Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
August 26
[ITWEEKLY] IT Weekly, August 26, 2016 (re-send)

 

August 26, 2016

Stay Connected with OIT

You have several options when it comes to keeping informed of what’s happening at OIT.

·      Subscribe to IT Weekly: Weekly news about IT Services on campus.

·      Subscribe to the OIT Instructional and Research Support eNewsletter: Monthly news from OIT”s Instructional and Research Support teams.

·      Subscribe to the OIT System Status Center: Email updates for the status of OIT services.

·      Follow us on Twitter:@UT_OIT

·      Like us on Facebook: UT_OIT

 

The OIT HelpDesk posts updates about technology on campus, reported issues and problems, and will respond to most questions and comments on Twitter. Twitter and Facebook are great resources for timely updates on OIT announcements.

 

If you have any questions about any OIT Service, please contact the OIT HelpDesk online or call (865) 974-9900.

 

OIT Scantron Test Scoring Services

A fast and accurate way to score tests or enter survey data is to use optical mark recognition forms. These familiar darken-the-circle forms require the use of a number 2 pencil.

 

The cost of scanning is 6 cents per page. It is the same for single- and double-sided forms. This price includes an Excel file containing your data. For tests, we also provide item analysis in the form of a PDF file. Answer reports of each student's answers and the correct answers for each item, formerly an extra cost option, are available at no charge. You must pay using a departmental account. We cannot scan without this account number. Students who need to use the service must handle billing through their department.

 

Scantron forms should be dropped off and picked up at 517 Greve Hall. Forms may be dropped off or picked up between 9 a.m. and 5 p.m., Mon.-Fri. Forms should be picked up promptly after being processed. Processed forms left over two weeks from their drop-off date will be securely discarded.

 

Forms will be processed within one working day. Your Scantron results will be delivered to you via the secure Online@UT (Blackboard) interface. Once you receive your Scantron results in Blackboard, your forms will be ready for pickup at Greve Hall.

 

On the last day of final exams we scan more frequently to give you more time to get your grades in.

 

If you have special needs such as scanning custom forms or scheduling quicker turnaround time, contact the OIT HelpDesk online or call (865) 974-9900 a few days in advance to make the arrangements.

 

Software Update: R by the R Core Team

What is it? R is a free, open source software environment for statistical computing, data management and graphics. While all of its features can be controlled by its programming language, several user interfaces exist that make it easy for non-programmers to use. It is very extensible and supports a wide range of methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.

 

Where can I run it? Being free, you can install R on any Linux, Mac or Windows computer. R is available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and on the computers in the OIT public labs. There is no simultaneous user limit for R.

 

How can I learn it? OIT offers workshops each semester and there are a set of two-minute tutorials at the  “twotorials” web site. The main R web site lists addresses for support “mailing lists” and manuals.

 

Where can I get support? OIT offers Full Support for R. The best web site to ask questions or look up answers regarding R programming is Stack Overflow. The best place to ask questions or look up answers regarding statistical analysis in R is Cross Validated. You can request assistance by calling the OIT HelpDesk at 974-9900. 

 

Workshops for August 29 – Sept 2, 2016

Instructor-Focused:

·   BYOD Wirelessly with Wolfvision Cynap

August 29 (Mon), 10:00am - 11:00am OR 1:20pm - 2:20pm

August 30 (Tue), 9:30am - 10:30am OR 2:00pm - 3:00pm OR 3:00pm - 4:00pm

August 31 (Wed), 9:00am - 10:00am OR 3:45pm - 4:45pm

 

·   iPads and Instruction, August 30 (Tue), 1:00pm - 3:00pm

 

Researcher-Focused:

·   Introduction to MATLAB, September 2 (Fri), 1:30pm - 3:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Spoofing for Phish?

As the school year gets underway, it’s important to be vigilant when checking your email.  There are a couple techniques that scammers are using to steal your information.

 

·         Spoofing is the modification of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing is often used by spammers and can be accomplished by changing the "FROM" e-mail address.

 

E-mail spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. E-mail spammers often use spoofing in phishing attempts to convince you to open, and possibly even respond to, their solicitations.

 

·         Phishing is when scammers try to contact you through your UT email account to collect your personal information, such as your password, credit card numbers, account numbers, PINs, or Social Security numbers. It could be a phishing email if…

 

·         There are misspelled words in the e-mail or it contains poor grammar. They’re getting better so don’t depend on “just” this indicator alone.

 

·         The message is asking for personally identifiable information, such as credit card numbers, account numbers, passwords, PINs, or Social Security Numbers.

 

·         The message is telling you to login to verify your account or “else”

 

·         The domain name in the message isn't the one you're used to seeing. It's usually close to the real domain name but not exactly the same.

For example: (One of the links below is GOOD, One is BAD!!)

 

Phishing website: http://helpdeskutk-verify.sitey.me/

Real website: http://helpdesk.utk.edu

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

OIT also takes steps to block anyone on the UTK network from going to a bogus or malicious site. Additionally, OIT will reach out to a website provider and inform them that a site hosted on their system is participating in malicious activity. However, it all starts with you. If it looks “phishy”, call OIT and report it. If you realize that you have fallen for a phishing email and logged in with your UT credentials, call the OIT HelpDesk at (865) 974-9900.

 

Remember: no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password via email.

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

August 26
[ITWEEKLY] IT Weekly, August 26, 2016

 

August 26, 2016

Stay Connected with OIT

You have several options when it comes to keeping informed of what’s happening at OIT.

·      Subscribe to IT Weekly: Weekly news about IT Services on campus.

·      Subscribe to the OIT Instructional and Research Support eNewsletter: Monthly news from OIT”s Instructional and Research Support teams.

·      Subscribe to the OIT System Status Center: Email updates for the status of OIT services.

·      Follow us on Twitter:@UT_OIT

·      Like us on Facebook: UT_OIT

 

The OIT HelpDesk posts updates about technology on campus, reported issues and problems, and will respond to most questions and comments on Twitter. Twitter and Facebook are great resources for timely updates on OIT announcements.

 

If you have any questions about any OIT Service, please contact the OIT HelpDesk online or call (865) 974-9900.

 

OIT Scantron Test Scoring Services

A fast and accurate way to score tests or enter survey data is to use optical mark recognition forms. These familiar darken-the-circle forms require the use of a number 2 pencil.

 

The cost of scanning is 6 cents per page. It is the same for single- and double-sided forms. This price includes an Excel file containing your data. For tests, we also provide item analysis in the form of a PDF file. Answer reports of each student's answers and the correct answers for each item, formerly an extra cost option, are available at no charge. You must pay using a departmental account. We cannot scan without this account number. Students who need to use the service must handle billing through their department.

 

Scantron forms should be dropped off and picked up at 517 Greve Hall. Forms may be dropped off or picked up between 9 a.m. and 5 p.m., Mon.-Fri. Forms should be picked up promptly after being processed. Processed forms left over two weeks from their drop-off date will be securely discarded.

 

Forms will be processed within one working day. Your Scantron results will be delivered to you via the secure Online@UT (Blackboard) interface. Once you receive your Scantron results in Blackboard, your forms will be ready for pickup at Greve Hall.

 

On the last day of final exams we scan more frequently to give you more time to get your grades in.

 

If you have special needs such as scanning custom forms or scheduling quicker turnaround time, contact the OIT HelpDesk online or call (865) 974-9900 a few days in advance to make the arrangements.

