Starting Thursday, July 26, students will be able to complete Get Connected from anywhere. Whether you’re new to IU or back for another year, you’ll need to run it.
Follow these tips to stay safe even if your phone winds up in the hands of a criminal.
Be sure to change your passphrase; Forgetting to log off gives “tacit authorization” for snooping; IU partnership results in faster Trinity RNA sequencing software; Science Cloud Summer School; Learn how to set your cloud storage preferences
Is your passphrase at least two years old? If so, be sure to change it as soon as possible.
New to IT@IU is your guide to learning how to download no-cost software, connect to wireless, get 24/7 tech support, change your passphrase, and more.
All IU faculty, staff, and students can get instant Internet connectivity at member institutions.
IU’s recent influx of “Wire Transfer Canceled” emails is an effective case study in recognizing spam/phishing.
Prefer to listen to your news? Come watch the Robot Grand Challenge; Thanks for taking part in the UITS Customer Satisfaction Surveys
Have knowledge and expertise you’d like to share in a breakout session (60 minutes) or a lightning talk (15-30 minutes)? The call for proposals is open until June 4.
Are you backing up your data and IT systems? Are you testing your backups to make sure you can actually use them to recover your information? Are you maintaining your backups at an off-site location? To learn why all three are crucial, read about how Pixar almost sent Woody, Buzz, Mr. Potato Head, and the entire Toy Story 2 cast to infinity and beyond
Online file sharing and storage just got easier and more secure at IU. The university is working with cloud content management service Box.com to provide students, faculty, and staff with a secure, web-based file storage and collaboration platform.
Results for the 2012 UITS User Survey for IUB and IUPUI now available; Protect IU blog highlights security breaches affecting popular programs and services; Tips and tricks to help you make the most of technology
Drawn from internal and external security experts, postings on the Protect IU blog cover topics ranging from privacy to information security and policy.