Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
July 16
[ITWEEKLY] IT Weekly, July 16, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

July 16, 2018

 

Are your employees completing their mandatory training?

The university has several types of required training for employees, including the 2018 IT Security Awareness training.  Keeping up with who has or has not completed the mandatory training can be a challenge.  Authorized IRIS users now have access to a report to manage completions of various types of training.

 

To verify who in your unit has or has not completed their IT Security Awareness Training for 2018, log in to IRIS and use the following information to run the report:

  • IRIS Report: ZHR_QUALCOMP_REP
  • IT Security Awareness Training – Qualification 50273441
  • Compliance As Of Date: 12/31/2018
  • Select your organization unit as appropriate

 

Remember, UT Policy IT0123 requires that faculty and staff complete their IT Security Awareness Training annually.  This year’s deadline for UTK faculty and staff is  November 30, 2018 (unless directed by your department to complete it sooner). For more information about the annual security awareness training, visit the OIT website.

 

Contact the IRIS HelpDesk with your questions related to the IRIS report.  If you need assistance with the annual security awareness training, contact the OIT HelpDesk at 865-974-9900.


Fall 2018 Classroom Upgrades

This summer OIT’s IT Engineering Services team is hard at work upgrading the technology in 47 classrooms across campus.   The upgrades will be complete by the fall semester and will vary in each room but may include new touchscreen panels, new projectors, and Wolfvision Cynap devices. To learn more about the 2018 Fall Classroom Upgrades, visit the OIT website.  For assistance using the technology in your classroom, contact the OIT HelpDesk at 865-974-9900.


KNIME Analytics Platform by KNIME, AG

The KNIME Analytics Platform is free and open source software for data science. It uses a workflow (flowchart) interface to control the flow of your analysis by connecting icons with arrows. Each icon represents one step in your analysis and is configured with dialog boxes. This makes it easy to learn, yet able to perform complex analyses without having to learn a programming language.

 

Learn more about KNIME on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

·         Canvas

·         Microsoft Excel

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.


Acceptable Use of Information Technology Resources

UT Policy IT0110 - ACCEPTABLE USE OF INFORMATION TECHNOLOGY RESOURCES POLICY (AUP) governs the use of the university's information technology resources in an atmosphere that encourages free exchange of ideas and an unwavering commitment to academic freedom. By using the Information Technology resources at UT, you are agreeing to abide by the policies outlined in the AUP.

 

Every time you change your password, you are prompted to acknowledge your agreement to abide by the AUP. When you participate in the annual Security Awareness training, the last module requires that you acknowledge the AUP. Do you read it? Or, is it like the End User Licensing Agreement (EULA) that you blow by when you install software, clicking "I Accept" without really reading what you're committing to? The AUP is very broad and reaching - it also applies to YOU when you connect your personal laptop or other mobile device to the UTK Network. It also mandates that we keep systems connected to the UTK network up-to-date.

 

You can view the AUP along with other IT policies at policy.tennessee.edu/it_policy/. If you have any questions about the AUP, please contact the OIT HelpDesk at 865-974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 09
[ITWEEKLY] IT Weekly, July 9, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

July 9, 2018

 

Upcoming Changes to Microsoft Office licensing

Microsoft has changed their license model for Microsoft Office 365 ProPlus, the full desktop version of Microsoft Office available via Office 365.  To comply with the new model, we will be updating the licensing for Microsoft Office 365 ProPlus on July 30. Additional information about this offering is available on OIT’s website.

 

Faculty and Staff Licensing

Most active faculty and staff will be licensed for Microsoft Office via Office 365. However, we do have a subset of users who will not be eligible.  These users will have access to email, OneDrive for Business, and the Office Web Apps, but will not have access to the full desktop version of Microsoft Office through Office 365.

 

On July 30, the following groups will no longer be eligible for Microsoft Office through Office 365.

 

  • Employees with a special appointment (subgroup 40)
  • Pending Employees
  • Emeritus faculty and retirees
  • Ushers
  • Friends of the University, including many adjunct faculty and county-paid Ag Extension employees
  • UTMCK leased employees

 

We will be reaching out to all employees whose eligibility has changed.

University-owned Computers Licensing

Microsoft Office 2016 will continue to be available for installation on any university-owned computers by authorized faculty and staff through the OIT Software Download site.

 

Students

Students will continue to have access to Microsoft Office through Office 365. 

 

If you have any questions, please contact the OIT HelpDesk online or at 865-974-9900.

 


Drop-in Consultations for Clickers, Classroom Technology

Do you have questions on using clickers in your class? Do you want to use Cynap or are you experiencing issues getting your PowerPoint to project correctly? Join us from 9 a.m. to 4 p.m. for a drop-in consultation in Hodges Library Practice Presentation Room 220E on Tuesday, July 24. No registration is necessary. We can help you with using technology in your classroom. For more information, go to the workshop website.  But remember, registration is necessary. Just drop-in any time between 9 a.m. and 4 p.m. and see us.

 


JMP by SAS Institute

JMP is software for data management, analysis, and visualization and it is commonly used in applications such as the design of experiments, scientific research, and quality control. It is particularly strong in visualizing data interactively, offering tools such as multiple linked graphs and 3D rotating scatterplots. The software consists of two products: JMP and JMP Pro. JMP Pro contains everything in JMP, plus advanced techniques for predictive modeling, cross-validation, model comparison, and one-click bootstrapping. A scripting language is also available in JMP and JMP Pro.

 

Learn more about JMP on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

 

·         Canvas Assignments, Assessments, and Grades

·         Canvas Foundations

·         Microsoft Excel

·         Cloud Storage Option

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


IT Risk

Information security is about addressing or reducing IT RISK. It's easy to overlook this when all you hear is talk about passwords, firewalls, encryption, policies or two-factor authentication. These are tools we use to reduce the risk that our information (i.e., university data, personal data) is disclosed to an unauthorized person or persons.

