Skip to Content

IT

« Previous Page  Page 2 of 2  

If you enjoy having your email hacked, these are the best 25 passwords to use.

Several news outlets this week have reported on new information, from the password management company SplashData, on the 25 most commonly hacked passwords. When creating a password, random sets of letters, numbers, and symbols provide greater protection than sequences of digits, favorite sports, ...

Sen. Wyden puts forward a bill to ban data “backdoors”

Ars Technica reported on a bill authored by Senator Ron Wyden of Oregon that will seek to prohibit federal agencies from mandating the deployment of vulnerabilities in data security technologies. This bill follows the remarks by FBI director, James Comey expressing his concern over Apple’s and ...

Apple Seminar on Using iOS7 for Education

On February 27 from 3:30pm to 5:00pm, representatives from Apple will be hosting a seminar on using iOS 7, the operating system used in iPhones and iPads, in an educational environment. The seminar will cover iOS deployment models for educational institutions, volume purchasing, testing and managing ...

Microsoft to end support for Windows XP and Office 2003

We encourage those affected to begin thinking about a transition plan for all Windows XP and Office 2003 systems. On April 8, 2014, Microsoft ends all support for Windows XP and Office 2003. This means that XP and Office 2003 customers will no longer receive security updates, non-security hotfixes, ...

Web Hosting and Publishing Services

Looking to publish web content or host a web site? How you publish content to the Internet or host a web site will depend on your affiliation, project goals, and project requirements. This table shows different solutions and links to more information. If you work in a school, college, or department ...

Xerox scanners/photocopiers randomly alter numbers in scanned documents

In this article I present in which way scanners / copiers of the Xerox WorkCentre Line randomly alter written numbers in pages that are scanned. This is not an OCR problem (as we switched off OCR on purpose), it is a lot worse – patches of the pixel data are randomly replaced in a very subtle and ...

Some I.S. services merge with UO Libraries

As part of a set of recommendations that resulted from the external review of UO’s Information Technology (IT) organization and services recently commissioned by the Provost, Information Services’ instructional technology services will be merging with the University Libraries. These ...

Deploying OS X Mountain Lion for Fall 2012

Who Should Come: This event is open to the public. Date: Tuesday, August 14, 2012 – 9:00am – 11:00am Address: Knight Law School Building, Room 184 OS X Mountain Lion: The world’s most advanced desktop operating system gets even better. And makes the Mac, iPad, ...

A new kind of summer job: open source coding with Google Summer of Code

It’s only Spring Break for most college students, but summer vacation will be here before you know it. Instead of getting stuck babysitting your little sister or mowing your neighbor’s lawn, apply for Google Summer of Code and spend the summer of 2012 earning money writing code for ...

Ten years later: IT and life lessons from the South Tower

When the Twin Towers of the World Trade Center were attacked ten years ago, 2,753 people lost their lives, including employees of companies housed in the towers, 343 firefighters, 60 police officers, and eight private emergency medical technicians and paramedics. Another 184 people were killed in ...
« Previous Page  Page 2 of 2