The Higher Ed blogosphere is a fantastic resource for discovering the most important trends and pressing topics for Higher Ed professionals. Here you can find a collection of non-tech Higher Ed blog articles from around the web. We are constantly updating this list from some of our favorite sources.
As a follow-up to my Automobile University page. 100 of the Best Quotes About Reading I will defend the importance of bedtime stories to my last gasp. —JK Rowling You may have tangible wealth untold; caskets of jewels and coffers of gold. Richer than I you can never be. I had a mother who... The post 100 of the Best Quotes About Reading appeared first on Kevin Corbett -
By Susan Rambo. Computer science researchers from the University of California, Santa Barbara, are using the internet of things to prove that smart farming can be a farm implement as basic as the tractor and plough. The husband and wife team of Chandra Krintz and Rich Wolski, both UCSB computer science professors, think data analytics can help tackle some of the tough challenges of modern agriculture. They want to apply the predictive mathematical
By Tom Andriola. The results are in – this year’s UC Computing Services Conference (UCCSC) was a big success. I use the word “big” intentionally. With 636 attendees, this was the largest in the 36 year history of the event. Big and successful, with 95% of attendees rating it excellent or very good. (The remaining 4% rated it good.) As far as session quality, 38% rated it excellent, 45% very
By Shannon Prior. On December 12, hundreds of innovators and change champions will converge at the University of California, San Diego, for the second annual Process Palooza conference. Launched in 2017, the event is a chance to compete, learn, and initiate a practice of change. This year the movement extends an open invitation to all University of California campuses. Logistics Co-hosted by UCSD IT Services and Extension, this year’s conference
By Yvonne Tevis. It was a stormy night on the Dark Web. But on a sunny UC campus one morning, Jack Tern was plowing through email. The ‘replies-to-all’ were driving him batty. So much work piling up, meetings to arrange, invoices to pay… Then he saw the urgent email from his supervisor, Athletics Director Kat Black. She was out of state recruiting. “Jack,” she wrote, “sorry for the rush, but
By Timo Papandreopoulos and Julie Goldstein. Passwords are the keys to most devices and almost everything you do online. Unfortunately, even the best passwords can get hacked, stolen, or unintentionally shared. Fortunately, there is an easy way to add another layer of protection to make your login more secure, in addition to your username and password. This is called multi-factor authentication (MFA). What is MFA? Sometimes referred to as two-factor
By Julia Chen. Despite their growing numbers, women in technology still face significant barriers in the workplace. According to a 2016 report performed by the National Center for Women in Information Technology (NCWIT), only 25% of the computing workforce was made up of women. Even fewer were women of color, and barely any held leadership positions. At this year’s UC Computing Services Conference (UCCSC) at UC Davis, over 100 UC
By Michelle Phung, Isabelle Nguyen and Julie Goldstein. Passwords are the key to almost everything you do online, and you probably have multiple passwords that you use throughout the day. Choosing hard-to-hack passwords and managing them securely can sometimes seem inconvenient. Fortunately, there are simple ways to make your passwords as secure as possible. Doing so can keep hackers from taking over your accounts, and prevent theft of your information
Halloween is right around the corner, and this year it falls on Wednesday – which means we’ll be seeing some fantastic costumes throughout the work day! If you’ve got some great costumes and parties in your department, we want to see them! Send your pictures to Jeané Blunt so we can post them to the UC IT Instagram, Slack and Twitter accounts (or post them yourself, using the hashtag #UCITHalloween)!
How do I connect securely when I’m on campus? If you have the option, connect to a wired port on campus. If you have to use wireless, make sure you are connected to your campus’ encrypted wireless network or to eduroam, which is also secure and encrypted. Contact your IT department if you’re not sure of the exact name of the encrypted wireless network you should use on