The University’s contract with Malwarebytes expires this month. Effective August 17, 2022, the Office of Information Technology recommends using Microsoft Defender, the built-in antivirus and malware protection for Windows. Additionally,…
Antivirus & Malware Protection Changes
Classroom: Using Mobile Responses
“Clickers” is a generic term used to refer to a personal response system where an instructor can ask questions and students can respond, and classroom polling no longer requires students…
Zoom: Licensed (Pro) and Basic Accounts
During Covid, Zoom voluntarily relaxed the 40-minute meeting limit for Basic accounts. Recently they have removed this provision and are now back to limiting meetings to 40 minutes for Basic…
Launch of myUTIA
We are excited to announce the launch of myUTIA. This internal portal, built using faculty and staff feedback, provides a mix of new and improved features. Highlights include announcements, easier access to employee resources,…
Adobe Licensing
In June 2022, Information Technology Services (ITS) sent an email to UTIA-ALL to notify faculty and staff that there has been a change to Adobe Creative Cloud (ACC) licensing. Starting…
DocuSign
Use DocuSign for eSignatures needed on your Word and pdf forms. DocuSign will allow you to send to multiple people for signatures, even in the order you want the document…
Application Development
Consultation and development of custom data-driven, web-based solutions to meet business or program needs. Example solutions include: Extension SUPER, Online Reporting System CVM Hospital System Online Soil Testing and Reporting…
Data Integration and Database Design
Includes the creation, maintenance and support of Microsoft SQL Server databases for various applications. This includes design and implementation of complete packages of hardware, database software, database administration, and system…
IT Security Incident Response
Coordinating and supporting the response to a computer security event or incident. Examples include: Evaluation of an Event Incident Response Impact Determination based on event Visit UITA Information Security Program