ISS Tech Bytes


Update the iOS on your iPad to Access the Blackboard Mobile Learn App

Volume 6, No. 11

Update the iOS on your iPad to Access the Blackboard Mobile Learn App

Blackboard’s Mobile Learn application on the iPad is a great resource to study on the go, but you’ll need to first update your iPad’s operating system to use the application.

(Click title above to read the complete article.)



Blackboard Mobile Learn App
Volume 6, No. 10

Blackboard Mobile Learn App

  • Stay actively involved in your Blackboard course while you are away from the computer.
  • Download the Blackboard Mobile Learn app and view your CLU Blackboard course on your iPad, iPhone, or Android device.
  • Easily view course documents, discussion boards (post a thread or even respond to your classmates), journals, class roster, and more!
  • Visit the link below to learn more:

If you have questions or need assistance, please call the Help Desk at (805) 493-3698 or send e-mail to helpdesk@callutheran.edu.

(Click title above to read the complete article.)


Become a Mobile Maven
Volume 6, No. 9

Ever need Cal Lutheran information (such as the online People Directory), but unable to get to your desktop computer? If so, check out the CLUMobileWeb<http://m.callutheran.edu/about/> site and investigate our mobile resources; get essential CLU information & services anytime, anywhere on your mobile device. (Click title above to read the complete article.)


Tips on Safeguarding Your Computer
Volume 6, No. 7

The Question:   Can you imagine being without your computer for a day?

The Fact:    If your computer contracts a virus, you could face days or weeks without it--and even face losing your data.

The Remedy:   Take the following three steps to help safeguard your computer against contracting a virus: (Click title above to read the complete article.)



When Mobile Devices Should Not be Mobile
Volume 6, No. 6

Mobile devices continue to have a positive effect on promoting connectivity and allowing access to data at all--or almost all--times; however, with convenience comes responsibility. This is where each one of us can help increase security and enhance loss prevention here at Cal Lutheran. Please take a few minutes to think about the computers and electronic and digital devices you use and how you can assure they are not so mobile; i.e., how to keep them secure. Consider the following tips:(Click title above to read the complete article.)


Digital Archive Houses CLU Publications
Volume 6, No. 5

The Pearson Library recently announced the launch of a new, free-to-the-public digital archive featuring back issues of The Echo (student newspaper) and Campanile and Kairos (college yearbooks).  Currently the archive includes:

  • all fifteen volumes of Campanile (1962-1976);
  • twenty-two volumes of Kairos (1977-1999); and
  • thirty-six volumes of The Echo.

Back issues of our award-winning literary magazine, Morning Glory, will also be added to the e-collection. (Click title above to read the complete article.)


Video Helps Bridge the Gap
Volume 6, No. 4

Digital media can help bridge the gap between learner and content by building new connections for delivering information. Here at Cal Lutheran a recent initiative is gaining momentum through the Computer Training department; the initiative supports faculty and staff who wish to deploy video technology to enhance content delivery. Here are some examples of how video can support the mission of the Universtiy: (Click title above to read the complete article.)


The Care and Feeding of Your PII
Volume 6, No. 3

Protecting personally identifiable information (PII) is a big challenge when that information is in digital format.  A few simple steps will take you a long way to securing PII used in your job. (Click the title above to read the complete article.)


Safeguarding Yours and Others' PII
Volume 6, No. 1

Have you given much thought to yours and others PII? If not, NOW IS THE TIME to get serious about protecting Personally Identifiable Information! That’s right--yours and others’ PII. Protecting personally identifiable information is everyones’ responsibility, and below are critical points to consider and practice. (Click the title above to read the complete article.)


Protecting Personal Identifiable Information
Volume 5, No. 20

January is Data Privacy Month, and we’re getting a jump on the topic.  On January 4 at 1:00–2:00 p.m. ET, EDUCAUSE Live! will host a webinar on data privacy with guest speakers Jolynn Dellinger (NCSA), Merri Beth Lavagnino (IU), and Nat Wood (FTC). (Click the title above to read the complete article.)


Copyright--Get It Right!
Volume 5, No. 19

Consider this:

  • A professor needs to post a series of articles on Blackboard for her students to read for an upcoming class session.   

  • A staff member needs to distribute copies of a journal article for a meeting. 

Are these people violating copyright? How would they know? (Click the title above to read the rest of the article.)


Five Steps to Secure Your Mobile Device
Volume 5, No. 18

The mission of the United States Computer Emergency Readiness Team (US_CERT) is to improve the nation's cybersecurity posture, coordinate cyber information sharing and proactively manage cyber risks to the nation while protecting the constitutional rights of Americans. Take action now and follow the five steps below for securing your mobile device. This information and more can be found at the Information Security Guide* website.  (Click the title above to read the rest of the article.)


