Dartmouth is updating the TechSmith Relay service just in time for fall term! The new web-based service includes seamless Canvas integration, viewer analytics, group tools, and quizzing features.
A redux from InstructureCon 2016
Several members of the EdTech team attended this year’s annual Canvas Users Conference, InstructureCon, in Keystone, Colorado. Pat Coogan and Adrienne Gauthier facilitated a great session on building a regional Canvas community – this topic came about since our Ed Tech team has taken on a leadership role in pulling together a Canvas users and constituency group in the Northeast, targeted at Instructional Designers and Canvas administrators (side note: it is not too late to register for the 4th annual Canvas Round Table at Dartmouth College, to be held on August 12).
This shout-out aside, here are some of the product announcements, to give you a sneak preview of Canvas’ roadmap for the next year. They can be grouped under four main themes – read on below – but if that’s tl;dr (Too Long; Didn’t Read) for you – here’s the redux in a single tweet:
— Anna Stirling (@StirlingAnna) July 21, 2016
In an earlier post we described this automated data backup and recovery service that is available for all active A&S faculty to protect their files against hardware failure or computer loss.
CrashPlan recently delivered on that promise for Marcelo Gleiser, Professor of Physics and Astronomy, Appleton Professorship of Natural Philosophy. Read his story in the Q&A below, and when you’re done, set up an appointment with your Academic Technology Consultant to have CrashPlan installed on your computer!
A couple of weeks ago, I had the chance to attend the annual POD conference in Burlingame, CA, along with my colleagues from DCAL, Lisa Baldez and Cindy Tobery. POD (The Professional and Organizational Development Network in Higher Education), in case you are wondering, is the professional organization for Teaching & Learning Centers, and attracts primarily T&L center directors, faculty developers and instructional designers. It was an amazing conference, and hands-down the most well-designed conference experience I have ever been a part of.
Many useful take-aways and action items for us here at Dartmouth – but what I wanted to tell you about is my field trip to the Virtual Human Interaction Lab at Stanford (https://vhil.stanford.edu), and some of the amazing research being conducted there. ...continue reading "A field trip learning experience: the VHI lab at Stanford"
This automated, continuous, data recovery, and backup service for desktop and laptop devices is now available for all active A&S faculty. CrashPlan works where you are. Your files are automatically saved and securely stored in the cloud, so you never have to worry about losing your work. Dartmouth Information Technology Services offers this service free of charge to all active A&S faculty as part of the “Towards a Secure Dartmouth” initiative.
“Why wouldn't you want to do this?" and "The setup is so easy!" are just two of the comments that Academic Technology Consultant Barbara Mellert has heard from faculty she has worked with to install CrashPlan. As an added benefit, Barbara notes that faculty like the email reports that have been generated to keep them on top of things.
It happens. Devices break or get lost – or stolen – or you accidentally delete a file. CrashPlan secure data backup ensures that your files are always protected against computer loss or hardware failure. It creates a strong layer of protection for your intellectual and scholarly work. Using CrashPlan is completely voluntary, but strongly recommended!
CrashPlan is secure. All of your data are encrypted. The service is approved by Dartmouth’s IT security team for the transfer and storage of all data classification levels.
Want to get CrashPlan installed on your Dartmouth-owned computer? Your Academic Technology Consultant (ATC) will install CrashPlan on up to four of your Dartmouth-owned desktop/laptop devices. Email email@example.com to request installation.
For more information:
Questions? Email firstname.lastname@example.org
By Barbara Mellert, Academic Technology Consultant
Apple released their next operating system, Mac o/s 10.11 which is called El Capitan, on Wednesday, September 30. It is available via download from the App store. New Macintosh computers sold after September 30th also have El Capitan installed.
We recommend that you wait until we have had time to test applications to be sure everything works before downloading. In the past, we've encountered issues with SPSS and also the VPN. Other applications that may be problematic include Parallels, EndNote, Matlab, some of the Adobe products, etc.
If you have questions, please contact your Academic Technology Consultant (ATC) or your division's computing support office. Contact information for your Arts & Sciences ATC can be found at: http://bit.ly/DartmouthATC
Christina Swaan, your friendly Academic Technology Consultant, shares some great ideas for keeping safe!
Why talk about risk?
We do everything online these days - from work to leisure, banking, game-playing, and communicating with friends and family. Unfortunately, this has exposed our computers and our private data to some significant risks. In this issue I’d like to explain some easy ways that you can protect your computers and web-accessible devices from some of the dangerous threats that are lurking out there online.
