Skip to content

Other ways to search: Events Calendar | UTHSC News

Issue 48


newsletter header

Issue 48, September 6, 2022

UTHSC Information Technology Services generates this communication to educate and inform our campus community about available technology tools, training opportunities, news, and events to help you and the university achieve excellence in patient care, education, research, and community service.
In this edition
  1. Help Us Celebrate the TechConnect Birthday Bash!
  2. Save the Date: -omics Symposium on September 16, 2022
  3. Services from A to Z!
  4. Understanding Campus File Storage Options
  5. Getting into a Zoom Meeting
  6. Free Online Qualtrics Training Webinar – September 14, 2022
  7. Free Online Training Sessions
  8. Apply a Theme in Microsoft Word
  9. Interested in a Free iPhone Camera Mini Course?
  10. Setting Different Volumes for Different Apps
  11. Phishing Basics – If Nothing Else, Remember These Two Things
Help Us Celebrate the TechConnect Birthday Bash!

TechConnect is turning one, so help us celebrate on September 14 from 11:00 a.m. until 1:00 p.m. in the Madison Plaza Lobby.

Free TechConnect swag, raffles every 30 minutes for cool prizes, and demos where you can learn more about how TechConnect makes your technology life easier!

Watch the Daily Digests for more information!

Save the Date: -omics Symposium on September 16, 2022

Mark your calendar to attend the second annual -omics Symposium on Friday, September 16, 2022. Building on the community discussions from last year, this year’s symposium goal is to once again bring together and engage the University of Tennessee research community of any discipline that uses high-throughput computing, high-performance computing, and/or data science for research in genomics, proteomics, metabolomics, transcriptomics, informatics, bioinformatics, biocomputing, and other related fields.

Visit the -omics Symposium website to view the agenda, sessions* (some session information and planning are still underway) and Zoom information. *Please note that all sessions will be presented at Eastern Time.

Registration is not required; however, you must sign in to Zoom to attend. Each Zoom session will be limited to the first 300 people (if we get that many, this will be a real success!)

Services from A to Z!

We aren't exactly Amazon, but we have an A-to-Z listing of all our services in TechConnect.

Do you need:

Need a service you don't see listed? Contact the Service Desk at 901.448.2222 or submit our generic service request form.

Understanding Campus File Storage Options

We offer several storage solutions, but which is the right one for your needs? Instead of using paper copies, your hard drive, MyDrive, VolShare, USB, external hard drive, departmental folders, Dropbox, Google Docs, consider one of these no-cost, secure options:

OneDrive SharePoint Teams OnBase

 For YOU to:

  • Store work and personal documents
  • Share with others

 For YOU and the TEAM to:

  • Store and share documents
  • Share with each other and external users

 For YOU and the TEAM to:

  • Collaborate
  • Chat
  • Store and share documents

  For YOU and the
   TEAM to:

  • Share electronic document storage
  • Search documents

Need to know more before you decide? Check out our Understanding the Difference between OneDrive, SharePoint, Teams, and OnBase article, which includes an attachment with a more detailed comparison.

Getting into a Zoom Meeting

Do you find yourself experiencing problems getting into Zoom? There are usually two main reasons you cannot get into a Zoom meeting.

You’re the Meeting Host

You may want to uncheck the authentication if you are hosting a meeting with non-UT guests or infrequent Zoom users.  This option is checked by default for additional HIPAA security features and requires the participants to log in using the “Sign in with SSO” option.  If you are hosting a meeting with non-UT guests, you may want to uncheck the authentication by selecting Schedule Meeting on your Zoom home page and turning on Waiting Rooms to still have security for your meeting.

Also, be sure to remind your UTHSC attendees they must log in using the SSO option.

You’re a UTHSC Attendee

Make sure you sign in using the SSO option, not with an email or password. Learn more in our Zoom Not Working? Check These Things First article.

Also, check out the I Was in Two Other Zoom Meetings Today, but I Cannot Join This One! TechConnect knowledge base article.