 

Software Update: R by the R Core Team

What is it? R is a free, open source software environment for statistical computing, data management and graphics. While all of its features can be controlled by its programming language, several user interfaces exist that make it easy for non-programmers to use. It is very extensible and supports a wide range of methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.

 

Where can I run it? Being free, you can install R on any Linux, Mac or Windows computer. R is available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and on the computers in the OIT public labs. There is no simultaneous user limit for R.

 

How can I learn it? OIT offers workshops each semester and there are a set of two-minute tutorials at the  “twotorials” web site. The main R web site lists addresses for support “mailing lists” and manuals.

 

Where can I get support? OIT offers Full Support for R. The best web site to ask questions or look up answers regarding R programming is Stack Overflow. The best place to ask questions or look up answers regarding statistical analysis in R is Cross Validated. You can request assistance by calling the OIT HelpDesk at 974-9900. 

 

Workshops for August 29 – Sept 2, 2016

Instructor-Focused:

·   BYOD Wirelessly in the classroom with Wolfvision Cynap

August 29 (Mon), 10:00am - 11:00am OR 1:20pm - 2:20pm

August 30 (Tue), 9:30am - 10:30am OR 2:00pm - 3:00pm OR 3:00pm - 4:00pm

August 31 (Wed), 9:00am - 10:00am OR 3:45pm - 4:45pm

 

·   iPads and Instruction, August 30 (Tue), 1:00pm - 3:00pm

 

Researcher-Focused:

·   Introduction to MATLAB, September 2 (Fri), 1:30pm - 3:30pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Spoofing for Phish?

As the school year gets underway, it’s important to be vigilant when checking your email.  There are a couple techniques that scammers are using to steal your information.

 

·         Spoofing is the modification of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing is often used by spammers and can be accomplished by changing the "FROM" e-mail address.

 

E-mail spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. E-mail spammers often use spoofing in phishing attempts to convince you to open, and possibly even respond to, their solicitations.

 

·         Phishing is when scammers try to contact you through your UT email account to collect your personal information, such as your password, credit card numbers, account numbers, PINs, or Social Security numbers. It could be a phishing email if…

 

·         There are misspelled words in the e-mail or it contains poor grammar. They’re getting better so don’t depend on “just” this indicator alone.

 

·         The message is asking for personally identifiable information, such as credit card numbers, account numbers, passwords, PINs, or Social Security Numbers.

 

·         The message is telling you to login to verify your account or “else”

 

·         The domain name in the message isn't the one you're used to seeing. It's usually close to the real domain name but not exactly the same.

For example: (One of the links below is GOOD, One is BAD!!)

 

Phishing website: http://helpdeskutk-verify.sitey.me/

Real website: http://helpdesk.utk.edu

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.

 

OIT also takes steps to block anyone on the UTK network from going to a bogus or malicious site. Additionally, OIT will reach out to a website provider and inform them that a site hosted on their system is participating in malicious activity. However, it all starts with you. If it looks “phishy”, call OIT and report it. If you realize that you have fallen for a phishing email and logged in with your UT credentials, call the OIT HelpDesk at (865) 974-9900.

 

Remember: no one in OIT, the OIT HelpDesk, or any legitimate online entity will ever ask you for your password via email.

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

August 19
[ITWEEKLY] IT Weekly, August 19, 2016

 

August 19, 2016

New Workshop: BYOD Wirelessly with WolfVision Cynap

We have a brand new workshop on using the new Wolfvision Cynap devices that are becoming available this fall in select classrooms. The Cynap system allows you to bring your own device and connect to your tablet, phone, or laptop wirelessly.

 

The Cynap will allow instructors to use multiple devices, have students give presentations without worrying about adapters, and allow students to take better notes of presentations by streaming what is on the screen.

 

Sign up for a one-hour workshop today!

 

Cynaps are available in the following classrooms:

·   Dougherty Engineering 416

·   Earth and Planetary Sciences 400

·   Hodges Library Rooms: 101, 127, 128, 211, 220E

·   Plant Science 128

·   Walters Life Science M401 and M415

·   Alumni Memorial Building 32 (coming soon)

 

Report wireless problems in your classroom

Are you ever in a classroom on campus where the wireless internet coverage could use a little TLC? You can report classroom wireless issues via text message while you are in class by texting “UTKwifi” followed by your building and room number information to 55000.

 

This initiative allows OIT to collect crowdsourced data provided by you, the students, staff, and faculty that are in the classrooms using the WiFi every day. It is recommended to check that your device has been registered for use on the wireless network and was working normally in other areas of campus before texting in your location. This will help ensure that we have the most accurate data possible. As an added benefit of this service, if we receive several text messages in a short time frame for a specific area (for example the auditorium in Alumni Memorial Building), OIT will investigate the issue and dispatch network engineers if necessary. This information, including a screen shot example of how to text in your location, is available in the OIT Knowledge Base. If you have any questions about the pilot, contact the OIT HelpDesk online or call (865) 974-9900.

 

File Sharing: One Drive, Google Drive, and T-Storage

The university provides three approved file storage options for faculty, staff, and students. Information about storing sensitive information is available in the OIT Knowledge Base.

 

T-Storage: T-Storage (you might know this as the H: drive on your computer) provides a central location on premise for users and departments to store files and is available to all Knoxville faculty, staff, and students.  Users have a default quota of 50 GB and Departments have a default quota of 100 GB. Additional information is available on the OIT T-Storage website.

 

OneDrive for Business: OneDrive for Business is available through your Office 365 account and provides you with 1 TB of storage space. You can store documents and photos online so they can be accessed from any Internet-connected computer and be shared with others. Additional information about OneDrive for Business, including the usage policy, is available on OIT’s Office 365 page.

 

Google Drive: Google Drive on your Mac, PC, Android or iOS device gives you a single place for up-to-date versions of your files from anywhere. Google Drive includes unlimited storage for your files. Additional information about Google Drive, including the usage policy, is available on OIT’s Google Apps page.

 

If you have questions about which option is best for you, contact the OIT HelpDesk online or call (865) 974-9900.

 

Software for Faculty, Staff, and Students

UT has contracts with many software providers to allow faculty, staff, and students access to many great programs.  Our contracts govern the distribution of the software and access to it is determined by your affiliation with the university and whether the software will be installed on university-owned or personally-owned computers.  While much of the software is available for academic and administrative use at no additional charge, some of the recommended applications will need to be purchased through VolShop. Additional information is available on OIT’s Software website. Software is available through the following methods:

·        OIT’s Software Download website: Allows faculty, staff, and students to download and install software directly to their computer.

·        Personal and Departmental Purchases available through VolTech.

·        Apps@UT: Run software from OIT’s terminal server as if it were installed on your own computer. You can open and save files on your own computer's disk drive and print to your own printer. Log in at http://apps.utk.edu from any Windows, Macintosh, Linux, or Solaris computer for access to this service.

·        OIT’s Newton High Performance Cluster: Linux-based compute cluster for calculations that require long processing times, a high degree of parallelism, or large data sets.

·        Cloud-based offering: Software available directly from the vendor, such as Qualtics, MATLAB, Mathmatica, and Office 365 ProPlus

 

If you have questions about accessing, downloading, and/or installing UT software, please contact the OIT HelpDesk.

 

Web Surveys Made Easy with Qualtrics

Qualtrics Insight Platform is an easy-to-use online survey software that’s powerful enough to perform the most sophisticated research as well as capture insights for process improvement, program feedback and more. Survey creation is simple and it is easy to collaborate your surveys and results with others and analyze results inside and outside the platform (export to SPSS, Nvivo, SAS, R, etc.). Qualtrics secure servers and technology can manage sensitive data upon approval from the Institutional Review Board (IRB).