 

If this is too abstract, here's another example - we have locks on our doors and locks on our cars. Why? Because there's a "risk" that someone will decide they need our personal belongings more than we do. There's a threat - the thief; there's a vulnerability - an unlocked door or car. The level of risk we're willing to accept depends on what we're protecting, the existence of a threat, and the extent that we're vulnerable.

 

The same holds true for protecting our information. We take great care to protect sensitive information (credit cards, SSN's). There's a threat - the hacker; there's a vulnerability - an unlocked workstation. If you have access to sensitive information because of your job or if you have personal documents that you store on your devices, then the level of risk that you’re willing to accept should be lower.

 

We are working and living in a time when information means money. Just like your personal possessions at home, information should be protected because there's a constant effort by folks to take it from us. We become easy targets when we increase our vulnerability by not locking our workstations or by sending or storing sensitive information in our email. That means we are accepting a higher level of risk. Are you in a position to accept risk on behalf of the university? Most of us are not so we must be good stewards of the university's information and information resources and protect it as if it was our own.

 

Information security best practices are in place to help the university community reduce risk and protect the confidentiality, integrity, and availability of its information resources. Start by doing the basics: lock your workstation when you're away from your desk; don't click on links in unsolicited emails; don't share your NetID password with anyone; keep your software updated and patched; protect the data.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 02
[ITWEEKLY] IT Weekly, July 2, 2018

 

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

July 2, 2018

 

Reminder: Summer Accessibility Workshops

If you are developing a new course, bringing a course online, or want to be proactive about improving an existing course or course materials, this workshop can be a powerful resource for developing your skills and getting some hands-on practice.

 

Designing Accessible Course Materials: (2-Day Workshop)

July 9-10, 9:30 am – 12:30 pm (lunch from Panera included)

This workshop series gives you a unique opportunity to learn why and how to make your course accessible for all students. This training will be very practical; we will guide you through the steps to make course materials accessible, including Word documents, PDFs, Canvas pages, video, and audio. You will practice applying the learned concepts to your course material with guided oversight and support.

Sign up now!

 


OIT HelpDesk Schedule for July 4

The OIT HelpDesk will be closed on Wednesday, July 4. While the university is closed, OIT will continue to monitor the network, email, and major computer applications. To check the current status of IT systems, please visit the online IT System Status Center at http://help.utk.edu/status.

 


Email Aliases

Have you ever wanted an email address that was different than your default netid@utk.edu? At UT, all staff and faculty have a netid@utk.edu and netid@tennessee.edu email address that routes email to Office 365. But what if you’ve just earned your doctorate or gotten married and want your email address to reflect your latest life change? Adding an email alias is a quick and easy way to reflect this change without having to rework a bunch of contacts or actually having to change mail boxes. By following the instructions in the OIT Knowledge Base, you can go from mquinn94@utk.edu to drquinn@utk.edu, or even michaela@utk.edu, if the desired aliases are not already taken.

 


ImageJ by National Institutes of Health (open source)

ImageJ is a free, open source image processing program that can display, edit, analyze, process, save and print various image types. ImageJ, written in Java, was designed with an open architecture that provides extensibility via Java plugins. Custom acquisition, analysis, and processing plugins can be developed using ImageJ’s built-in editor and Java compiler.

 

Learn more about ImageJ on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

 

·       Canvas Analytics for Student Success

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


Before you buy…

The procurement and adoption of cloud services are increasing. As departments purchase or identify possible services in the cloud as useful to doing university business, they’re obligated to see that the services are assessed for managing IT risks to the confidentiality, integrity, and availability of sensitive university information and the Personally Identifiable Information (PII) of constituents.

 

The Higher Education Cloud Vendor Assessment Tool (HECVAT) is an assessment tool that generalizes information security and data protection questions in the interests of consistency and ease of use. It’s basically an Excel workbook with worksheets full of questions that a cloud vendor must respond to. The questions enable institutions to ensure that the cloud services are assessed for security and privacy needs. Some of the questions are unique to higher education. By leveraging this tool across the university, we can ensure that the assessments are consistent. Using this tool also reduces the vendor’s burden of filling out multiple requests for security assessments as the tools may be shared across institutions.

 

The HECVAT was created by an EDUCAUSE working group made up of individuals from all over higher education. One goal of this group is to establish a community resource where institutions and cloud service providers can share these assessments.

 

There are two versions of the tool; a lightweight version with a shorter set of questions where the IT Risk to the information is LOW to give institutions a starting point in evaluating the risks to their information. The second version is much longer and should be used where the IT Risk to the information is greater.

 

OIT highly recommends that if your department is looking into a cloud service, regardless of the cost of the service, you should download the HECVAT tool and provide it to your vendor. You can also make it a requirement of the successful bidder that they fill out the tool. When the vendor returns the tool to you, send a copy to security@utk.edu. OIT will retain the responses for that vendor so other departments seeking similar services can review the assessment prior to purchasing. If you already are leveraging cloud services in your department, send your current vendor a copy and ask them to fill it out. If you’re in the early stages of looking at cloud services, you should send email to security@utk.edu to see if there’s already a HECVAT that applies to your situation.

 

UT Policy requires that each campus has an established Information Security Program and that systems and services processing or storing sensitive information or information that is critical to the university have documented system security plans. This requirement applies to cloud services as well. A completed HECVAT contains information needed to complete a system security plan as it communicates HOW a vendor protects the university’s information, giving the system owner the response language necessary to respond to the requirements in a system security plan.

 

You can read and download the most recent versions of the HECVAT at library.educause.edu/resources/2016/10/higher-education-cloud-vendor-assessment-tool. You can find information on UTK’s Information Security Program and Methodology at security.utk.edu/

 

If you have questions about the HECVAT or the UTK Security Program, call the OIT HelpDesk at 865-974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

June 25
[ITWEEKLY] IT Weekly, June 25, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

June 25, 2018

 

Your Wireless Experience

There are three major components that impact your wireless experience - coverage, capacity, and your client.

