
Issue 20, August 3, 2021This communication was generated by UTHSC Information Technology Services to educate
and inform our campus community about available technology tools, training opportunities,
news, and events that will help you and the university achieve excellence in patient
care, education, research, and community service.
|
|
UTHSC TechConnect is Here! We have been talking about UTHSC TechConnect for months and it is finally here! UTHSC
TechConnect is helping ITS move towards digital transformation to make it easier for
faculty, staff, and students to find services and articles about the technology we
offer to the campus. How Do I Use It? Visit the UTHSC TechConnect main page (also referred to as the client portal) and take a few minutes (literally!)
to watch our Veronica video. She will familiarize you with the different sections
of UTHSC TechConnect. Take a look around, click on things, and just explore the site.
I Don't Want to Watch a Video! We hear you! Videos aren't for everyone and that's why we created a knowledge base article on how to use the system.
I Still Can't Find What I Need! No problem! Just take a look at the Searching UTHSC TechConnect article right after this one.
Still can't find what you need? Contact the Service Desk at 901.448.2222.
|
|
Searching UTHSC TechConnect With change comes benefits, but also challenges. You may have been used to just emailing
the Helpdesk or using our website to find what you needed and now things are different.
But the search option makes finding exactly what you need in UTHSC TechConnect so
easy!
Just like with any other webpage, UTHSC TechConnect has a search bar. Just type your
keyword(s) in the "Search the client portal" field, press Enter or Return, and in
one fell swoop, see all the services and knowledge base articles related to your search
topic.

But wait, there's more!
Look next to the search field and you will see a globe icon and a down arrow. Click
the down arrow to choose Service Catalog or Knowledge Base then enter your search
criteria and click the magnifying glass icon to refine your search.

|
|
|
New to Campus? Whether you are a new faculty or staff member or a new student, resident, fellow,
or postdoc, you need to know what technology resources ITS offers you!
Check out our New to Campus? section in our UTHSC TechConnect knowledge base.
If you are still unsure what you need or how to get it, enter a service request, call the Service Desk at 901.448.2222 or stop by to see us on the 6th floor of the
Lamar Alexander Building (877 Madison).
|
|
|
SharePoint, OneDrive, Teams, OnBase - Which Should I Use? Sometimes it is confusing to know when to use SharePoint, OneDrive, Teams, or OnBase.
The awesome part of this is you can store and share documents with colleagues from
any of these platforms.
The hardest part is understanding what each of these does and which you should use.
Check out our Understanding the Difference between OneDrive, SharePoint, Teams, and OnBase knowledge base article. If you need more info, look under attachments for the document-management-overview-long.pdf
file for more details about each storage option (don't worry, it's not that long).
Still now sure which is right for you? Send a storage service request through UTHSC TechConnect and we will be glad to help find the perfect storage solution
for you!
|
|
|
Amos for Windows by SPSS, an IBM Company Amos (Analysis of Moment Structures) analyzes Structural Equation Models (SEM) by
either drawing a path diagram or programming a command language. These models are
also known as LISREL models, confirmatory factor analysis, analysis of covariance
structures, path analysis, or causal modeling. Learn more about Amos on OIT's Research Software website. Learn when to use it, where to run it, how to learn, and where to get help.
|
|
Microsoft has some excellent training courses we recommend:
|
|
All About Microsoft Word
Want to learn more about Word, but don't have time for formal, in-person training?
This video series from Microsoft walks you through how to create and save a document, make design and editing changes,
collaborate with others, and set up Office 365 mobile apps.

|
|
Email Changing the Font Size of the Outlook Message List It's possible to make your Outlook Message List larger or smaller with these steps:
Windows Users
- Look under the View menu and choose the View Settings icon.
- Click Other Settings.
- Change the Column Font or Row Font setting font size to make the font larger or smaller.
Mac Users
- Look under the Outlook menu and choose Preferences.
- Choose Fonts.
- Change the text display size to larger or smaller.
Lean 6 Sigma Using the Parking Lot in MeetingsHave you ever led a meeting where things just completely went off the rails? You scheduled
an hour to knock out three or four things, and someone went on a tangent, usually
because they genuinely wanted their voice to be heard.
The problem is, if you don’t recognize their idea, many people will keep bringing
the conversation back to it. So now you have lost complete control, and the meeting
is unproductive.
Enter Lean’s beloved Parking Lot. A parking lot helps you recognize everyone’s ideas
by placing them in an area (usually on a whiteboard or in meeting notes), so you can
discuss these ideas in a future meeting. Sure, it is a bit of a meeting deflection
tactic, but it helps keep the discussion focused on completing your scheduled tasks.
And many ideas that come to people in meetings ARE relevant and helpful, so you want
to record them. A parking lot helps you keep control of your meeting while also recognizing
ideas to be addressed later.
Learn more about the parking lot and how to use it to your advantage in meetings by
reading Quick and Dirty Tips’ How to Use the ‘Idea Parking Lot’ in 4 Simple Steps article.
|
|
The Importance of Data Encryption Encryption is a process that scrambles data into cyphertext, so anyone trying to read
the data finds nothing more than gibberish. When talking about encryption, it is
significant to be aware of the distinction that all modern encryption technology is
derived from cryptography. Cryptography is the act of creating and (attempting to)
deciphering a code. While electronic encryption is relatively new in the grander scheme
of things, cryptography existed as far back as ancient Greece. Spartan generals sending and receiving sensitive messages would wrap a piece of parchment
around an instrument used as a tool to create encrypted messages as a means of keeping
information secret. When someone removed the paper from the cylinder, the writing
appeared to be a jumble of nonsense. The other general receiving the message could
wrap a parchment of similar size around it, and easily read the intended message. We have entered a time when the conveniences of widespread connectivity can provide
everyone the flexibility of carrying a networked device on his or her person. A study
conducted by the Ponemon Institute indicated, “two out of three lost smartphones contained
sensitive or confidential business information”, which makes mobile device encryption
especially important. The incredible growth of connectivity has excited businesses
and consumers alike with its promise of changing the way we live and work. It has
also put us at more risk than ever of being hacked. Data security is a major concern, especially when you are sending sensitive information.
Encryption is a great way to keep valuable data safe, making it completely unreadable
to anyone but you or its intended recipient. Whether you are transmitting it over
the Internet, or just carrying it through airport security on your laptop. Encryption
makes the ability to securely store or send personal and private information possible
while protecting individual privacy and business information from exploitation.
|
|
Chris Madeksho
In each issue, we feature one of our amazing ITS team members. We learn more about
Chris Madeksho with our Cybersecurity team in this segment.
What is your role and how long have you been in ITS at UTHSC? I have been with UTHSC for almost five years now, all in the Office of Cybersecurity.
My current role on the governance side of cybersecurity has me in charge of our outreach
initiative SPAR (Security Preparedness and Response) as well as coordinating annual
training. I am also in charge of policy management as well as helping with risk management.
What is a day in the life of Chris like? Hopefully, I am organized enough at the start of the day to accomplish set tasks,
which could be anything from updating web pages, writing articles on security-related
topics such as phishing, revising a standard or practice, or working on an IT Risk
Management tool we are excited about.
What is your favorite thing about working at UTHSC? I like to work/life balance that UTHSC allows for me. Benefits are wonderful also.
We’ve saved quite a bit on tuition! And lastly, the people that make it all possible.
A wonderful bunch to work with to get things accomplished.
What’s something most people don’t know about you? I am a breast cancer survivor. December will mark my five-year anniversary of being
cancer-free, a real reason to celebrate!
|
|
|
|
|