 

Qualtrics is for everyone!

Student Researchers - Conduct any type of research from class projects and field studies to graduate capstone projects, theses and dissertations.

Faculty Researchers - Put your respondents in “real-life” situations and execute studies using multiple stimuli, randomization, timing sequences, and more.

Instructors - Administer quizzes and tests with built-in scoring, timed questions and automated distributions and expirations. Create instructional modules, and administer polls and surveys to students.

Administrators - Create forms, applications, collect program feedback and measure campus engagement. Create in-depth reports that can be exported or shared live via a web link.

 

Qualtrics’ New User Interface

Over the summer, Qualtrics migrated to their new user interface which includes improved reporting tools, additional data and analysis features such as Qualitative Research with Text Analytics, and new question types including Signature and Text Highlight. To learn about the changes and new features of the Qualtrics Insight Platform, visit Qualtrics’ Support Page or attend a What’s New in Qualtrics workshop.

 

Account Creation and Training

To create an account go to UT Qualtrics web page.  Multiple workshops are offered throughout the semester at the OIT Training page. If you have any questions about using Qualtrics or wish to set up a one-on-one consultation, contact the OIT HelpDesk online or call (865) 974-9900.

 

Workshops for August 22-26, 2016

Instructor-Focused:

·   Cloud Storage Options at UTK (Faculty / Staff Focused), August 22, 10:30am - 11:30am

·   Creating Accessible Documents on a Mac, August 24, 1:30pm - 3:30pm

·   Getting to Know Canvas:

August 22, 12:30pm - 2:30pm

August 23, 1:00pm - 3:00pm

August 24, 9:00am - 11:00am

August 26, 9:00am - 11:00am OR 1:00pm - 3:00pm

 

·   Teaching in a Technology Enhanced Classroom (TEC) 1:

August 22, 10:00am - 11:30am OR 3:30pm - 5:00pm

August 23, 1:00pm - 2:30pm

August 24, 1:10pm - 2:25pm

 

·   BYOD Wirelessly with Wolfvision Cynap

August 26 , 3:00pm-4:00pm OR 4:00pm-5:00pm

 

Researcher-Focused:

·   What's New: Introducing the Qualtrics Insight Platform, August 25, 10:00am - 11:00am

 

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Encryption- Protecting Sensitive Information

What is encryption? Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. This conversion allows you access to your files, while limiting the ability of others to read and understand your data. The primary purpose of encryption is to protect the confidentially of digital data stored on computer systems or transmitted via the internet.

 

Over the last 10 years, enterprise-wide use of encryption has jumped from 15 percent to 37 percent, according to a 2016 study conducted by the Ponemon Institute.

 

Major encryption categories and considerations include:

 

   Database, data storage centers, and big data repository encryption

   Email encryption

   Application-level encryption

   Hard drive encryption (full disk encryption [FDE] or an intermediate disk encryption)

   Encryption of financial transactions

   Internet connections: secure sockets layer (SSL), transport layer security (TLS)

   Public/private cloud encryption, and cloud gateway encryption

 

The types of industries using encryption vary, too. As would be expected, industries that have strict compliance and regulation—like finance and healthcare—are the biggest users of encryption. But its use is growing industry-wide, from retail and tech companies to manufacturers and the public sector. That’s because no one is immune to many of the mistakes that encryption can protect, like employee error.

 

Your laptop, mobile devices, and USB flash drives can store a tremendous amount of sensitive data. However, if you lose any of these devices, anyone can read your information including your emails, documents, and photos. Encrypting your data is a great tool to use to prevent unauthorized people from accessing your date, if lost, stolen, or even hacked.

 

Want to know how to use encryption for your data and files? OIT, through SANs Securing the Human, provides a training module titled, “Encryption-Protecting Sensitive Information” that can help you understand the benefit associated with encryption. Further, the module includes step-by-step overview of how encryption works to protect your sensitive information. This overview helps you understand what to encrypt and when to encrypt so that you can best protect your information from unauthorized eyes.  

 

To review the “Encryption Module”, go to the Security Awareness Training and click on the BIG RED BUTTON image at the top of the page. You will be prompted to enter your NetID and Password.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

August 12
[ITWEEKLY] IT Weekly, August 12, 2016

 

August 12, 2016

Move-In Weekend Support

We will have extra staff on hand at the OIT HelpDesk and Student Computer Support this weekend to help students as they move in. Students can receive help over the phone, by email, or in person at the OIT Service Center in the Commons at Hodges Library or at our temporary location in the Presidential Courtyard. Typical requests include connecting to the network, setting up email accounts, logging in to Canvas/Blackboard, and all the other services related to getting ready for classes. During this time, all students must register their computers and other network devices before connecting to the UT network. The hours for the Commons and Presidential Court locations are posted online. As always, the telephone OIT HelpDesk will be available 24/7.

 

Microsoft Office for Faculty, Staff and Students

Faculty, Staff, and Students have access to Microsoft Office for personally owned devices at no additional cost. The campus agreement with Microsoft provides access to the Microsoft Office ProPlus desktop applications, Office for iPad, and the online Office Web Apps.

 

Students are able to download Microsoft Office ProPlus applications on up to 5 devices (PC, Mac, and/or mobile device). Office ProPlus versions are the full desktop versions of the Microsoft Office Suite and include Word, Excel, PowerPoint, Outlook, OneNote*, Access*, and Publisher*. *Windows PC client programs and/or features only. Cannot be used across devices.

 

To access your Office 365 Pro Plus subscription, log in to download the software at https://portal.office.com/OLS/MySoftware.aspx.

 

Additional information about this program is available online:

Faculty/Staff:  http://oit.utk.edu/proplus

Students:          http://oit.utk.edu/MSadvantage

 

Zoom Test Flights

If you are taking an entirely online course, you may just be using Zoom! Zoom, our UTK cloud-based conferencing technology, allows faculty, staff and students to have high-quality interaction in real time from their computers and mobile devices. You’re invited to join us online for the Fall 2016 Test Flights! Test Flights provide faculty and students an opportunity to join an online meeting and test the communication tools available to meeting participants. Test Flights will be held via the Zoom application. 

 

Participants are welcome to join either of the meetings below and you may exit the online meeting at any time.

·   Monday, August 15, 11:00am to 1:00pm

·   Tuesday, August 16, 5:00pm to 7:00pm

 

You may review the specific instructions and additional information about Zoom prior to joining a Test Flight.

 

Clicker Users: UTK Migrates to TurningPoint Cloud TODAY

UTK has migrated to Turning Technologies' TurningPoint Cloud system for classroom polling. Turning’s Cloud has an enhanced polling system that provides greater questioning structure and classroom engagement for faculty and students.

 

Turning discontinued TurningPoint 5, so TurningPoint Cloud is the only option going forward.  TurningPoint Cloud is a single, web-based management system that features polling via hybrid response devices (clickers and web-based mobile devices) with an annual Turning account. All students (who don’t currently have a 4-year account) need to purchase the Turning account (1 year or 4 year) and for the beginning of this semester, they will receive a rebate of $20.99 for any combination of the Turning account and/or clicker bundle.

 

Software Update: SPSS SamplePower

Whatis it? SamplePower, by SPSS, an IBM Company, helps you plan your study by figuring out the smallest number of subjects (or experimental units) you would need to find a significant result.