 

Coverage - While there has been wireless in 100% of buildings across campus for some time, OIT is continually working to ensure there is good coverage for all classrooms, dorm rooms, offices, etc. Additionally, outdoor coverage is expanding to provide service to the most heavily trafficked routes. OIT looks for coverage gaps using wireless survey tools but also completes reviews based on OIT requests, responses in the annual OIT Satisfaction Survey, and text reporting of classroom issues. As part of the annual Technology Enhanced Classroom upgrade project, each classroom is surveyed to confirm the wireless will support the new teaching tools.

 

Capacity - The wireless network is optimized to provide consistent, reliable service to the most people. While the access points are theoretically capable of much greater download speeds, you should typically expect 20 - 50 Mbps. In high-density locations, such as large auditoriums, you may not see the top end of those download speeds, but there should be enough bandwidth for typical classroom activities. The bandwidth requirements for some common activities are below.

 

Playing Games (PlayStation, Xbox, etc.)  

10 Mbps

Streaming Music (Spotify, Pandora, etc.)

2 Mbps

Streaming Video Ultra HD/4k(Netflix, Hulu, Amazon Prime, YouTube, etc.)

25 Mbps

Streaming Video High Def (Netflix, Hulu, Amazon Prime, YouTube, etc.)

5 Mbps

Video Calls (Skype, Facetime)

1.5 Mbps

Zoom

1.5 Mbps

 

 

Client - Another critical component of your wireless experience is your client. While it is always nice to have the latest device, you can often receive benefits by keeping your device current with operating system and driver updates. One of the most common wireless problems is a sticky client - when a device remains connected to an access point after moving out of usable range. By simply turning wireless off then back on, the device will reconnect to an access point with a much better signal.

 

If you have any questions about the accessing UT’s wireless network, contact the OIT HelpDesk online or at 865-974-9900. 

 


Collaboration Tools:  Microsoft Teams

Has your department used, or considered using, a messaging tool such as Slack? If so, you may want to consider Microsoft Teams, a chat-based workspace available as part of your Office 365 account.  A team is a collection of people, conversations, files, and tools that are easily accessible in one place.  You can create new teams or add teams to your existing Office 365 groups.  To use Teams, you can install the app on your computer or mobile device or access it via the web.  Learn more about Microsoft Teams on OIT’s website

 

Questions?  Contact the OIT HelpDesk at 865-974-9900 for assistance.

 


HLM by Scientific Software International, Inc.

HLM from Scientific Software International is a package that does Multilevel Models that are also often called Hierarchical Linear Models (HLM). An example of a multilevel model is a regression equation showing how studying increases grades. That relationship may differ at different levels, such as teachers within schools within districts.

 

Learn more about HLM on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

 

  • Best Practices for Presentations

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


Peopleware

A landmark study was released in 2007 that helped confirm conventional wisdom about the large number of re-used passwords and the poor quality of user passwords. The study looked at the password usage habits of over 500,000 users. What the study found is that the average user used an average of 7 passwords/week. The study showed that those passwords were shared with an average of 25 sites! If a user is using the same password on Facebook as they use for the NETID login, which is the same for their Gmail AND their banking passwords, it is immediately evident that there’s a perfect storm coming. The study also contains information on successful phishing attempts. The data indicates that something on the order of 0.4% of the population falls victim to a phishing attack each year. Remember that this study was performed in 2007. Social networking has grown; mobile devices have multiplied like rabbits, and every site wants a login and a password and the phishermen are out in force.

 

The news is full of stories of high-profile individuals whose accounts are compromised. Their phones are erased; their email accounts are emptied; their photos are GONE. The vulnerabilities aren’t technical – they’re human. Whether it’s a phishing attempt that lands the user or a “guessed”-password that unlocks multiple accounts, the technology is working as it should. We can add more layers of technology such as multi-factor authentication (biometrics, tokens, voice recognition) but in the end, it’s the “peopleware” that we have to keep patched.

 

Peopleware is the term used to describe the interaction a person has with technology, and it’s time to update your peopleware! The latest version doesn’t allow clicks on embedded links in unsolicited emails. However, there are still bugs that haven’t been addressed. Be diligent in your password creation and its reuse. If your mobile device supports a PIN, by all means, use it! Sure, it’s ONE MORE THING you have to do to open your phone, but it goes a long way in helping protect your personal information as well as your university email. Email? For convenience, users typically “store” their password to their email, so they don’t have to type it in every time they open their email on their phone. Without a PIN to protect your device, ANYONE who has your phone has access to your email and potentially sensitive information. An ounce of prevention goes a long way in protecting your (and university) information.

 

If you’re one of the 0.4% of the population that clicked on a link that “looked okay” and you suspect your UT credentials have been compromised, please notify the OIT HelpDesk immediately at 865-974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

June 18
[ITWEEKLY] IT Weekly, June 18, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

June 11, 2018

UTK GDPR Update

GDPR asks us to make clear to people what data we maintain and how we process it. UT’s updated data privacy policy can be found at https://dataprivacy.utk.edu/ and within that, you can find a link to the website privacy policy (https://www.utk.edu/aboutut/privacy) as well. A link to the website privacy policy is also now found in the footer of www.utk.edu and will also become part of the standard campus template.

 

The Office of the General Counsel has asked us to begin getting departments to adopt these standard privacy policy descriptions instead of having their own version. If you have links or directions to a departmentally managed privacy policy, please begin pointing those policies to the links above as appropriate. If your departmental policy requires additional controls or references additional accreditation standards, please refer to above and then supplement with your additional information. If you have questions, please contact privacy@tennessee.edu.

 


Data Governance @ UTK

In partnership with Academic Affairs and the Division of Student Life, representatives from OIT, OIRA, and Student Life have started to formalize processes and best practices for a data governance model at UTK.  This initiative will evolve over the next 12 months and will establish clear roles and responsibilities focusing on maximizing the value and insight we can obtain from our established data systems.