Tips for Safe and Secure Social Networking
Volume 5, No. 17

October is Cybersecurity Awareness Month. What better time to hone your safety and security social networking skills? Here’s a few tips from the Internet2 wiki; plus, to see more  helpful information browse over to their site. Also, please take 30 seconds to view the “How to Create a Secure Password” video from the link here and noted below. (Click the title above to read the rest of the article.)


Get on Board with Qualtrics for Online Surveying
Volume 5, No. 16

Have you tried out our new online surveying Web-based application yet?

You won’t need to attend a class; complete directions are located inside the application (checkout the “Get Help” button). There are only three steps to quickly get started; follow these directions to launch your online surveying “career”: (Click the title above to read the rest of the article.)

 


Cal Lutheran's iPad Website
Volume 5, No. 15

If you don’t have one now, you may soon. Oh, forgot to let you know we are speaking of the iPad!

Don’t fret over having to learn yet another aspect of technology—just browse to the Cal Lutheran iPad Resources site, check out some of the links, and you’ll be iPad-mobile in a very short time. While there, check out the iPad and Kindle research projects being conducted on our campus. If there are links to other resources that you would like added to the iPad site, just reply to this message. (Click the title above to read the rest of the article.)


Outlook Calendaring Features Ease the Pain
Volume 5, No. 13

Are you saying, “What Pain!”? When scheduling your life, consider that Outlook calendaring features may be even better than a human personal assistant. Using the calendar features, you are up-to-date and in control.  Emancipate yourself and be the master of your destiny…at least your destiny as related to scheduled events. (Click the title above to read the rest of the article.)


Microsoft Office 2011 for Mac
Volume 5, No. 12

More Mac computers are appearing on the Cal Lutheran campus and as the Tech Byte Wizard promised in the last issue, here are a few data chunks about Microsoft Office 2011. (Click the title above to read the rest of the article.)


Microsoft Office 2010 Upgrades Coming
Volume 5, No. 11

You may just have opened your eyes this morning and thought, “Why am I still working on Office 2007 when Office 2010 for Windows is out?” (Also, Office 2011 for the Mac--more on this topic in the next issue.) Well okay, maybe you’re not thinking about computing when you wake up, but the next iteration of Office IS here and it HAS BEEN TESTED.  The application suite has been rolled out to most of the computer labs; now ISS will be starting rollouts to individual office computers. (Click the title above to read the rest of the article.)


Windows 7: New Kid on the Block
Volume 5, No. 10

Have you recently booted up a new PC and discovered the "Start Menu" looks a little different? In addition, perhaps you've noticed the "Taskbar" has changed a bit--while program icons are still recognizable, they have a different look. Well, the computer may be running the Windows 7 operating system…and this is a “good thing.” (Click the title above to read the rest of the article.)


Secure Your Mobile Device
Volume 5, No. 9

Now that you have that cool smartphone or tablet computer, it’s time to think of securing your data; knowing the importance of the data in your hands is the first step in trying to secure it. All who have mobile devices need to consider the consequences should the device be lost or otherwise become too mobile. Furthermore, extreme care needs to be taken if the device receives personal (and especially work) email; password protection can provide a healthy measure of security. (Click the title above to read the rest of the article)


Remember to Set Your Out-of-Office Greetings
Volume 5, No. 8

The end of another academic year comes preparation for vacations and those lazy days of summer. Now the time to remember to set your out-of-office phone and e-mail greetings for incoming messages. In addition, consider putting your telephone on “Do Not Disturb” (DND) so any incoming calls rollover immediately to voice mail. 


We're Callin' You Out (for CLUMobileWeb)
Volume 5, No. 7

Anyone attending Chapel service this past Wednesday heard Pastor Scott admit to what was probably the closest he ever came to being involved in a “rubble.” Yes, he was the direct object of a “callin’ out” during his college days at CLC. Well, we won’t go into the details; rather let’s just acknowledge that Pastor’s message has been leveraged as the inspiration for this Tech Byte (TB) issue’s title.  Although a “callin’ out” is not usually a positive experience, in this case it is. Today the TB Team is “callin’ YOU out.” (Click the title above to read the rest of the article)


CLU Computer Purchase Deals
Volume 5, No. 5

During the lifespan of a typical CLU computer, the appliance may reside anywhere from three to seven years in the possession of the person or department for which it was originally purchased. But this is only a portion of the computer’s life journey, and asking what happens after this initial deployment is a logical question. (Click on the title above to see the remainder of this article.)