 

Where can I run it? SPSS SamplePower is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs. The download and installation instructions are available at the OIT Software Download web page.

 

How can I learn it? To learn SPSS SamplePower, refer to the documentation found under the Help menu.

 

Where can I get support? OIT offers Minimal Support for SamplePower.

 

Workshops for August 15-19, 2016

Instructor-Focused:

TurningPoint Clickers (Basics and Transitioning to TurningPoint Cloud (6)):

August 15, 9:00am - 10:30am OR 11:00am - 1:00pm OR 1:30pm - 3:00pm

August 16, 9:00am - 10:30am OR 1:30pm - 3:00pm OR 3:30pm - 5:00pm

August 17, 9:00am - 10:30am OR 11:00am - 1:00pm

August 18, 1:00pm - 3:00pm

August 19, 11:00am - 1:00pm

 

Teaching in a Technology Enhanced Classroom (TEC) 1:

August 17, 2:30pm - 4:00pm

August 18, 9:30am - 11:00am OR 3:00pm - 4:30pm

 

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Protecting Data on Your Smart Phone

When we store personal information on devices like smart phones, we are taking the risk that the information will be exposed to unauthorized persons. Here are some recommendations:

·   Avoid storing pictures locally on your laptop, smartphone or tablet.

 

·   Keep secure backups on Hard Disk Drives or other less portable devices to securely store your confidential and sensitive documents. Make sure that the hard drive is kept well away from an internet connection, as any internet-connected device can be an open door for hackers at some point.

 

·   Encrypt, encrypt, encrypt. It may seem an overhyped functionality, but making your data undecipherable to hackers is a strong defense. Latest generation Android devices have an embedded full-device encryption feature that can encrypt all data, including applications, downloaded files and pictures. If your phone has PIN capabilities, SET IT!

 

·   Protect your accounts with strong, complex passwords. Use symbols, numbers and capital letters or even strange phrases to lock your cloud content from prying eyes.

 

·   Try to blur out your face on potentially compromising images. You wouldn’t want your risqué selfies to appear on Twitter, Reddit or Facebook would you?

 

·   Don’t email your private photos. Email accounts, especially those without two-factor authentication enabled, are easy targets for hackers looking to steal your personal details and intimate photos.

 

·   Format your memory card or internal memory. When you sell or lend your phone, be sure to format and overwrite the data with a secure erase tool to make sure that nothing remains.

 

·   Don’t share confidential information on open Wi-Fi hotspots unless you use a proper mobile security solution to block unrequested connections. Hackers can monitor your traffic and grab your banking credentials and compromising pictures without your knowledge. NOTE: UT-Open and is an open hotspot, meaning the data is NOT encrypted between your device and the access point. Eduroam offers the only encrypted service between your device and the network on campus. You can authenticate to Eduroam using your netid@utk.edu and password credentials.

 

·   Disable auto-uploads for cloud storage solutions such as Google Apps, iCloud and Dropbox. These services, as useful as they may seem, create cloud-based versions of your images without filtering your most sensitive files from the harmless ones.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

August 05
[ITWEEKLY] IT Weekly, August 5, 2016

 

August 5, 2016

How Does an Employee Get Access to Technology at UT?

Have you ever wondered how a new employee gets added to the system? When a new employee is hired, the hiring department should complete the IRIS Transaction: ZPHRRECORD000 – Record Pending Employee and use your department’s Pending Employee position. The new employee will be added to IRIS and assigned a NetID in the directory. This process takes a few days before the account has been added to all the appropriate systems. Once the NetID is ready, you can create an email account, download software, log in to your desktop and/or computers at the library, access MyIRIS Employee Self-Service, and much, much more.

 

If you find yourself in a bind and need a NetID for a new employee sooner than the typical cycle allows, you can request one by filling out our online Request for NetID Form. The form is available at http://oit.utk.edu/forms > Request a NetID (Network Identifier) for a Person. This account will be manually created, and as a result will have limited access to UT resources until the new employee’s information has traversed the various systems. Requests for new NetIDs are typically processed within one business day.

 

If you have any questions, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Upcoming Upgrades to the VPN (access.utk.edu)

OIT Network Services will be upgrading the VPN (access.utk.edu) on Monday, August 8th between 10:00 PM and 2:00 AM EDT. After the upgrade, users will see a change in style and layout of the web portal; however, no loss of functionality is expected.

 

Note for Mac users: Network Connect is no longer supported by the vendor for Mac OS Maverick (10.9) and newer. Mac users should install the Pulse Secure client available on the OIT Software Download website. Installation and configuration instructions for Mac & Windows are available on the OIT Knowledge Base.

 

Note for Windows users: We are encouraging Windows users to also move to the Pulse Secure client, however, the Network Connect client and Secure Application manager will continue to be supported by the vendor. These clients should automatically upgrade on the next login after the system upgrade.

 

Users of Pulse Secure clients on Android and iOS devices should not be impacted by this upgrade.

 

If you have questions related to this announcement, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Use Lynda.com to Supplement your Course!

Our Lynda.com campus subscription provides a vast online library of instructional videos covering the latest in software product tutorials, creative design techniques and professional development training. With more than 2,500 courses taught by industry experts, lynda.com is designed for all levels of learners and at least 20 new courses are added weekly. Create playlists for yourself or to share with those inside the UTK domain, adding your own content for students to access all in one online collection. Enter through the UTK portal here: https://oit.utk.edu/lynda with your NetID and Password and enjoy these benefits and more!

        Unlimited access to thousands of courses

        Beginner to advanced courses

        Full courses or segments dedicated to certain tasks

        Closed captioning on many videos, with a time-coded transcript

        Access to course instructor's materials added through playlist creation

        Mobile connections and offline viewing from smart phone, tablet or computer

        Faculty can be group administrator: Upload student group, assign tasks and export reports on student progress.

 

For assistance with these tools in Lynda.com, contact the OIT HelpDesk online or call (865) 974-9900.

 

Classroom Technology Training

Attend one of our blitz training workshops on clickers and/or Technology-Enhanced Classrooms. Learn how to incorporate the new TurningPoint software in your class, start using clickers for the first time, or discover how to best use the Smartboards, document cameras, and other technology in your classes. 

 

Plus, we have a brand-new workshop on using the new Wolfvision Cynap devices that are becoming available this fall in select classrooms. The Cynap system allows you to bring your own device and connect to your tablet, phone, or laptop wirelessly.

 

Check Out the Workshops for:

        TurningPoint Clickers (Basics and Transitioning to TurningPoint Cloud 6)

        Teaching in a Technology-Enhanced Classroom

        BYOD Wirelessly with Wolfvision Cynap

 

Software Update: SPSS Statistics by SPSS, an IBM company

What is it? SPSS Statistics is the most widely used statistics package at UT. It does a broad range of statistics and graphics, and it is easy to learn and use. It is also easy to transfer data from SPSS into R or SAS to access any esoteric analyses. While most users prefer the SPSS easy-to-use GUI interface, more advanced users can take advantage of its programming language. The SPSS programming language can be used to automate repetitive tasks, to leave an audit trail of the steps you took, and to get the package to do something that it was not originally designed to do.

 

Where can I run it? SPSS is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows, Macs and Linux computers. The download and installation instructions are available at the OIT Software Download web page. It is also available on OIT’s Apps@UT server and on the computers in the OIT public computer labs. There is no simultaneous user limit for SPSS.