 

A formal community of decision support representatives, who will meet monthly, will begin next month and begin to work collaboratively to increase our data quality, integrity, security, and availability.  To learn more about the data governance efforts, please visit data.utk.edu

 

Summer Accessibility Workshops

As previously announced, OIT is offering two NEW multi-day workshops designed to support faculty as they enhance the accessibility and usability of their courses and course materials. Whether you are developing a new course, bringing a course online, or want to be proactive about improving an existing course or course materials, these workshops can be a powerful resource for developing your skills and having an opportunity for hands-on practice. Space is limited, so sign up today! 

 

Course Design for Everyone: Rethinking Accessibility (4-Day Workshop)

June 25-28, 9:30 am – 12:30 pm

This workshop will introduce you to the theory and practice of Universal Design for Learning (UDL) and walk you through a UDL design sequence by closely examining course goals and learning objectives, developing well-designed assessments, and identifying options for learning through a variety of methods and materials. By the end of the workshop, you will have redesigned one unit of your course and gained the skills to expand UDL strategies to other units.

Sign up now!

 

Designing Accessible Course Materials: (2-Day Workshop)

July 9-10, 9:30 am – 12:30 pm (lunch included)

This workshop series gives you a unique opportunity to learn why and how to make your course accessible for all students. This training will be very practical; we will guide you through the steps to make course materials accessible, including Word documents, PDFs, Canvas pages, video, and audio. You will practice applying the learned concepts to your course material with guided oversight and support.

Learn more about this workshop and register online

 


ChemDraw Professional by PerkinElmer Informatics

ChemDraw Professional is a drawing tool for chemists and biologists used to create publication-ready, scientifically intelligent drawings for use in ELNs, databases, and publications, and for querying chemical databases.

 

Learn more about ChemDraw Professional on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

 

·         Adobe InDesign

·         Canvas Foundations

·         Canvas Analytics for Student Success

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


2018 Security Awareness Training

The 2018 Security Awareness training assignments have been sent to UTK and UTSI Faculty and Staff. The training must be completed by November 30, 2018 (unless directed by your department to complete it sooner) to collect the completion numbers and report to the UT Board of Trustees. The training is required to be completed ANNUALLY.

 

There are some exciting changes this year:

 

1.       Emails will originate from "security@utk.edu" instead of a "no-reply" non-UT address. The links in the email direct users to a landing page that explains the training. There is a link on that page that will direct users to the K@TE login page.

2.      The training is being delivered through K@TE, the University of Tennessee's comprehensive Learning Management System for training and professional development. The beauty of this is that completed training will be loaded to IRIS the morning after it's completed so it will be reflected in personnel training records.

3.      Newly-hired employees are automatically added and assigned training.

4.      There is a report now available in IRIS (ZHR_QUALCOMP_REP) that departments can run to keep up with who has or has not completed their training.

 

The IT Security Awareness training is created by SANS, one of the most trusted source for information security training, certification, and research in the world. 25 years of experience in cyber security strategy and training. SANS utilizes the world’s best cyber threat experts and a fleet of learning behavior professionals making them the best choice for security awareness training. IT threats change rapidly. Therefore, the training must be updated to reflect new threats. SANS reviews the content and updates the training annually, so you are sure to receive the most up-to-date training.

 

In October 2014, UT Policy "IT0123 - Security Awareness, Training, and Education” went into effect. The policy requires that each campus develop plans and procedures to ensure that staff have the opportunity to receive role-based security training. The training consists of a number of videos that cover specific security topics. The videos range anywhere from 1 to 5 minutes in length and are intended to raise awareness and influence user behavior that will reduce security risks. The training allows the users to complete the training at their own pace, monitor their progress, and revisit completed training.

 

Users having questions on the validity of the training emails or having difficulty in completing the training should call the OIT HelpDesk at 865-974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

June 11
[ITWEEKLY] IT Weekly, June 11, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

June 11, 2018

 

Summer Accessibility Workshops

This summer, OIT is offering two NEW multi-day workshops designed to support faculty as they enhance the accessibility and usability of their courses and course materials. Whether you are developing a new course, bringing a course online, or want to be proactive about improving an existing course or course materials, these workshops can be a powerful resource for developing your skills and having an opportunity for hands-on practice. Space is limited, so sign up today! 

 

Course Design for Everyone: Rethinking Accessibility (4-Day Workshop)

June 25-28, 9:30 am – 12:30 pm

 

This workshop will introduce you to the theory and practice of Universal Design for Learning (UDL) which advocates providing access to learning and expert learning not only to individuals with disabilities but everyone.

In addition to learning the theory, we will look specifically at your course. You will walk through a UDL design sequence by closely examining course goals and learning objectives, developing well-designed assessments, and identifying options for learning through a variety of methods and materials. By the end of the workshop, you will have redesigned one unit of your course and gained the skills to expand UDL strategies to other units.

Learn more about this workshop and register online

 

Designing Accessible Course Materials: (2-Day Workshop)

July 9-10; Stay tuned for details.

 

Teleconference, video conference, and online meetings

Are you in need of a teleconference or video conference solution?  Do you want to meet online with colleagues at UT and elsewhere?  Zoom may be the answer for you! 

 

Zoom, a cloud-based technology, is the university’s solution for conference calls and online meetings and classrooms.  With Zoom, faculty, staff, and students can have high-quality interactions in real time from their computers and mobile devices.  Zoom’s web-based conferencing uses high-quality video and audio and is accessible on macOS, Windows, iOS, and Android devices.  By default, Zoom sessions include a long-distance telephone number so that you can bring in participants via telephone as well. The Zoom recording feature will allow you to save a session for future reference and send it to those who are unable to attend.

 

If you are looking for a toll-free phone number for your Zoom sessions or conference calls, contact OIT for an estimate.  Check out OIT’s website for additional information about this service.

 

Many conference rooms have Zoom-capable equipment ready for your use.  If your department does not have a Zoom-capable conference room and you would like to convert one, you can contact the OIT HelpDesk to request an estimate.  OIT also has several Zoom-capable rooms that you can reserve for a fee.