Save Time with Email Boilerplates
Volume 5, No. 6

A boilerplate “is any text that is--or can be--reused in new contexts or applications…”
Find yourself typing the same or similar text over and over again?(Click on the title above to see the remainder of this article.)


What is 4G and Do I Need it?
Volume 5, No. 4

Have you heard all the marketing buzz from cell phone companies regarding 4G service? You might be asking yourself: What is this 4G thing, do I care about it, and do I really need it? (Click on the title above to see the remainder of this article.)


What's in a Password?
Volume 5, No. 3

According to a recent article by ZDnet, based on an analysis of 32 million breached passwords, the most popular password last year was 123456. Even though a password is most often the only barrier between your data and the world, most people don’t give serious attention to this form of security. (Click on the title above to see the remainder of this article.)


Get Your Answers Online
Volume 5, No. 2

So you need the answer right now and the Help Desk is closed? Or, you need the answer right now and the training class for this topic isn’t scheduled until next week? What’s a body to do? Easy! Just go online and get the answer. (Click on the title above to see the remainder of this article.)


Now, Where Did I Put That File?
Volume 5, No. 1

Losing track of the many Word, Excel, PowerPoint, PDF and other types of files you encounter every day can be frustrating—to say the least.  Digital files can reside in emails, in the documents folder on your local drive, or the U: and V: drives (to name a few “hiding places”). There are, of course, people who save most of their work on the computer desktop (not a good thing!). (Click on the title above to see the remainder of this article.)


Don't Forget Out-Of-Office Greeting
Volume 4, No. 25

The holiday break is coming so before leaving for those halcyon days of pleasure, please remember to your set your out-of-office phone and e-mail greetings for incoming messages. In addition, consider putting your telephone on “Do Not Disturb” (DND) so any incoming calls rollover immediately to voice mail. (Click on the title above to see the remainder of this article.)


Building Blocks Enchance Both Speed and Accuracy
Volume 4, No. 24

When word processing Word documents, do you find yourself retyping the same content over and over (e.g., a signature block)? If you have used Microsoft Word for several years, perhaps you were acquainted with “AutoText.” (Click on the title above to see the remainder of this article.)


It's Not Over Til It's Over
Volume 4, No. 23

To hitchhike on Yogi Berra’s famous quote, “It’s not over til it’s over” (or did Joe Garigiola just put those words in Yogi’s mouth?), be assured that cybersecurity safeguarding is never over. Cyber risks continue to increase and one of the best strategies any of us can adopt is to be every vigilent. (Click on the title above to see the remainder of this article.)


Beware! FERPA Ahead
Volume 4, No. 22

National Cybersecurity Awareness month celebration continues with valuable information about accessing and exposing data. Please note that the Federal Education Right to Privacy Act (FERPA) requires CLU to protect the privacy of all parts of a student’s education record; furthermore, the law applies to all information in Datatel as well as hard copy records.  Anyone accessing any education record must have a legitimate educational interest.  A legitimate educational interest means that the ability to access any particular data is necessary to accomplish your job.  Be sure to stop and think before accessing or releasing any information on a student. (Click on the title above to see the remainder of this article.)


Cell Phone Security
Volume 4, No. 21

Do you even know anyone who does not have a handheld device these days? (Click on the title above to see the remainder of this article.)


Lock It! & Stop It!
Volume 4, No. 20

Traveling the freeways of California, drivers and passengers are reminded to fasten seatbelts when they see the “Click It or Ticket It”  road sign. (Click on the title above to see the remainder of this article.)


Celebrating National CyberSecurity Month
Volume 4, No. 19

On this first day of October, 2010, ISS initiates a full-court press to help launch (pause, tah dah dah) National Cybersecurity Awareness Month. (Click on the title above to see the remainder of this article.)


Updated AICCU and AT&T Cell and Data Plan Rates
Volume 4, No. 18

This is an update to plan information from last year’s AICCU and AT&T contract announcement: (Click on the title above to see the remainder of this article.)


The "Check's" in the Mail
Volume 4, No. 17

We’ve all heard it:  “The check’s in the mail!”. As “check” relates to email, however, this phrase is not just another empty excuse. Everyone can avoid wasting valuable time and reduce email “send” errors by not merely putting the “check in the mail,” rather, utilize the “Check Names” feature to confirm accuracy of an e-address. (Click on the title above to see the remainder of this article.)


Get the Most from the New MyCLU Portal
Volume 4, No. 16

What was your first impression when logging into the new CLU portal? Were you thinking, “I’m getting a whole lot more information here than I want—or even need!”

We invite you to read on and learn how to get all that information under control and arranged in a format that is customized just for you. Click on the title above to see the remainder of this article. (Click on the title above to see the remainder of this article.)