 

How can I learn it? OIT offers workshops on SPSS each semester, and you may schedule a one-on-one tutorial by calling the OIT HelpDesk at 974-9900. There is also an introductory tutorial available in SPSS under Help. The other help files are also very detailed and easy to learn from. The Lynda.com online training library offers free SPSS training videos to registered members.

 

Where can I get support? OIT offers Full Support for SPSS. You can request assistance from the OIT HelpDesk at 974-9900.

 

Workshops for August 8-12, 2016

Instructor-Focused:

·   Teaching in a Technology Enhanced Classroom (TEC) 1, August 8, 9:30am - 11:00am

·   Getting to Know Canvas, August 8, 1:00pm - 3:00pm

·   Teaching in a Technology Enhanced Classroom (TEC) 1, August 8, 3:00pm - 4:30pm

·   Teaching in a Technology Enhanced Classroom (TEC) 1, August 9, 1:00pm - 2:30pm

·   Camtasia for Mac, August 9, 2:00pm - 4:00pm

·   Getting to Know Canvas, August 12, 1:00pm - 3:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Using Cloud Storage

With the increase use of cloud storage (GoogleDrive, Microsoft OneDrive, Dropbox, Evernote, etc), individuals should take extra precautions to ensure that personal data and university data is protected.

 

Cloud storage can reduce the risk involved with physically carrying data around on removable media. Users often have on-demand access to their information anywhere, and cloud service can provide users easier collaboration with others due to ease of accessing and transferring information.

 

However, being aware of the disadvantages of cloud computing will allow you to best utilize its services. Cloud services often run on an external or third party provider’s system, unlike systems directly under the user’s personal or institutional control. It is important to know who is actually storing the information and how it is being stored.

 

Cloud vendors often have transparent or inadequate service level agreements, which do not clarify their level of security and privacy regarding your data. Being aware of the security controls will help you protect the data.

 

It is imperative that no legally restricted or confidential data be placed in cloud environments that are not sanctioned by the University. Currently, the only cloud storage environments that are approved by the University are Google Drive (using your university account) or Microsoft's OneDrive for Business.

 

While cloud computing can be a beneficial utility, it is important that users are aware of the types of information being stored, where the information is stored, and what security measures are in place to protect your data.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 29
[ITWEEKLY] IT Weekly, July 29, 2016

 

July 29, 2016

Canvas is Here! Available August 1

As you know, UTK is transitioning from the Blackboard Learn LMS to Canvas over the course of the next year. Blackboard and Canvas will run in parallel through May 31, 2017, when Blackboard will be retired. Canvas will be available to faculty on August 1, 2016 at http://utk.instructure.com. Faculty will be able to login with their Netid and password, and will have access to all Fall Semester courses. We’ll have a new login screen available soon.

 

It’s not too late. If you are interested in using Canvas for Fall 2016 classes, please complete an OIT HelpDesk Support Ticket as soon as possible so that we can migrate your Blackboard course content. Additionally, you may wish to attend an Introduction to Canvas Workshop or drop in for an open consultation. We are also happy to schedule special group workshops by request. Keep an eye to your email and the online.utk.edu website for updates and online training opportunities. We will soon be announcing our Fall Semester workshop schedule, which will be full of Canvas opportunities. Begin to prepare now for the Spring Semester.

 

You may register for any of the following opportunities at our Training/Workshop Registration page:

 

Getting to Know Canvas Workshops:

1:00pm – 3:00pm, Greve 520: August 8, 12

 

Open Consultations for Transition to Canvas:

9:00am – 11:00am, Greve 520: August 2, 4

 

July 25: Changes to UTK Wireless

On Monday, July 25th, OIT reduced the number of UTK wireless networks from four to two in order to increase the throughput of the wireless network. The two broadcasted networks for connecting to wireless are ut-open and eduroam.

 

UT-open: The unsecured network available to faculty, staff, students, and visitors. A new portal is now available to manage network registration and visitor access.

 

Eduroam: The secure network available to faculty, staff, and students. Eduroam replaced the ut-wpa2 network and offers all of the previous functionality. In addition to wireless access at UT, faculty, staff, and students will be able to obtain Internet connectivity when visiting other participating eduroam institutions.  Instructions for getting connected with eduroam are available in the OIT Knowledge Base.

 

If you have any questions about this change or would like assistance connecting to eduroam, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Software Update: SigmaPlot by Systat Software, Inc.

What is it? SigmaPlot is a scientific graphing and visualization software package with advanced curve fitting, a vector-based programming language and macro capability. The software is controlled through the graphical user interface that is modeled after the Microsoft Office style ribbon system. SigmaPlot contains over 100 graph types and the user interface allows detailed manipulation of every graph object. SigmaPlot also includes access to 50 statistical tests which can be used for basic data analysis.

 

Where can I run it? SigmaPlot is available on OIT’s Apps@UT server and on the computers in the OIT public computer labs, where six people can use it at once.

 

How can I learn it? To get started with SigmaPlot you can watch the tutorials on the SigmaPlot introductory movies web page.

 

Where can I get support? OIT offers Minimal Support for SigmaPlot. However, the company offers assistance through their product support page.

 

Workshops for August 1-5, 2016

Instructor-Focused:

·   Open Consultations for Transition to Canvas, Aug. 2, 9:00am - 11:00am

·   OneShot Video for Instruction, Aug. 3, 10:00am - 12:00pm

·   Open Consultations for Transition to Canvas, Aug. 4, 9:00am - 11:00am

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Risk

Information security is about addressing or reducing RISK. It's easy to overlook this when all you hear is talk about passwords, firewalls, encryption, policies or two-factor authentication. These are tools we use to reduce the risk that our information (i.e. university data, personal data) is disclosed to an unauthorized person or persons.

 

If this is too abstract, here's another example - we have locks on our doors and locks on our cars. Why? Because there's a "risk" that someone will decide they need our personal belongings more than we do. There's a threat - the thief; there's a vulnerability - an unlocked door or car. The level of risk we're willing to accept depends on what we're protecting, the existence of a threat, and the extent that we're vulnerable.

 

The same holds true for protecting our information. We take great care to protect sensitive information (credit cards, SSN's). There's a threat - the hacker; there's a vulnerability - an unlocked workstation. If you have access to sensitive information because of your job or if you have personal documents that you store on your devices, then the level of risk that you’re willing to accept should be lower.

 

We are working and living in a time when information means money. Just like your personal possessions at home, information should be protected because there's a constant effort by folks to take it from us. We become easy targets when we increase our vulnerability by not locking our workstations or by sending or storing sensitive information in our email. That means we are accepting a higher level of risk. Are you in a position to accept risk on-behalf of the university? Most of us are not so we must be good stewards of the university's information and information resources and protect it as if it was our own.

 

Information security best practices are in place to help the university community reduce risk and protect the confidentiality, integrity, and availability of its information resources. Start by doing the basics: lock your workstation when you're away from your desk; don't click on links in un-solicited emails; don't share your NetID password with anyone; keep your software updated and patched; protect the data.

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 22
[ITWEEKLY] IT Weekly, July 22, 2016

 

July 15, 2016

New Self-Classification initiative kicked off on July 18th

Beginning on July 18, 2016, faculty and staff who register UT-owned devices for use on UT’s network will be required to classify the system according to the type of information they store, view, or process on the device.  During the first phase of this initiative, we are focusing on newly registered devices.  The primary user of the computer will receive daily email reminders for up to 30 days with instructions on how to accomplish this task.  Subsequent phases of this project will begin in 2017 which will require all UT owned devices be classified.  Additional information will be provided at that time.