Internet browsing safety
Spend enough time on the Internet and you’ve probably seen some pop=up somewhere that informed you of a virus or malware on your computer. Sometimes you may even get a message saying that your computer can be cleaned up if you download and install a free update or piece of software. Chances are, these pop-ups or warnings are actually viruses or malware trying to get onto your computer by tricking you into believing that you are doing the right thing by authorizing the software to install. Some of the most common of pieces of these software go by official-sounding names such as “Clean my mac” or “Mac Keeper”.
Avoid attacks like these by following a few basic tips:
- If you didn’t specifically choose to download and install that piece of software it is likely malware. Do not try to install something without consulting a technician.
- When in doubt, quit your browser. If a window or pop-up appears with which you aren’t familiar, close out of it – do not click continue, ok, or any other suggested buttons within the window. Doing so may download and install unwanted software.
- Avoid clicking on unusual links or websites posted on social media sites and within emails. Many social media sites allow third party sites to access data/settings from your browser. When presented with an option to do so, do not allow a site that you are unfamiliar with gain access to this information.
Mobile device security
Your iPhone, Android, iPad, tablet PC, or other mobile device is probably the piece of technology that spends the most time with you, and travels with you almost everywhere you go. Because of this, unfortunately these types of devices are the most at-risk of becoming compromised. You can make your devices a little bit more secure in several ways.
- Always enable the security lock password or numeric code on your device. If you accidentally misplace your phone or leave your mobile device unattended, enabling the password lock will prevent someone from easily picking it up and accessing your private information and settings.
- If your device allows it, enable fingerprint authentication. This will lock your device down so that only you have access to it, and if you have trouble remembering passwords this is a great way to add security without having to remember yet another code.
- Avoid connecting to free open wireless networks (this also applies to computers). Free and open wifi networks are all over the place – libraries, coffee shops, airports. Unfortunately, these unsecure wireless networks are prime locations for persons trying to collect private information such as passwords, logins, and other information that may be shared over the web. Sometimes, particularly creative thieves will use a mobile hotspot to create an open wireless network that uses a name similar to that of a legitimate secure network. Secure networks will always require a login password of some kind. If the network does not have a password, you may want to think twice before connecting.
Real vs fake tech support
There is nearly an unlimited number of places where you can get information and support for technology. A simple Google search for drivers, support, or information can bring up many apparently helpful results and websites that appear to have exactly the information you need. BEWARE – things are not always as they seem! Tech support is a huge industry, and identity thieves and hackers have been quick to recognize this. Among some of the more common scams out there now are ones which feature fake tech support ads, websites, or support pages. These sites may contain a lot of helpful information, or direct you to contact a seemingly friendly tech-support agent. The reality is that these sites exist to try to get critical information from you so that they can gain access to your computer and private data. Avoiding these scams can be done if you practice just a little bit of caution. Here are a few tips how!
- Do NOT download drivers or updates from anywhere except the official manufacturer's web-site. Most devices and peripherals will have a tech-support site listed on the manual or user documentation that came with them, e.g. hp.com, dell.com. Never download a driver from a third party source.
- Do NOT reply to pop-up ads, or other web-based communications that ask you to talk to a tech support representative for services you did not specifically request to install.
- Do NOT give out your password. If you receive an email asking you to provide information such as passwords, private information, login information, or other data that is not related to something you requested it is most likely a scam. Do NOT provide your password to these types of communications.
- If a tech support representative calls you and you haven't requested support, it is a scam. If you’ve ever tried getting ahold of tech support for a major product company I’m sure you’re familiar with long wait times, and how difficult it is to reach a real person. Trust me, their tech support is NOT going to call you to let you know that there is a virus on your computer. If you didn’t ask them to call you, hang up the phone.
How can I get help?
Here at Dartmouth we offer a variety of options for students, faculty, and staff to get the assistance necessary to keep their technology operating properly, efficiently and securely. If you ever have questions about your computer, the legitimacy of an update or piece of software, or need general support with your mobile device you can reach the Dartmouth Information Technology Services department by:
Calling the helpdesk: 603-646-299
Emailing the helpdesk: email@example.com
Walk-in center: Berry Library 178J
Academic Technology Consultant Christina Hazelton explains and shares tips related to recent Mac adware and viruses outbreaks. ...continue reading "Mac Malware and How to Avoid It"
Microsoft recently added a new feature for Office 365 users. In BWA (which uses Office 365), you can now access a full listing of available Office 365 apps and pin your favorites for easy access. Here is how you can pin your apps: ...continue reading "Tech Tips: Pin Apps in Office 365"