 

To start using Zoom, check out our Getting Started guide or contact the OIT HelpDesk at 865-974-9900.

 


Let Us Help You Plan for Fall!

Thinking about doing something different in your course? Are you looking for ways to implement new technologies? OIT has instructional designers who can help you design content for your course.

Are you going to be out of town? No problem! Let's schedule a meeting through 
Zoom.

 

Contact the OIT HelpDesk online or by phone at 865-974-9900 and schedule a meeting today!

 


ATLAS.ti by ATLAS.ti Scientific Software Development GmbH

ATLAS.ti is a qualitative analysis software that helps the researcher to organize, analyze, report and visualize data in both text and multimedia formats. ATLAS.ti also allows users to transcribe directly into the program and has an accompanying iPad and Android app for multimedia data collection.

 

Learn more about Atlas.ti on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

 

·         Canvas Assignments/Assessments/Grades

·         Canvas Tips & Tricks

·         Introduction to NVivo

·         Managing Digital Distractions in the Classroom

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


More on System Security Plans

Department XYZ: Do I need a Security Plan?

Information Security Professional: What do you think?

 

If this question is posed to a UTK Information Security Office (ISO) staff member, the answer will either be, "Yes" or, "It depends." Although it's not intended to be non-committal, it sounds dodgy. Right?

 

Whether it's a third-party consultant or a member of the ISO staff, you'll hear a similar answer. The leadership of a unit (think: college, department or division) are really in the best position to answer that question definitively, especially when they're responsible for the use of IT resources in their units. Sure, there are devices or systems that, by policy must be documented just because of regulatory compliance but what about those devices and systems that aren't clear-cut examples such as those that support research or administrative functions?

 

Here's a checklist to use when trying to answer the question:

 

1.       Does the device or system store or process sensitive information? (Examples: PII - Personally identifiable information such as SSN's, Driver's license numbers, passports, bank account numbers, Protected Health Information (PHI), FERPA-protected information, grant-funded research data that is protected by a technology plan, credit card information)

2.      If the device or system is not available, would it impact the research PI or unit's ability to carry out its mission? (Example: a hard-drive failure or a campus-wide event that affected the network infrastructure or data center.)

3.      Would the disclosure of the information on the device or system result in identity theft, intellectual property theft, financial fraud? By the way, "disclosure" in this context is when an unauthorized person(s) obtains access to or possession of the information on a device or system (think: breach, hacker).

4.      Would the alteration of the information on the device or system affect the unit's ability to carry out its mission? (Example: grade alteration affecting graduation, alteration of research data affecting the outcomes).

 

If you can answer, "Yes" to any of these questions, you need to document the safeguards used to protect the device or system with a security plan.

 

Wait...doesn’t the classification process capture all of these devices and systems? Good question. The classification process is for WORKSTATIONS and LAPTOPS; system security plans are for those critical systems that are critical to a unit; a system or application that the unit can't do without.

 

Remember that a system is, "a set of interrelated components that work together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization. Examples: servers, software, networks, databases, etc.)

 

Find out more about the UTK Information Security Methodology by browsing to security.utk.edu or by calling the OIT HelpDesk at 865-974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

June 04
[ITWEEKLY] IT Weekly, June 4, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

June 4, 2018

 

Empower Your Students with Text-to-Speech

Many students prefer to listen to text rather than read print, and some need the option. Others would benefit from being able to listen and read at the same time. Texthelp's Read&Write enables quick-and-easy text-to-speech for documents, accessible PDFs, websites or Canvas pages.  Learn more about Read&Write in OIT’s Knowledge Base.

Read&Write is a powerful tool with features for listening to text live and converting documents to Mp3 files.  And that's just the beginning. Read&Write offers studying, writing, and revision tools that students may use to improve their learning, vocabulary, research, and writing.

 

UT Knoxville's Student Disability Services has purchased a license for all UTK and UTSI faculty, staff, and students for use on both university-owned and personally-owned Macs, Windows PCs, or tablets. 

If you'd like to learn more or would like training for you or your students, contact the OIT HelpDesk online or at 865-974-9900.

 


Getting Help from OIT

Did you know that the OIT HelpDesk resolves 75% of the phone calls, emails, chats, and drop-in visits to our office?  The HelpDesk is well-trained to assist with a wide variety of requests and should be your first point of contact when you need help.  Have you ever contacted someone in OIT directly and later learned that they were on vacation?  Next time contact the OIT HelpDesk!  If they are unable to provide immediate assistance, they will direct your request to the appropriate team for handling and you don’t have to worry about who is out of the office.  

 

Do you prefer to research the problem before requesting assistance?  Check out the OIT website!  The new and improved search box on our home page will search all of our services and the OIT Knowledge Base.  If you want to learn more about Canvas or our course design services, use the OIT search!  Do you want to learn about OIT’s website hosting services or looking for training? Use the search to find what you’re looking for quickly.

 


Reminder: Renew Adobe software now

Contact VolTech to renew Adobe Creative Cloud, Captivate, and Presenter for next fiscal year.  To continue using the Creative Cloud suite, you must renew your subscription by August 31, 2018. Additional information about these offerings including specific ordering instructions is available on the  OIT Adobe website.

 


ArcGIS from Esri

ArcGIS is an integrated suite of software products used for mapping/visualizing data, collecting geographic data, and spatial reasoning. Spatial analytics and 3D modeling features are also integrated into ESRI products. The ArcGIS platform includes desktop software, Software as a Service (Saas), and ESRI plug-ins and mobile apps.

 

Learn more about ArcGIS on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

 

  • Adobe Photoshop
  • Canvas Analytics for Student Success
  • Canvas Blueprint

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


Plans, Programs, and Controls; Oh my!

There is a lot of discussion occurring on the Knoxville campus about cyber security. These conversations include words like "IT security plans," "systems," and "program plans." What does this really mean?

