worry, neither can we. That is why we recommend you use a password manager, which is a specialized application for your smartphone or computer that securely stores all of your passwords in an encrypted format.

 

3.                          Updates/Patches: Make sure your computers, mobile devices, apps, and anything else connected to the Internet are running the latest software versions. Cyber criminals are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use special programs to exploit them and hack into the devices you are using. Meanwhile, the companies that created the software for these devices are hard at work fixing them by releasing updates. By ensuring your computers and mobile devices install these updates, you make it much harder for someone to hack you. If your operating systems or devices are old and no longer supported with security updates, we recommend you replace them with new ones that are.

 

4.                          Backups: Sometimes, no matter how careful you are, you may be hacked. If that is the case, often your only option to ensure your computer or mobile device is free of malware is to fully wipe it and rebuild it from scratch. The attacker might even prevent you from accessing your personal files, photos, and other information stored on the hacked system. Often the only way to restore all of your personal information is from backups.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

Referenced Content: http://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201610_en.pdf  

 

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

1 - 10Next