Skip to content

Other ways to search: Events Calendar | UTHSC News

Issue 54

newsletter header

Issue 54, March 07, 2023

UTHSC Information Technology Services generates this communication to educate and inform our campus community about available technology tools, training opportunities, news, and events to help you and the university achieve excellence in patient care, education, research, and community service.
In this edition
  1. Internet Explorer To Be Removed from UTHSC Devices
  2. Getting Access to a Departmentally Shared Calendar
  3. Difference between Adobe Fill and Sign and Adobe Sign
  4. Zoom: PowerPoint Presentation Viewing Feature
  5. Microsoft OneNote Essentials
  6. Checklist to Secure Your Home Network
  7. IT in History: Microsoft Goes Public
Internet Explorer Being Removed from UTHSC Devices

In June 2022, Microsoft discontinued support for Internet Explorer, so it no longer receives security updates. Having IE, or any unsupported application or system, on a device poses a high risk of infiltration into that device and our network. Due to this, ITS has begun disabling/removing Internet Explorer from campus computers.

Edge, Microsoft’s newest browser, has since replaced IE. It contains many new security features that can help keep you safe online. If you wish to continue using a Microsoft browser and are still hanging on to Internet Explorer, upgrade to Edge as soon as possible.

If you need assistance, contact the Service Desk at 901.448.2222.

Getting Access to a Departmentally Shared Calendar

Many calendars on the UTHSC campus are departmental shared calendars. For every one of these calendars, an individual creates and owns the calendar. They are typically someone in the department. The owner is often the person who requested to create the calendar initially.

If you want to be added to a departmental calendar, you need first to determine the owner of the calendar. This can be determined by asking work colleagues or calling the Service Desk (901.448.2222), which can identify the owner in most cases. Once the owner is determined, the owner can right-click on the departmental calendar in Outlook and browse "Sharing Permissions." From this interface, they can add new people.


If the owner prefers to do this online, that can also be done. The owner would browse to and log in. Then click the Outlook icon. They'd click the circle in the upper right-hand corner and select "Open another Mailbox." They can then search and find the departmental account. After selecting the departmental account, they can go to My Calendars, then click the ... next to the calendar and go to Sharing Permissions. They can then add the individual who needs access to the calendar as a user.

All this information is in our Getting Access to a Departmentally Shared CalendarTechConnect article.

Difference between Adobe Fill and Sign and Adobe Sign

Adobe Fill and Sign is free with Adobe DC (formerly Adobe Acrobat Pro). With Adobe DC, faculty and staff can create a signature and drag and drop it onto a PDF document. There is an icon of a pen at the top of Adobe Acrobat.

When you click this, it initiates Fill and Sign and asks that you create a signature. This is suitable for most forms requiring a signature. 

However, there are certain situations where a certificate-backed signature is necessary. You may need to initiate a chain of signatures for a document, and you want to track the entire process inside Adobe Acrobat. Adobe Sign can be used for these purposes, and a request should be made here: Service - Adobe Sign: Access Request.

If you are signing documents for the Business and Finance department at UTHSC, you need to use DocuSign instead of an Adobe product. Adobe Sign should NOT be used to sign UTHSC finance documents, documents containing HIPAA-protected data, or any documents that need an official UTHSC signature. You can use DocuSign instead. To obtain DocuSign, please have your business manager send a request to Senior Vice Chancellor for Finance and Operations for approval and setup.

All this information is in our Difference between Adobe Fill and Sign and Adobe Sign TechConnect article.

Zoom: PowerPoint Presentation Viewing Feature
Submitted By: George McNeil (TLC Media Specialist). Jennifer Stewart, MPS (TLC Academic Technology Consultant), and Tonya Brown, MS (BPS Product Team Lead)

TLC Media Specialist George McNeil is excited to share a Zoom Share Screen feature that allows presenters to show presentation slides to viewers while their notes remain hidden from view. This is especially helpful when you only have one display for your computer. George said, “I believe this feature will improve Zoom meetings, and I hope it is useful for UT presenters!”

You can use these instructions to implement this viewing feature in your next Zoom meeting presentation. 