 

Three reasons WHY we are talking about cyber security:

 

1.       UT Policy is driving the discussion and requires that the management of our IT resources must be documented,

2.      In this day and age, EVERYTHING is online and must be protected; just like we lock our homes or automobiles when we leave them,

3.      It's the responsible and right thing to do.

 

Human Resource (HR) or Fiscal (FI) policies provide a governance structure for conducting university business; the business of "running a university." Likewise, UT policies regarding Information Technology (IT) provide the governance structure for the management of IT resources.

 

Information Security Management implies that we are protecting information (data) and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Information Security management is also a process of defining the security controls in order to protect the university's IT resources. Some definitions and examples will give some clarity to this discussion:

 

1.       System Security Plan – a written document which provides an overview of the current information security requirements of a system and describes the controls in place or planned, responsibilities and expected behavior of all individuals who access a system.

2.      System - a set of interrelated components that work together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization. Examples: servers, software, networks, databases, etc. Real-world examples of systems are the Student Information System (including Banner, DARS, and others), IRIS or CANVAS.

3.      Controls - safeguards or countermeasures to avoid, detect, counteract, or minimize risks to physical property, information, computer systems, or other IT resources. Examples: locks on doors, passwords, procedures, speed-limit signs, etc.

 

A person may think, "...this is an IT-thing, I am not going to worry too much about it; the IT-person will handle it." Consider it from this perspective: it's good business management of resources. Sure, there are technical aspects to this, but it really is about identifying systems that are critical to a researcher, a department, a college or the campus and putting documentation around its management. The system may also store or process sensitive or confidential information about research or individuals.

 

Just as Deans, Directors, and Department heads are responsible for enforcing HR and FI policies across their areas, they are equally responsible for the oversight of the management of IT resources in their respective units. Leadership has two major tasks: 1. Sign their unit's Security Program Plan, and 2. Communicate their unit plan and the campus methodology to their direct reports and throughout their organization. A Dean or Vice-Chancellor may not know how all the parts fit together in a particular system, what information is stored or processed, or if it's critical to their unit. They don't necessarily need to know all of the technical details. However, I am sure they would want to know that someone is looking after that system (i.e., managing the system).

 

Find out more about the UTK Information Security Methodology by browsing to security.utk.edu or by calling the OIT HelpDesk at 865-974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

May 29
[ITWEEKLY] IT Weekly, May 29, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter 

May 29, 2018

 

Coming Soon: New Search Engine for www.utk.edu and www.tennessee.edu

You asked…we listened. On May 30, OIT is launching a new and improved search engine for utk.edu websites. The new web search is faster, allows for more granular site searches, and provides a better overall search experience. To access the new search, visit search.utk.edu or use the search box in the footer of most UT websites. A university system-wide search will also be available at search.tennessee.edu.

 


 

Using Clickers in Fall 2018?

License Cost Now Covered for Students

 

Are you wanting to take attendance, do daily quizzes, or check for student understanding during your lecture? As of Fall 2018, TurningPoint licenses for all UT, Knoxville students will be covered by Tech Fee, and students will be able to use their smartphone, tablet, or clicker device to participate in class. With the license fee removed, instructors can use TurningPoint in their courses without incurring the license cost for students.

 

For instructors who do not want to allow personal devices used in the classroom in their Fall 2018 classes, students can still purchase a clicker device in the VolShop for a cost of $ 31.25. For classes who will allow students to user a personal device, students can download the free TurningPoint app on their Android or iOS device. Notify the VolShop today if you want to require a physical clicker device, or if you previously required one and would like to remove that requirement.

 

OIT will host multiple training sessions over the summer for instructors who want to get started with clickers for the first time or transition to using clicker software with mobile devices.

 

Learn more about clicker software options for Fall 2018

 


 

UT and GDPR

EU Law became effective May 25, 2018

 

Data privacy is the key theme of the European Union’s General Data Protection Regulation (GDPR). Applicable to data subjects who are physically located within the EU, anyone at UT providing services online should review the information at  https://audit.tennessee.edu/compliance/gdpr/  and determine if they need to seek consent or at least provide a privacy notification. If you as an employee or anyone that is a covered data subject have questions about GDPR, please contact privacy@tennessee.edu

 


 

Network Infrastructure – Switch Upgrades and Internet Capacity

As you would expect, new buildings on campus are equipped with modern network switches. In addition, OIT has upgraded equipment in twelve buildings over the last year. These upgrades will continue as we move toward having 1 Gbps service to all wired devices. Also, as a result of these upgrades, these buildings have a 20 Gbps connection to the network core/data centers. Over thirty percent of our buildings have 20 Gbps high-speed network connections on campus to support research and big data projects.

 

Likewise, OIT is improving the campus Internet connectivity. Over the summer, we are replacing a 2 Gbps Internet connection with a 5 Gbps connection from another provider. We will also be installing a caching server that will store popular content in our data center so that it can be delivered to your device more quickly while offloading traffic from our Internet circuits.

 

If you have any questions about connectivity in your building, contact the OIT HelpDesk at 865-974-9900.

 


 

Amos for Windows by SPSS, an IBM company

Amos (Analysis of Moment Structures) analyzes Structural Equations Models (SEM) by either drawing a path diagram or via a command language. These models are also known as LISREL models, confirmatory factor analysis, analysis of covariance structures, path analysis, or causal modeling.

 

Learn more about WordStat on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


 

Upcoming OIT Workshops

OIT Workshops will return on June 3.  Until then, you can check out our online training offerings (including Lynda.com).

 

If your department would like to schedule group training, contact the OIT HelpDesk to get started.  Departmental training is available for any topic in the list of current workshop offerings.

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


 

How to spot a phishing email

It could be a phishing email if…

 

·         There are misspelled words in the e-mail, or it contains poor grammar. They’re getting better so don’t depend on “just” this indicator alone.

·         The message is asking for personally identifiable information, such as credit card numbers, account numbers, passwords, PINs, or Social Security Numbers.