Meanwhile, Back at "The Ranch"
Volume 4, No. 15

Seems like we just “got outa Dodge” and here it’s already time for the roundup. The trail leads back to “The Ranch,” and we’re ready for the herd (or maybe  chickens) to return.  To help all “pardners” prepare for round-up, here’s a list of technology upgrades performed over the summer; these upgrades will make the chores easier.Click on the title above to see the remainder of this article. (Click on the title above to see the remainder of this article.)


Eliminate Send Error Messages in Outlook
Volume 4, No. 14

Ever find yourself confused when an error message displays indicating the email address for an intended recipient is wrong? Build some insurance into future email transmissions by engaging the Check Names icon in the Names category on the Message tab of the Ribbon when the New Message dialogue box is open. With the Check Names function, names and addresses are easily located for accounts formatted for the Microsoft Exchange server. Click on the title above to see the remainder of this article. (Click on the title above to see the remainder of this article.)


Old is Not Necessarily Obsolete
Volume 4, No. 13

“Old” email does not necessarily qualify as messages you no longer need. The last Tech Byte addressed how to group and sort email messages to easily purge mail folders of outdated and unwanted mail. This edition describes how to archive messages for later retrieval while saving space on the server. Click on the title above to see the remainder of this article. (Click on the title above to see the remainder of this article.)


Be a Virtual Lightweight
Volume 4, No. 12

This week Charlene Ismay announced the annual clean-up program. Thanks, Facilties, we really appreciate your offer to pick up no-longer-needed office paraphernalia. Click on the title above to see the remainder of this article. (Click on the title above to see the remainder of this article.)


Go Home Early
Volume 4, No. 11

Too much to do in your eight-hour workday? Spending too much time on the job?  Incorporate shortcuts into your routines; be able to spend more time at the beach or in the mountains. Here’s a few key combinations to commit to memory when using Microsoft products: Excel and Word. Click on the title above to see the remainder of this article. (Click on the title above to see the remainder of this article.)


The Shortest Distance Between...
Volume 4, No. 10

Remember this math concept: The shortest distance between two points is a straight line. The shortest distance between your technical problem and the resolution is a call to the Help Desk. Click on the title above to see the remainder of this article. (Click on the title above to see the remainder of this article.)


Gittin' Outa Dodge
Volume 4, No. 9

Graduation excercises herald the many accomplishments of our students. In addition, the annual celebration provides an opportunty for faculty, staff and administrators to reflect on our own accomplishments of supporting students this past year. Before we “git outa Dodge” (in this instance, aka Cal Lutheran) we remind you to set out-of-office greetings. If you need a how-to refresher, gallop on over to this archived Tech Byte for a review: Don't Forget Out-of-Office Greetings. (Click on the title above to see the remainder of this article.)


Flashlight 2.0 Survey Application is "Taking Hold"
Volume 4, No. 8

Flashlight 2.0 made its debut at Cal Lutheran on April 1. Some users already are constructing and circulating surveys. This Tech Byte issue serves to remind all CLU employees and students that they can create an account and start using the application right away. (Click on the title above to see the remainder of this article.)


Going Mobile -- Everyone's Doin' It
Volume 4, No. 7

Everyone´s doin´ it or soon will be --  mobile computing, that is. Mobile devices (e.g., iPhone, Blackberry, iPod, Pre, Android) are varied in format and function; however, most use cellular networks, Wi-Fi, or both, and many have touch-screen interfaces. (Click on the title above to see the remainder of this article.)


Gone Phishin'
Volume 4, No. 6

“YOUR MAIL BOX QUOTA HAS EXCEEDED THE SET LIMIT”

Does this email subject line look familiar? On Tuesday, March 16, many CLU account holders received such an e-message. It looked official, and the message advised recipients that their mailbox had “exceeded the storage limit” and that they would “not be able to send or receive new mail until” they had validated their mailbox. The message continued by providing a link to click in order to “re-validate” their mailbox. Fortunately, most  CLUnet account holders did not fall for this phishing scam.  Doing such could have downloaded malicious software, often referred to as malware. (Click on the title above to see the remainder of this article.)


Upgrading to Flashlight 2.0 Surveying Application
Volume 4, No. 5

Breaking News! Introducing Flashlight 2.0 as the new online surveying application at Cal Lutheran! (Click on the title above to see the remainder of this article.)


Save On Monthly Cell Phone Costs
Volume 4, No. 4

Your CLU ID card can now be used for discounts at the AT&T Wireless store for personal or family plans. (Click on the title above to see the remainder of this article.)


Feedback Form