 

Faculty, staff, and students may notice that the network registration interface has been changed to collect additional information regarding the device that is registered.

 

If you have any questions related to this project, please contact the OIT HelpDesk.

 

Reminder: Changes to UTK Wireless coming on July 25

This summer, OIT will be reducing the number of UTK wireless networks from four to two in order to increase the throughput of the wireless network. On July 25th, the broadcasted networks for connecting to wireless will be ut-open and eduroam.

1.    UT-open: The unsecured network available to faculty, staff, students, and visitors. A new portal will be put in place to manage network registration and visitor access.

2.   Eduroam: The secure network available to faculty, staff, and students. Eduroam will replace the ut-wpa2 network and offers all of the existing functionality. In addition to wireless access at UT, faculty, staff, and students will be able to obtain Internet connectivity when visiting other participating eduroam institutions. More information about eduroam, including a list of participation institutions, is available at the eduroam website.

 

What do you need to do now?

·      If you are connected to ut-open, you will not need to take any action.

·      If you are connected to ut-wpa2, we recommend that you connect to eduroam.

The eduroam network is already available and allows secure access to services like T-Storage and the Microsoft Licensing Server. Instructions for getting connected with eduroam are available in the OIT Knowledge Base.

 

If you have any questions about this change or would like assistance connecting to eduroam, please contact the OIT HelpDesk online or call (865) 974-9900.

 

Introduction to Canvas

As you know, UTK is transitioning from the Blackboard Learn LMS to Canvas over the course of the  next year. Blackboard and Canvas will run in parallel through May 31, 2017, when Blackboard will be retired. Canvas will be available to faculty for the Fall 2016 Semester. We are working hard to stand up the production environment, plan migration of courses, and a myriad of other tasks. 

 

If you are interested in using Canvas for Fall 2016 classes, please complete a HelpDesk Support Ticket as soon as possible. Additionally, you may wish to attend an Introduction to Canvas Workshop or drop in for an open consultation. We are also happy to schedule special group workshops by request. Keep an eye to your email and the online.utk.edu website for updates and online training opportunities.

 

You may register for any of the following opportunities at our Training/Workshop Registration page:

 

Getting to Know Canvas Workshops:

9:00am – 11:00am, Greve 520: 25, 27, 29

1:00pm – 3:00pm, Greve 520: August 8, 12

 

Open Consultations for Transition to Canvas:

9:00am – 11:00am, Greve 520: August 2, 4

 

Software Update: SAS by SAS Institute

What is it? SAS is a software suite for statistical analysis, data management and graphics. There are three major products available: the SAS System, which is the primary tool for writing SAS programs and contains the data processing and analytics engine that is at the core of most SAS products; SAS Enterprise Guide, which provides a graphics user interface to much of the power of SAS; SAS Enterprise Miner, which is used for data mining or investigating patterns in large amounts of data to create descriptive or predictive models.

 

Where can I run it? SAS is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows and Linux PCs. The download and installation instructions are on OIT's software download page. It is also available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and on the computers in the OIT public computer labs. There is no simultaneous user limit for SAS.

 

How can I learn it? OIT offers workshops each semester. You can schedule a one-on-one tutorial any time by calling the OIT HelpDesk at 974-9900. The SAS Institute support web site offers free video tutorials.

 

Where can I get support? OIT offers Full Support for SAS. You can request assistance by calling the OIT HelpDesk at 974-9900. The SAS Institute support web site also offers “support communities” where you can ask questions and it provides a comprehensive set of online manuals.

 

Workshops for July 25-29, 2016

Instructor-Focused:

·   Getting to Know Canvas, July 25, 9:00am - 11:00am

·   Adobe Captivate Interactive Practice and Assessment Templates, July 25, 1:00pm - 3:00pm

·   Getting to Know Canvas, July 27, 9:00am - 11:00am

·   Cloud Storage Options at UTK (Faculty / Staff Focused), July 28, 9:00am - 11:00am

·   iPad 3 (Make It & Take It), July 28, 10:00am - 12:00pm

·   Getting to Know Canvas, July 29, 9:00am - 11:00am

 

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Five Security Tips

This week's security awareness tip courtesy of the SANS Institute. www.sans.org:

 

1.       If you don't understand the warning message, say NO and consult the OIT HelpDesk at (865) 974-9900. It's easier to go back and say yes if you need to than be sorry and have to rebuild your machine.

2.      Certificates: If you don't understand a website certificate message, say NO and consult the HelpDesk at (865) 974-9900. It is easier to go back and say yes if you need to than be sorry and have to rebuild your credit.

3.      Antivirus: Running antivirus does not slow your computer down nearly as much as a virus does.

4.      Back-up: Backing up your data may seem like a waste of time — until you spill coffee all over your laptop.

5.      Passwords: Writing down your password around your desk is about as secure as leaving a $20 bill lying on the dashboard of your car. How well do you trust anyone these days?

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 15
[ITWEEKLY] IT Weekly, July 15, 2016

 

July 15, 2016

Adobe Products are Available

In May 2016, UT signed a new contract with Adobe for Creative Cloud, Captivate, and Presenter. The new contract licensing for Creative Cloud is based on specific, named users, and requires UT to assign licenses to a specific employee for all products.

 

Benefits of the named license for Creative Cloud include the ability for the employee to use the software on 2 different computers, one of which may be a home computer. This benefit is not available for Captivate or Presenter. Departments may also purchase licenses for use by their student employees engaged in departmental (non-academic) work.

 

Departments who support a student computer lab or a staff training lab may get a packaged version of Creative Cloud for the cost of one license per machine. Note that dual boot machines will require a license for both operating systems.

 

UT Knoxville departments may purchase licenses for Creative Cloud, Captivate, and Presenter through VolTech. If you purchased Adobe Acrobat DC, Creative Cloud DC, Captivate, or Presenter under the former contract and still have need of this software, please contact VolTech to purchase a new license. Installations made under the former contract need to be removed from all university computers.

 

Additional information, including pricing and download/installation instructions, is available at oit.utk.edu/adobe. If you are with another campus or unit, such as UT System Administration, Institute of Agriculture, Institute for Public Service, Health Science Center, Chattanooga, or Martin, please check with your respective Chief Information Officer for additional information regarding the distribution of Adobe products

 

If you have any questions, please contact the OIT HelpDesk at (865) 974-9900 or help.utk.edu.

 

Clicker Swap

Turning Technologies, UTK’s vendor for personal response systems (clickers), is upgrading for Fall 2016. All ResponseCard XR or ResponseCard NXT devices can be exchanged for a QT or QT2 clicker. Students will also receive a $10 voucher towards the purchase of a 1 or 4-year bundle at the UTK Volshop store. The bundle includes a New QT2 device, ResponseWare license, and $20.99 mail-in rebate.

 

The Clicker Swap will be held weekdays from Tuesday, Aug. 16 - Wednesday, Aug. 24, 2016, from 8:30 AM – 4: 30 PM at the Student Union, G3, near VolBooks.

 

If students have a QT device, and need to purchase a bundle or Turning Account, they are also eligible for the mail-in rebate. All faculty and students using clickers need to create a Turning Account. For more information, visit OIT’s website or contact the OIT HelpDesk.

 

Software Update: R by the R Core Team (open source)

What is it? R is a free, open source software environment for statistical computing, data management and graphics. While all of its features can be controlled by its programming language, several user interfaces exist that make it easy for non-programmers to use. It is very extensible and supports a wide range of methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.