·         The domain name in the message isn't the one you're used to seeing. It's usually close to the real domain name but not exact. For example:

o   Phishing website: www.regionsbanking.com

o   Real website: www.regions.com

 

Remember, no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password. We know who you are and have other ways of accessing your accounts if we need to.

 


 

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

May 21
[ITWEEKLY] IT Weekly, May 21, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

May 21, 2018

 

Writing Non-Phishy Emails: Do’s and Don’ts

Is your department planning to send a survey or ask your students to complete a task online?  Do your faculty need to update their information with the department? We know that sometimes you have to request specific personal information or ask faculty, staff, and students to take action for entirely legitimate reasons. The issue with this kind of email is that it can sound suspiciously similar to the hoax messages sent by phishers.

 

Since classes started in August, we’ve received approximately 230 unique phishing scams sent to UT email addresses.  During the same period, over 4,300 UT accounts have been compromised. 

 

Believe it or not, the OIT HelpDesk and Security teams receive questions about emails your department sends out.  It’s important to make the email look trustworthy.  We’ve put together a list of suggestions to follow when writing emails to make them look less suspicious.  We also recommend that you let us know when you are sending out a mass email that includes a call to action.  This extra step will help us help you; we will be able to quickly answer questions about your email message and encourage the faculty, staff, and students to take action. 

 

Learn more about the Do’s and Don’ts of constructing an effective email that won’t sound like a phishing scam.

 

Contact the OIT HelpDesk online or by phone at 865-974-9900 with any questions.

 


Summer Accessibility Workshops

This summer, OIT will be offering two NEW multi-day workshops designed to support faculty as they enhance the accessibility and usability of their courses and course materials. Whether you are developing a new course, bringing a course online, or want to be proactive about improving an existing course or course materials, these workshops can be a powerful resource for developing your skills and having an opportunity for hands-on practice. Space is limited, so sign up today! 

 

Designing Accessible Course Materials (2-day workshop)

June 6-7, 9:00 am – 1:00 pm, Learn more about this workshop and register online

 

Course Design for Everyone: Rethinking Accessibility (4-day workshop)

June 25-28, 9:00 am – 1:00 pm, Learn more about this workshop and register online

 

If you have any questions about the Summer Accessibility Workshops, contact the OIT HelpDesk online or at 865-974-9900.

 


2018-19 Faculty Fellow

We are pleased to announce Sean Morey, Assistant Professor in the Department of English, as the 2018-19 OIT Faculty Fellow. 
 
Morey’s interests are in emerging technologies, specifically Augmented Reality (AR) as a writing tool, its potential use for experiential learning, and how it might be used pedagogically across disciplines.

Morey will concentrate on: 

  • Developing outreach initiatives including faculty discussions and a focus group on how AR is/can be used throughout campus to enhance teaching and learning.
  • Assisting OIT with assessing emerging digital technologies for Universal Design for Learning (UDL) and accessibility compliance.
  • Producing AR-related teaching and scholarship along with instructor training in AR to help position the university as an emerging leader in using AR for education.

 

The OIT Faculty Fellow Program assists in advancing exemplary teaching and enriching the experience of students by implementing projects that enhance their department's use of instructional technologies. Learn more!

 


WordStat by Provalis Research, Inc.

WordStat is a supplemental program that works with either QDA Miner or Stata to perform content analysis on text data. This process is also known as text mining. You may create your own categorization dictionaries within WordStat or import pre-existing subject dictionaries. It can also extract topics automatically using latent semantic analysis. WordStat provides many of the same types of analyses as QDA Miner such as co-occurrence analysis and analyzing text categories by other variables such as age or gender. WordStat can only be started from within QDA Miner or Stata.

 

Learn more about WordStat on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT Workshops will return on June 3.  Until then, you can check out our online training offerings (including Lynda.com).

 

If your department would like to schedule group training, contact the OIT HelpDesk to get started.  Departmental training is available for any topic in the list of current workshop offerings.

 

If you have questions about training, contact the OIT HelpDesk online or call 865-974-9900.

 


Compromised Workstations

Is your workstation or laptop running “slow”? Does it take FOREVER for an application to start? Do you come in after being away from your desk to often find that your computer has restarted, displaying some sort of cryptic message about a problem? Your machine may be compromised or infected.

 

Security incidents come in all varieties. We are constantly under attack through web applications, emails, infected media (even new ones, fresh out of the package). It’s important that you report any of the symptoms like the ones listed above to your departmental IT staff or the OIT HelpDesk. It’s especially important if you routinely work with or have access to sensitive information like social security numbers, credit cards, or student information. Federal Law may require that the compromised information be reported.

 

So…you don’t work with sensitive information or have access to any of the above? You should still let your departmental IT person know about the peculiar behavior or call the OIT HelpDesk for guidance. Remember that we are all at risk when a device or a NetID is compromised.

 

If it looks like a duck; walks like a duck; sounds like a duck – it just might be a compromised machine.

 

What do you do? Let someone know! Don’t turn your computer off (if you can avoid it). Departmental IT: Don’t just “slick” the drive and rebuild the machine. Crucial information about the compromise could be lost. Don’t rebuild a machine until you’re instructed to do so. Keep your devices patched to the latest versions and keep your anti-virus up-to-date. UT Policy IT0110 requires that ALL UT-Owned devices MUST be running the latest, supported operating system and be patched. Exceptions must be approved by the Chief Information Officer.

 

For guidance, call the OIT HelpDesk at 865-974-9900.

 


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

May 14
[ITWEEKLY] IT Weekly, May 14, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

May 14, 2018

 

Clicker Access for All Students

This spring, after consultations with faculty, OIT evaluated options for classroom response software. UTK extended a Request for Proposal (RFP) which resulted in responses from three vendors. After much deliberation, the decision was to remain with Turning Technologies. One significant change, however, is the move to Enterprise Licensing for all students at the University of Tennessee, Knoxville. By funding an enterprise agreement with the technology fee, all students will have a license for classroom response software that they can use with their smartphone, tablet, or clicker device. Students who are required by faculty to use a separate clicker device for class participation will still have to purchase the device from the bookstore, but all student subscriptions (personal device or separate clicker) will be covered by the existing Technology Fee. 

