Training tips and tricks to help you get the most out of the wide array of useful technologies and services available at the University of Chicago. Check out IT Services on Twitter every Tuesday for the latest #TrainingTipTuesday.
If you’re a student studying for exams, don’t let your phone calls, texts, and other notifications distract you. Set up your devices so they won’t break your concentration.
On your iPhone, turn on the Do Not Disturb setting when you’re studying. You can also schedule Do Not Disturb for a specific time, like at night when you should be sleeping.
As an Android user, you can also use the Do Not Disturb setting on your mobile phone. Check with your device manufacturer for particular functions and instructions.
As you prepare to graduate from UChicago, it’s a good time to assess what files you have stored in your UChicago G Suite or UChicago Box accounts.
As a graduating student, you will have G Suite access for two academic quarters (approximately six months) after graduation. After this time, any files not migrated will be deleted as your account closes. To learn how to download or maintain your files, view instructions in the article UChicago G Suite Account Closure.
You will also have access to your UChicago Box Account for two academic quarters after graduation. After that time, simply reset your email address and password to continue using Box.
Learn more on the UChicago Box FAQ.
UChicago Voices provides faculty, students, and staff the ability to build websites, blogs, portfolios, and more. For instructors, Voices offers a platform to host content for your students in a user-friendly way or to assign blogging as a means for students to document and reflect on their learning experiences.
Regardless of the application, Voices allows you to choose an easy-to-use theme to personalize your site. View the Getting Started guide for step-by-step instructions on how to build a website, including details on how to select a theme.
Two-factor authentication (2FA) is an added security measure similar to how you protect your bank account with a pin number (something you know) and debit card (something you have) when you withdraw money from an ATM.
After you enroll in 2FA, when you log in to any 2FA-protected website or service, you will enter your CNetID and password (something you know) as you do today, and then use your smartphone or another device (something you have) to verify your identity.
For UChicago faculty and staff, 2FA will soon be required to access many of the University’s most frequently used online services and systems, including the Grants Management System (AURA), Workday, Canvas, the Academic Information System (AIS), and many others.
If you have not signed up already, you can enhance your security now by enrolling today.
Lynda.com is a leading online learning company that helps you advance your business, software, technology, and creative skills to achieve personal and professional goals. Lynda at UChicago is service available for the entire UChicago community at no cost.
Courses on Lynda.com offer the chance to brush up on communications and management skills; learn a new computer programming language; or improve your productivity with software and tools available at UChicago. Managers and instructors can even create a playlist of required courses for students or staff.
Log in to Lynda at UChicago with your CNetID and password, and check out the popular courses to get started.
Keyboard shortcuts can help you accomplish routine tasks more efficiently. For users with mobility or vision disabilities, keyboard shortcuts can be easier than using a touchscreen and are an essential alternative to using a mouse.
Microsoft has compiled a list of Windows keyboard shortcuts for many of the popular Office applications. For Mac users, there are also keyboard shortcuts available for Microsoft Excel, Outlook, and Word.
When sending emails, it is important to ensure the recipient views your message as safe and legitimate, so they will read the contents and take action as needed.
There are some best practices you can follow to make sure your emails don’t appear to be phishing. These include:
- The subject line should accurately and clearly describe the contents of the email. Readers should not have to guess or feel suspicious of the intent of your email after reading the subject line.
- Phishers often include attachments in their email that can harm readers in various ways. Avoid sending attachments unless your recipient is expecting them. Include a clear explanation for the email and attachments in the body of the email.
For more guidance on drafting safe emails, visit the Knowledge Base article.
Whether your computer needs a checkup, you need help installing or updating software, or you’re seeking advice on the best secure file sharing solution, IT Services is here to help with these and many more technology issues.
You can contact IT Services the following ways:
- Online – Submit a ticket, and the University’s IT Service Desk will follow up shortly.
- By phone – Call 773.702.5800 (2-5800 from a University phone) to get directly connected to the IT Service Desk.
- In person – Visit the TechBar in the Joseph Regenstein Library for convenient walk-up technology support. You can also visit the Polsky Exchange TechBar, part of the Polsky Center for Entrepreneurship and Innovation, located on 53rd Street.
This technology support is available to all UChicago faculty, students, and staff.
A phishing scam is a legitimate-looking email that appears to come from a well-known and trustworthy organization or website but is really an attempt to gather personal and financial information from a recipient.
This April Fools Day, avoid getting hooked by a phishing attempt by following a few precautions:
- Be suspicious of any email with urgent requests for personal information.
- Never share passwords, personal information, or financial information over email.
- Don’t trust offers that seem too good to be true.
- Do not click links in email messages if you suspect the message might not be authentic or if you don’t know the sender.
If you would like to report a phishing attempt or you have questions about the validity of an email you have received, please contact firstname.lastname@example.org. Be sure to include the full email header, which contains important information for IT security.
There are several pieces of information that are helpful to keep on hand if you are making changes or need assistance with your computer.
Knowing your computer’s operating system is important so you’re able to identify what software is supported, select the correct software version to install, and complete the latest security updates. Find your operating system on Windows or Mac.
To address network connectivity issues, you will often need to find your computer’s physical address or master access control (MAC) address. The MAC address is your computer’s unique hardware number in the network. Look up your MAC address.