Free Online Qualtrics Training Webinar – September 14, 2022

It’s summer, when things at work may begin to slow down a bit. Now might be a great time to learn Qualtrics so you can send surveys to students, faculty, and staff!

The next session (through UTK, so it’s free) is on September 14 from 1 pm until 2 pm CST.

In this introductory workshop, you will learn how to create and deploy a web-based survey using Qualtrics. Basic question construction (single and multiple response questions, grid/matrix tables for Likert questions, text questions) will be covered, as well as how to add Display and Skip Logic, which allows the respondent to skip questions that do not pertain to them, thereby shortening their response time. An overview of the reporting tools, how to export data as an SPSS dataset, and an overview of best practices for collecting online data will also be presented.

Visit K@TE to register for this Qualtrics training!

Microsoft has some excellent FREE training courses we recommend. As UTHSC faculty or staff, you can access all Microsoft 365 apps listed. Students may not have access to all these apps.

Microsoft Teams Hybrid Work Solutions
In this training, you will: understand what hybrid work means, learn how to stay connected and collaborate in a hybrid work environment, manage personal well-being, simplify and streamline work activities, and adopt the hybrid meeting experience. Register

  • Sep 8 - 3:00 pm -4:00 pm
  • Sep 13 - 3:00 pm -4:00 pm

Get Started with Microsoft Lists
In this training, you will: understand what hybrid work means, learn how to stay connected and collaborate in a hybrid work environment, manage personal well-being, simplify and streamline work activities, and adopt the hybrid meeting experience. Register

  • Sep 8 - 11:00 am -12:00 pm
  • Sep 13 - 10:00 am -11:00 am
Apply a Theme in Microsoft Word

Themes are used in Word to add a more professional, modern look to the document. You can choose from different themes to change the color or font of a document. Learn how with this quick 36-second video!

Interested in a Free iPhone Camera Mini Course?

How many pictures do you take with your iPhone? Would you like to improve the quality of those phone photos? Learn tips and tricks to taking better pictures with the iPhone Camera Mini Course by iPhone Life!

All you need to do is register for the course, and each day for 15 days, you get an email with a tip on taking better photos. It’s quick and easy, and you can opt out anytime.

Setting Different Volumes for Different Apps

Did you know that you could set apps on your Android phone to have different volumes? It's just three easy peasy steps!

  1. Press the Volume Up Key.
  2. Tap on the 3 Dots at the top.
  3. You can adjust the volume of your media, ringtone, notifications, and system settings.
Phishing Basics – If Nothing Else, Remember These Two Things

A lot of information is given to people during Security Preparedness Training seminars, webinars, and other discussions. Sometimes it gets overwhelming. Yes, it is in your best interest to use strong passwords, use multi-factor authentication when available, update software, understand what sensitive data you have and add extra protections around it, physically lock up your assets, understand how social engineering works, etc. Whew!

So, let’s go back to basics. In the latest Verizon’s Data Breach and Incident Response Report (DBIR), 82% of all breaches involve the human element. Meaning we let the bad actors in. Most often via phishing, which is the sending of a fraudulent message designed to trick a person into revealing sensitive information to an attacker or deploying malicious software. Remember to ask yourself these two questions for every communication you receive. This will greatly reduce your susceptibility to falling for a phish.

  1. Does the message arrive unexpectedly?
  2. Is this the first time the sender is asking you to do something, usually outside of normal procedures?

If you say yes to these two questions, that communication is a higher risk message that all others. Most phishing attempts start this way.

Yes, many legitimate requests can have “yes” answers also, but the key is to recognize that these are phishing techniques, so extra caution is needed. Train yourself to slow down and confirm the request by an alternative method, e.g., calling the person using a trusted phone number or using a web address, NOT from a link in the email, but from a saved bookmark.

Security preparedness is more in-depth than just these two questions, but the basics are always a good place to start. If you’d like a deeper discussion about any preparedness topics for yourself, your team, or your group, contact the Office of Cybersecurity at itsecurity@uthsc.edu.

Sep 9, 2022