 

What does the Enterprise License mean for faculty?

Have you been hesitant about including clickers in your course due to the added cost that students would incur? Did you want to get responses from students occasionally, but not often enough to warrant requiring your students to purchase a license and device?

 

Starting with the Fall 2018 semester, all students will have a license they can use on their iOS or Android phone or tablet, and you can decide to use the TurningPoint app in your class any time. Use it for a quick check to make sure students understand the day’s topic or a scheduled quiz. It’s up to you!

 

What are the new features?

  • Single Sign-on for faculty and students

   Faculty and students will log in with their UT NetID and password and will not be required to create another username and password.

   Single Sign-on eliminates the duplicate student account creation that has caused issues with student grades.

  • Enterprise Licensing

   All students will receive a Turning Technologies license purchased with Technology Fee funds.

   Faculty can use the features of Turning Technologies’ TurningPoint software without adding any additional cost to the students when using the mobile app.

   Students do not need to purchase a clicker unless the instructor requires it.

 

Do you want to get started with clickers or take those interactive questions to the next level? Watch for our training workshops coming this summer or ask for a consultation with one of our instructional designers to talk about how you can use clickers for formative assessment. To get started, contact the OIT HelpDesk online or by phone at 865-974-9900.

 


Are you teaching in a technology-enhanced classroom? 
We want to hear from you!

We are reaching out to instructors who taught in a nationalized technology-enhanced classroom to provide us some specific feedback on the rooms in which you taught.  To complete the survey, check your email for a message from Joel Reeves.

 

This survey is in response to the OIT 2018 Customer Survey where we asked you about “the availability of classrooms or meeting spaces with technology that enhances the teaching and learning experience. Your input will help us identify specific areas in classrooms where we can do better.

 

If you have any questions or taught this year and would like to complete the survey and did not receive the email, contact the OIT HelpDesk online.

 


Are you ready for your mid-year evaluation?

Stay on top of your 2018 goals with video-based training on Lynda.com, an outstanding online resource for learning both technical and professional skills. View from any mobile device and even download training to view offline while you are out and about.

 

Improvement in technical skills is boundless through Lynda.com. Look for training on anything from calendaring basics, to managing spreadsheets, to learning advanced programming languages. You’ll even find certification preparation courses including Adobe and Microsoft.

 

For those aspiring to advance their management and leadership skills, explore topics within project management, communications, management, and leadership. If you are not sure where to begin, take a look at Learning Paths. Lynda.com has done some of the work for you by compiling lists of knowledge and skills required in a variety of careers based on feedback from industry experts.

 

Lynda.com helps you track your progress on course completions and certifications to easily document your success towards meeting your annual goals. Earned certifications can be linked within your LinkedIn profile.

 

Ready to begin?  Learn how to navigate and use Lynda.com by watching “How to use Lynda.com” at tiny.utk.edu/lyndahowto.

 

Sign in with your NetID to access Lynda.com tutorials at oit.utk.edu/lynda/

 

When navigating directly to Lynda.com, you will be required to select “Sign in with your organization portal,” then enter the following URL, utk.edu. You will be directed you to our Central Authentication Page. 

 

If you have any questions about Lynda.com or other OIT training opportunities, contact the OIT HelpDesk online or 865-974-9900.

 


Google Drive Desktop Sync Shutdown

As previously announced by Google, the old Google Drive desktop sync client for Mac and PC—a feature officially known as “Google Drive for Mac/PC”—was shut down on May 12th, 2018. After this date, the sync client will no longer work. OIT recommends installing Drive File Stream or the new version of Drive for Mac/PC, called Backup and Sync.

 

Drive File Stream is a new desktop application that allows you to quickly access all of your Google Drive files on demand, directly from your computer without losing precious drive space. 

 

What are the features of Google Drive File Stream?

  • Quickly see all your Google Drive files in Finder/Explorer (including Team Drives).
  • Browse and organize Google Drive files without downloading all of them to your computer.
  • Choose which files or folders you'd like to make available offline.
  • Open files in common apps like Microsoft Office and Adobe Photoshop.

  

For more information, visit the Knowledge Base, or contact the OIT HelpDesk at 865-974-9900.

 


Stata MP by Stata Corp

Stata MP is a general purpose package for statistics, data management, and graphics. You can control it using its programming language or its graphical user interface. Stata is designed to be easily extendable, and there are hundreds of free add-ons available for it in Internet repositories. Stata is particularly strong in time series, panel data, and the analysis of complex, non-random samples. Its data must fit into your computer’s main memory, limiting the amount of data it can handle.

 

Learn more about Stata MP on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.

 


Upcoming OIT Workshops

OIT will be offering workings for the following topics this week.  Check out the Online Calendar to see the schedule and register for any OIT workshop.

 

  • SPSS 1 (Basics)
  • SPSS 2 (SPSS Data Analysis)

 

If you are unable to attend these sessions or want to learn more about these topics, check out our online training offerings (including Lynda.com).

 

If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call 865-974-9900.

 


Secure File Transfer

Vault (UT Secure Courier) is a secure file transfer application that allows users to easily share large files, including executables, quickly and securely. Files are uploaded and downloaded via SSL encrypted HTTP and stored in an encrypted data store. Using Vault is as easy as sending an email with an attachment, and, it can be used from both a PC and a Mac.

 

Users log in to the system with their UT email address and NetID password, and then upload or download the file as appropriate. Vault is intended for file transfer and not for permanent file storage. Files are automatically deleted 20 days after they are uploaded. Vault is available to all current university faculty, staff, and students; non-UT users can use it both to send and receive files, but they have to send or receive from a UT person.

 

You can access Vault online at vault.utk.edu/. Please contact the OIT HelpDesk at (865) 974-9900 if you have any questions or need any assistance.

                                                                                                    


To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

1 - 10Next