 

Where can I run it? Being free, you can install R on any Linux, Mac or Windows computer. R is available on OIT’s Apps@UT, OIT’s Newton Linux Cluster and on the computers in the OIT public labs. There is no simultaneous user limit for R.

 

How can I learn it? OIT offers workshops each semester and there are a set of two-minute tutorials at the “twotorials” web site. The main R web site lists addresses for support “mailing lists” and manuals.

 

Where can I get support? OIT offers Full Support for R. The best web site to ask questions or look up answers regarding R programming is Stack Overflow. The best place to ask questions or look up answers regarding statistical analysis in R is Cross Validated. You can request assistance by calling the OIT HelpDesk at 974-9900. 

 

Workshops for July 18-22, 2016

Instructor-Focused:

·   Creating Accessible Word, PPT, and PDF Files Using Office 2013, July 22, 9:00am - 11:00am

Researcher-Focused:

·   Introduction to SQLite Database, July 18, 12:00pm - 1:30pm

 

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Mobile Apps

The good thing about mobile applications is that they’re easy to obtain and easy to install. The bad thing about mobile applications is that they’re easy to obtain and easy to install. With this convenience comes great responsibility. Users should be aware that these applications may be giving up more of their personal information than they would like.

 

For example, take the recent “Pokémon Go” craze that hit the American market in the past few weeks. There have been so many downloads of this application that it has boosted Nintendo’s market value by $9 billion (and counting)! As millions of users wander the country collecting Pikachus and Jigglypuffs, the company that developed the application, Niantic, Inc. was collecting information about the collectors.

 

Like most apps that work with the GPS in your smartphone, Pokémon Go can tell a lot of things about you based on your movement as you play: where you go, when you went there, how you got there, how long you stayed, and who else was there. And, like many developers who build those apps, Niantic keeps that information. According to the Pokémon Go privacy policy, Niantic may collect — among other things — your email address, IP address, the web page you were using before logging into Pokémon Go, your username, and your location. And if you use your Google account for sign-in and use an iOS device, unless you specifically revoke it, Niantic has access to your entire Google account. That means Niantic could have read and write access to your email, Google Drive docs, and more. (It also means that if the Niantic servers are hacked, whoever hacked the servers would potentially have access to your entire Google account. This is especially worrisome if you have used your UTK Google Account credentials!

 

Take a breath. There’s some good news in all this. Once the complaints started rolling in that the Pokémon GO account creation process on iOS erroneously requested full access permission for the user’s Google account, Niantic started working on a fix for the problem. Google verified that, to-date, no other account information has been accessed or collected. Additionally, Google will soon reduce the game’s permissions to only the basic profile that it needs. You don’t have to do anything.

 

The lesson here is that you need to become aware of what information is being collected by the applications you install on your mobile devices. They have become so powerful and so ubiquitous, that it’s easy to forget that you also “do work” and store personal information on these devices. You could be giving that information away inadvertently. The best way to find out what information is being collected and how your information is being used is to read the privacy statement on the developer’s website. Another location would be in the End User License Agreement. Remember? It’s that EULA that most folks don’t read, hurriedly clicking on, “I accept” just to get to the game. As painful as reading those documents can be, it is the best way to understand the scope of data that is being collected and in some cases, shared with other third-party applications.

 

Happy hunting.

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 08
[ITWEEKLY] IT Weekly, July 8, 2016

 

 

July 8, 2016

NEW: Secure Online Testing and Virtual Proctoring

Want a quick and effective way to secure your online exams, increase student accountability, and reduce potential cheating? Need a way to monitor your students test taking activity in online courses? Respondus LockDown Browser (LDB) and Respondus Monitor are now available to faculty and students at no additional cost based our recently purchased site license. Respondus LockDown Browser is a tool in Blackboard and Canvas that locks down the testing environment to prevent students from browsing to other sites during an exam. In addition, when students use the LDB they are unable to print, copy, go to another URL, or access any other applications on their personal computer. For more information related to the Respondus LDB, please review this web page

 

Respondus Monitor is a tool that will allow for proctored, or supervised, online exams. Monitor can help ensure exam integrity for student taking test online outside of a testing center. Monitor is an option that can be used in conjunction with Respondus LDB. Take a quick look at the capabilities of Respondus Monitor by watching this short video. For more information related to Respondus Monitor, please review this web page.

 

As always, if you need additional assistance, consultation, or training with either Respondus product, contact the OIT HelpDesk online or call (865) 974-9900.

 

Reminder: Changes to UTK Wireless

This summer, OIT will be reducing the number of UTK wireless networks from four to two in order to increase the throughput of the wireless network. On July 25th, the broadcasted networks for connecting to wireless will be ut-open and eduroam.

 

1.       UT-open: The unsecured network available to faculty, staff, students, and visitors. A new portal will be put in place to manage network registration and visitor access.

2.      Eduroam: The secure network available to faculty, staff, and students. Eduroam will replace the ut-wpa2 network and offers all of the existing functionality. In addition to wireless access at UT, faculty, staff, and students will be able to obtain Internet connectivity when visiting other participating eduroam institutions. More information about eduroam, including a list of participation institutions, is available at the eduroam website.

 

Coming Soon: Upgrades to Building Access

One of the many improvements occurring across the UTK campus includes the implementation of a new building access management system called Gallagher. This system will replace an aging access and alarm system with a more robust and comprehensive solution.

 

Over the next several months, Facilities Services, the UT Police Department, Volcard, and the Office of Information Technology will be working together to complete the transition to the Gallagher system. This transition includes replacing current card readers within each building with new, card readers, replacing individual’s access cards, and reviewing the list of individuals who have access to each building to ensure only the appropriate people have access to controlled areas.

 

The project team will work with the appropriate building owner to prepare for each building’s transition.

 

If you have any questions about this upgrade, please contact the OIT HelpDesk at (865) 974-9900 or online at help.utk.edu.

 

Help Us Improve OIT’s Websites!

Which OIT sites are most important to you? Why do you visit, and which tasks do you think should be easier? Take our 5-10 minute survey to let us know.

 

The survey will be open through Friday, July 15. Please email Susannah Finley (sfinley@utk.edu) with any questions. We appreciate your feedback!

 

Software Update: Qualtrics Research Suite

What is it? Qualtrics Research Suite, a powerful online survey research tool, is available to all faculty, staff and students at UTC, UTK and UTM. Once you create your Qualtrics account, you will be able to design simple to complex surveys in a web browser, distribute the survey, run frequencies as it continues to collect data and then download your data. For in depth analysis, you can export your data to an SPSS, CSV, TXT or Excel file. A basic account is available to all faculty, staff and students for university related work such as academic research projects (instructional or academic) and administrative purposes.

 

Where can I run it? Qualtrics is a cloud based service. To create a new account or login to an existing account, use our web surveys page.

 

How can I learn it? For UTK, OIT offers workshops on Qualtrics each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 974-9900. Qualtrics also provides a variety of training materials on their support page.

 

Where can I get support? OIT offers Full Support for Qualtrics. For assistance, contact the OIT HelpDesk at 974-9900.