  1. Open PowerPoint presentation.
  2. Start the slideshow.
  3. Open Zoom.
  4. Click on Share Screen.
  5. Click Advanced tab at the top of the screen next to Basic.
  6. Click Portion of Screen box.
  7. Share (bottom right).
  8. Scale box view to the desired size by selecting corner and dragging with mouse.

What the presenter sees:


What the Zoom viewer sees: 


If Poll Everywhere is used in the presentation, Mac users must share the entire screen for Poll Everywhere to work with PowerPoint on Zoom. 

UTHSC offers free Zoom access to all faculty, staff, and students. Students may create a Basic account to host unlimited meetings of 40 minutes in duration with up to fifty participants. Faculty and staff can visit the Zoom: Use SSO to Get Zoom Pro Benefits article to learn how to log in. This pro account allows unlimited meetings for meetings above 40 minutes in duration and with more than fifty participants. 

For additional information about the Zoom conferencing tool, please visit our Zoom category of knowledge base (KB) articles.

Microsoft OneNote Essentials

NSmall screenshot of an eBook cover pageotetaking has changed forever with Microsoft OneNote! Download this OneNote Essentials Microsoft eBook to learn how OneNote (which is available to you through our M365 subscription) can make your notetaking life easier:

  • What is OneNote, and how does it simplify modern notetaking?
  • How to navigate the OneNote app and its notebooks
  • Best practices for creating and sharing notes
Dreaming of a Password that Never Expires? It's now possible!

Under the Non-Expiring Password Policy, change your password to a 12 or more character password, and the password will never expire!
Checklist to Secure Your Home Network

Computers, tablets, smartphones, TVs, thermostats, cameras, doorbells, and coffee pots. What do all these things have in common? They are all devices that connect to your home network and the internet. We rely on our home internet connections more than ever before, so it is critical that we keep it cybersafe.

Use this information as a checklist to improve the security of your home network and protect you and your family from potential cyber threats.

Secure Your Modem and Router

  • Use current hardware. Consider replacing modems/routers at least every five years so your devices receive the support and updates you need to keep your home network safe.
  • Enable automatic updates and install the latest firmware. Keep your modem and router up to date with the latest firmware. These updates help protect them as new vulnerabilities emerge and are patched.
  • Disable remote management. Disable remote management by default, and if you absolutely need it, be sure to enable multi-factor authentication (MFA) to use this feature.
  • Change your modem and router passwords. Changing default passwords will prevent others from getting into your network.
  • Enable the router’s firewall. The firewall helps prevent the devices on your network from accessing malicious sites as well as keeping outsiders on the outside of your network.
  • Enable website filtering. Some routers have website filtering and parental controls to prevent users from accessing malicious or inappropriate websites while on your network.
  • Reboot your modem and router once a month. Rebooting your modem and router keeps your internet connection healthy and fast.

Secure Your Wi-Fi

  • Change the Wi-Fi network name (SSID). Using the default settings allows outsiders to know the brand of your router and exploit any vulnerabilities. Change the Wi-Fi name, but don’t use personal information.
  • Enable Wi-Fi encryption. Use Wi-Fi Protected Access 3 (WPA3) if supported by your device and choose a strong passphrase to connect devices to your network.
  • Enable a Wi-Fi guest network. Keep your computers, mobile devices, printers, and other trusted devices on your primary wireless network, and have visitors and your web-enabled appliances connect to a guest network.

Monitor Your Network

According to Deloitte’s 2022 Connectivity and Mobile Trends Survey, the average U.S. household has 22 connected devices. Do you know what devices are connecting to your network? Periodically review the devices connected to your network and block the ones you don’t recognize.

Microsoft Goes Public

This month in 1986, Microsoft offered stock to the public after ten years of operation. Almost 2.5 million shares were purchased that first day at $21 a share. 

If you invested $1,000 in Microsoft shares in 1986, your investment would be worth $1.6 million today. It's estimated that Microsoft stock created four billionaires (Bill Gates, Paul Allen, Steve Ballmer, and Charles Simonyi) and 12,000 millionaires (Microsoft employees).
Mar 14, 2023