
Issue 48, September 6, 2022
UTHSC Information Technology Services generates this communication to educate and
inform our campus community about available technology tools, training opportunities,
news, and events to help you and the university achieve excellence in patient care,
education, research, and community service.
|
|
Help Us Celebrate the TechConnect Birthday Bash! TechConnect is turning one, so help us celebrate on September 14 from 11:00 a.m. until
1:00 p.m. in the Madison Plaza Lobby.
Free TechConnect swag, raffles every 30 minutes for cool prizes, and demos where you
can learn more about how TechConnect makes your technology life easier!
Watch the Daily Digests for more information!
|
|
|
Save the Date: -omics Symposium on September 16, 2022 Mark your calendar to attend the second annual -omics Symposium on Friday, September 16, 2022. Building on the community discussions from last year, this year’s symposium goal
is to once again bring together and engage the University of Tennessee research community
of any discipline that uses high-throughput computing, high-performance computing,
and/or data science for research in genomics, proteomics, metabolomics, transcriptomics, informatics, bioinformatics,
biocomputing, and other related fields.
Visit the -omics Symposium website to view the agenda, sessions* (some session information and planning are still underway)
and Zoom information. *Please note that all sessions will be presented at Eastern
Time.
Registration is not required; however, you must sign in to Zoom to attend. Each Zoom
session will be limited to the first 300 people (if we get that many, this will be
a real success!) |
|
|
Services from A to Z! We aren't exactly Amazon, but we have an A-to-Z listing of all our services in TechConnect.
Do you need:
Need a service you don't see listed? Contact the Service Desk at 901.448.2222 or submit
our generic service request form. |
|
Understanding Campus File Storage Options We offer several storage solutions, but which is the right one for your needs? Instead
of using paper copies, your hard drive, MyDrive, VolShare, USB, external hard drive,
departmental folders, Dropbox, Google Docs, consider one of these no-cost, secure
options:
OneDrive |
SharePoint |
Teams |
OnBase |
For YOU to:
- Store work and personal documents
- Share with others
|
For YOU and the TEAM to:
- Store and share documents
- Share with each other and external users
|
For YOU and the TEAM to:
- Collaborate
- Chat
- Store and share documents
|
For YOU and the TEAM to:
- Share electronic document storage
- Search documents
|
Need to know more before you decide? Check out our Understanding the Difference between OneDrive, SharePoint, Teams, and OnBase article, which includes an attachment with a more detailed comparison. |
|
|
Getting into a Zoom Meeting Do you find yourself experiencing problems getting into Zoom? There are usually two
main reasons you cannot get into a Zoom meeting. You’re the Meeting HostYou may want to uncheck the authentication if you are hosting a meeting with non-UT guests or infrequent Zoom users. This option is checked by default for additional HIPAA security features and requires
the participants to log in using the “Sign in with SSO” option. If you are hosting
a meeting with non-UT guests, you may want to uncheck the authentication by selecting
Schedule Meeting on your Zoom home page and turning on Waiting Rooms to still have security for your meeting.
Also, be sure to remind your UTHSC attendees they must log in using the SSO option. You’re a UTHSC AttendeeMake sure you sign in using the SSO option, not with an email or password. Learn more
in our Zoom Not Working? Check These Things First article.
Also, check out the I Was in Two Other Zoom Meetings Today, but I Cannot Join This One! TechConnect knowledge base article. |
|
Free Online Qualtrics Training Webinar – September 14, 2022 It’s summer, when things at work may begin to slow down a bit. Now might be a great
time to learn Qualtrics so you can send surveys to students, faculty, and staff!
The next session (through UTK, so it’s free) is on September 14 from 1 pm until 2
pm CST.
In this introductory workshop, you will learn how to create and deploy a web-based
survey using Qualtrics. Basic question construction (single and multiple response
questions, grid/matrix tables for Likert questions, text questions) will be covered,
as well as how to add Display and Skip Logic, which allows the respondent to skip
questions that do not pertain to them, thereby shortening their response time. An
overview of the reporting tools, how to export data as an SPSS dataset, and an overview
of best practices for collecting online data will also be presented.
Visit K@TE to register for this Qualtrics training! |
|
Microsoft has some excellent FREE training courses we recommend. As UTHSC faculty
or staff, you can access all Microsoft 365 apps listed. Students may not have access
to all these apps.
Microsoft Teams Hybrid Work Solutions In this training, you will: understand what hybrid work means, learn how to stay connected
and collaborate in a hybrid work environment, manage personal well-being, simplify
and streamline work activities, and adopt the hybrid meeting experience. Register
- Sep 8 - 3:00 pm -4:00 pm
- Sep 13 - 3:00 pm -4:00 pm
Get Started with Microsoft Lists In this training, you will: understand what hybrid work means, learn how to stay connected
and collaborate in a hybrid work environment, manage personal well-being, simplify
and streamline work activities, and adopt the hybrid meeting experience. Register
- Sep 8 - 11:00 am -12:00 pm
- Sep 13 - 10:00 am -11:00 am
|
|
Apply a Theme in Microsoft Word Themes are used in Word to add a more professional, modern look to the document. You
can choose from different themes to change the color or font of a document. Learn
how with this quick 36-second video!

|
|
Interested in a Free iPhone Camera Mini Course? How many pictures do you take with your iPhone? Would you like to improve the quality
of those phone photos? Learn tips and tricks to taking better pictures with the iPhone
Camera Mini Course by iPhone Life!
All you need to do is register for the course, and each day for 15 days, you get an email with a tip on taking better photos. It’s
quick and easy, and you can opt out anytime.
|
|
Setting Different Volumes for Different Apps Did you know that you could set apps on your Android phone to have different volumes?
It's just three easy peasy steps!
- Press the Volume Up Key.
- Tap on the 3 Dots at the top.
- You can adjust the volume of your media, ringtone, notifications, and system settings.
|
|
Phishing Basics – If Nothing Else, Remember These Two Things A lot of information is given to people during Security Preparedness Training seminars,
webinars, and other discussions. Sometimes it gets overwhelming. Yes, it is in your
best interest to use strong passwords, use multi-factor authentication when available,
update software, understand what sensitive data you have and add extra protections
around it, physically lock up your assets, understand how social engineering works,
etc. Whew!
So, let’s go back to basics. In the latest Verizon’s Data Breach and Incident Response
Report (DBIR), 82% of all breaches involve the human element. Meaning we let the bad
actors in. Most often via phishing, which is the sending of a fraudulent message designed
to trick a person into revealing sensitive information to an attacker or deploying
malicious software. Remember to ask yourself these two questions for every communication
you receive. This will greatly reduce your susceptibility to falling for a phish.
- Does the message arrive unexpectedly?
- Is this the first time the sender is asking you to do something, usually outside of
normal procedures?
If you say yes to these two questions, that communication is a higher risk message
that all others. Most phishing attempts start this way.
Yes, many legitimate requests can have “yes” answers also, but the key is to recognize
that these are phishing techniques, so extra caution is needed. Train yourself to
slow down and confirm the request by an alternative method, e.g., calling the person
using a trusted phone number or using a web address, NOT from a link in the email,
but from a saved bookmark.
Security preparedness is more in-depth than just these two questions, but the basics
are always a good place to start. If you’d like a deeper discussion about any preparedness
topics for yourself, your team, or your group, contact the Office of Cybersecurity
at itsecurity@uthsc.edu.
|
|
|
|
|