 

Workshops for July 11-15, 2016

Instructor-Focused:

·   Getting to Know Canvas, July 11, 1:00pm - 3:00pm

·   Getting to Know Canvas, July 13, 1:00pm - 3:00pm

·   Prezi for Faculty 1 (Basics), July 14, 3:00pm - 4:30pm

·   Open Consultations for Transition to Canvas, July 15, 1:00pm - 3:00pm

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: Peopleware

A landmark study was released in 2007 that helped confirm conventional wisdom about the large number of re-used passwords and the poor quality of user passwords. The study looked at the password usage habits of over 500,000 users. What the study found is that the average user used an average of 7 passwords/week. The study showed that those passwords were shared with an average of 25 sites! If a user is using the same password on Facebook as they use for the NETID login, which is the same for their Gmail AND their banking passwords, it is immediately evident that there’s a perfect storm coming. The study also contains information on successful phishing attempts. The data indicates that something on the order of .4% of the population falls victim to a phishing attack each year. Remember that this study was performed in 2007. Social networking has grown; mobile devices have multiplied like rabbits, and every site wants a login and a password and the phishermen are out in force.

 

The news is full of stories of high-profile individuals whose accounts are compromised. Their phones are erased; their email accounts are emptied; their photos are GONE. The vulnerabilities aren’t technical – they’re human. Whether it’s a phishing attempt that lands the user or a “guessed”-password that unlocks multiple accounts, the technology is working as it should. We can add more layers of technology such as multi-factor authentication (bio-metrics, tokens, voice recognition) but in the end, it’s the “peopleware” that we have to keep patched.

 

Peopleware is the term used to describe the interaction a person has with technology, and it’s time to update your peopleware! The latest version doesn’t allow clicks on embedded links in unsolicited emails. However, there are still bugs that haven’t been addressed. Be diligent in your password creation and its reuse.

 

If you’re one of those .4% of the population that clicked on a link that “looked okay” and you suspect your UT credentials have been compromised, please notify the OIT HelpDesk immediately at 865-974-9900.

Title: Dividing line graphic 

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

July 01
[ITWEEKLY] IT Weekly, July 1, 2016

 

July 1, 2016

Security Awareness Training!

On July 5, 2016, the UTK Information Security Office (ISO) will be enabling the campus information security awareness training program called “Securing the Human.” Securing the Human is an online computer-based program that provides faculty and staff with information they need to engage in effective information security behavior.

 

The Office of Information Technology, by way of SANS, will be sending an email to all UTK faculty and staff containing the link to the UTK security training web page – security.utk.edu/awareness. The email will come from noreply@securingthehuman.org. If you have Clutter enabled on your Office365 Email account, there’s a chance that the email will end up in the Clutter Folder. All participates must complete the information security awareness training, as awareness is an integral part of protecting the University’s resources.

 

The Security Awareness program consists of a number of videos that cover specific security topics. The videos range anywhere from 1 to 5 minutes in length and are intended to influence user behavior that will reduce security risks. Users are allowed to complete the training at their own pace, monitor their progress, and revisit completed training. Upon completion, the user will receive a security awareness training certificate. For more information about this program, visit the Securing the Human website (http://www.securingthehuman.org).

 

If you do not receive a training email, check your Clutter, Junk or Spam folders in your email client. For questions regarding your personalized security awareness training, please contact the OIT HelpDesk at (865) 974-9900.

 

Coming Soon: Changes to Network Registration

As previously announced in IT Weekly, OIT will be modifying the network registration process to comply with UT Policy IT0115, which requires all UT owned devices be classified according to the type of data they store or process. During the first phase of this initiative, we will focus on the newly registered devices. The primary user of the computer will receive daily email reminders for up to 30 days with instructions on how to accomplish this task. Subsequent phases of this project will begin in 2017 which will require all UT owned devices be classified. Additional information will be provided at that time.

 

Faculty, staff, and students may notice that the network registration interface has been changed to collect additional information.

 

If you have any questions, please contact the OIT HelpDesk at (865) 974-9900.

 

Help Us Improve OIT’s Websites!

Which OIT sites are most important to you? Why do you visit, and which tasks do you think should be easier? Take our 5-10 minute survey to let us know.

 

The survey will be open through Friday, July 15. Please email Susannah Finley (sfinley@utk.edu) with any questions. We appreciate your feedback!

 

Software Update: QDA Miner by Provalis Research, Inc.

What is it? QDA Miner is a software package that aids in the qualitative analysis of text or images. In addition to purely qualitative functions like creating and applying coding structures, QDA Miner also provides more numerical functions such as analysis of coding co-occurrences and analyzing coding by other variables such as age or gender.

 

Where can I run it? QDA Miner is available at no additional charge to faculty, staff and students at all UT campuses for installation on university-owned and personally-owned Windows PCs. The download and installation instructions are at OIT's software download page. For UTK, QDA Miner is also available on OIT’s Apps@UT server and on the computers in the OIT public computer labs. There is no simultaneous user limit for QDA Miner.

 

How can I learn it? For UTK, OIT offers workshops on QDA Miner each semester, and you can schedule a one-on-one tutorial by calling the OIT HelpDesk at 974-9900. Tutorials are also available on QDA Miner's tutorial website.

 

Where can I get support? OIT offers Full Support for this software. For assistance, contact the OIT HelpDesk at 974-9900.

 

Anything else I need to know? A trial version of QDA Miner is available for download here. A license file can be downloaded from the OIT's software download page, which turns the evaluation software into a fully licensed copy.

 

Workshops for July 5-8, 2016

Instructor-Focused:

·   Getting to Know Canvas, July 5, 9:00am - 11:00am

·   Captivate 1 (Hands-On With Adobe Captivate), July 6, 9:00am - 11:00am

·   Getting to Know Canvas, July 7, 9:00am - 11:00am

 

Check out our online training offerings (including Lynda.com).

 

All workshops meet on the Knoxville campus. Registration is required for all workshops. If you have questions or need help with registration for any of the workshops listed above, contact the OIT HelpDesk online or call (865) 974-9900.

 

Computer Security: A Clean Desk

Clearing your desk before you leave or before you’re away from the office for a few days can greatly protect paper documents that contain sensitive information related to our work. So what does this have to do with security? Besides just looking tidy, clearing your desk reduces the threat of a security incident, as confidential information will be locked away when unattended. Sensitive documents left in the open can be stolen by a malicious entity.

 

At the end of the working day, put away all office papers. At a very minimum, place sensitive documents in a drawer, away from prying eyes. If you are unsure of whether a duplicate piece of sensitive documentation should be kept - it will probably be better to shred it or place it in the shred bin designated for sensitive information. Some scan documents and store them in protected or encrypted areas on T-Storage.

 

Lock away portable computing devices such as laptops or PDA devices. Treat mass storage devices such as CDROM, DVD or USB drives as sensitive and secure them in a locked drawer.

 

We’re always so conscious about cyber-security that we forget “physical” security. All of the technical safeguards in the world won’t protect a spreadsheet of sensitive data, printed out for review and left lying on the desk for weeks on end. If possible, locking your desk or filing cabinets go a long way in protecting the university’s information. This seems like a simple thing but physical security is so often neglected.

 

The idea extends to home as well. If you’re finished with sensitive personal documents (checkbooks?), place them in a secure place or out of eyesight when you’re done with them or until you need them. Consider purchasing a small lock-box to store those documents until you can get them to the safety deposit box. Scanners are affordable. Scanning old bills or correspondence with sensitive information and disposing of the original (shredders are cheap too!) is good practice.

 

Title: Dividing line graphic

To Join/Leave the IT Weekly (http://listserv.utk.edu/archives/itweekly.html)

and click on “Join or leave the list (or change settings)”

 

Archive now available (https://utworks.tennessee.edu/oit/itweekly/default.aspx)

 

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.

 

1 - 10Next