Network Technician/Support Specialist I – Open until filled
Enterprise Database Specialist (DBA) – Open until filled
Enterprise System Programmer – Open until filled
April 4, 2014 is the deadline for early bird registration for the 10th Annual University of Texas System Innovations in Online Learning (IOL) Conference.
The conference will be held May 21-23 at the Hyatt Regency Hotel on the Riverwalk in San Antonio.
The IOL conference will address the unique challenges and opportunities with the delivery, support, evalution and management of online teaching and learning. Educators and leaders in higher education will explore innovative ways to transform the field through online learning.
The conference will include informative sessions about best practices, innovative research and future trends in technology.
For questions about "Sparking Innovation for Education," please email IOL@utsa.edu or visit www.iolconference.org.
Options that Affect Finder Search Results
One of the most common ways to find items on your Mac is to search by name. It’s easy to find many similar files on your Mac using the search field normally available in Finder windows by entering part of a filename which many items have in common, such as the name extension. For example, if you open a Finder window and type “`.app” into the search field, you might see results that include many of your Mac’s application packages. When you begin typing into the search field, a menu of search choices appears. Choosing Kind: Application would get results, but because we’re talking about options that affect searching, select the Name matches filter instead. By default, search results are displayed in a list window. If you aren’t viewing search results in a list window like the one show below, select as List ⌘2 from the View menu.
What? You don’t see any applications when you try entering “.app” into a Finder window’s search field?
Several settings have to be considered for getting the search results you want. We already mentioned one of those settings - the menu that appears when you start typing into the search field. By default on the newest Macs, the view for new windows is set for All My Files, a new default search filter that excludes much of your Mac’s file system from the search. For our Name matches: .app search to return any application packages not in the current home folder, the scope will have to be changed from All My Files to This Mac in the search token bar above the search results.
You still don’t see any applications in the search results? Actually, you may have noticed app names appear in the results area of the search window (a Finder window becomes a search window you begin typing into its search field) if This Mac was selected in the search token bar before you designated the Name matches: .app filter. Anyway, to see the apps, click the reverse contrast all upper case appearance of NAME in the search field and select Everything.
Choosing Everything removes the constraint of searching by Filename only. These results appear to indicate that name extensions aren’t included when searching by Filename only, although they will be matched if a Filename only search isn’t specified.
Why perform a search for apps when you can already view most of your applications by clicking Applications in any Finder window’s sidebar? For one thing, our search includes names of apps in the Utilities folder which is a subfolder of the Applications folder, the Applications folder window won’t show those by default, and can’t be modified to show them interspersed among the others in alphabetical order. Because we specified This Mac, apps existing anywhere appear, including those of the Utilities folder. Note: Some locations are excluded from the Mac’s Spotlight search system by convention, and some are excluded by permissions of the user performing the search.
In a future Mac Minute we’ll talk about saving search windows as Smart Folders. Smart Folders are simply saved searches. We’ll also explore using Finder information such as size and version to limit search results in search windows and Smart Folders. It’s perfectly fine to go ahead and explore on your own. Try clicking the Save button on the right side of the window, or looking for Find Anything on your Mac in Help Center (Help menu in Finder).
Ken Pierce, UTSA’s Chief Information Officer, will participate in a panel discussion on “Technologies to Improve College Completion,” on Wednesday, March 5 at the South by Southwest Education (SXSWedu) conference in Austin. The HigherEdNext Series is hosted by the Bill and Melinda Gates Foundation.
In 2013, the Gates Foundation requested proposals to boost innovation and strengthen partnerships between institutions of higher education and vendors of Integrated Planning and Advisory Services (IPAS) technologies.
Pierce, Vice Provost for Information Technology and CIO, will join other educators in discussing the implementation of these technologies.
Other panelists whose institutions are also actively engaged in rollout: Jeff Snell, Senior Director at Alvarez & Marsal of San Antonio; Mark Amos, Associate Vice Provost at Southern Illinois University and Melissa Biegert, Director, IPAS/ECHS Projects at Austin Community College.
Direct link to SXSW event:
Direct link to Ken Pierce's SXSW Bio page:
What UTSA’s Office of Information Technology is doing to become a top-ranked university was the topic of Ken Pierce’s presentation Friday, Feb. 21 before the Texas Association of State Systems for Computing and Communications (TASSCC) Advisory Board in Austin.
TASSCC’s mission is to advance education and networking among professionals supporting Information Technology in the state’s public sector.
Pierce, Vice Provost for Information Technology and UTSA’s Chief Information Officer, gave a comprehensive rundown of his department’s technology and initiatives in support of UTSA’s drive to become a Tier One campus.
“There are some measurement matrices that define Tier One institutions ($100 million in grants, for example); but none defining a Tier One department within an institution,” Pierce told the group. “It comes down to what ‘we’ believe to be Tier One.”
“When your peers recognize you as a Tier One organization (as one of the best) and strives to copy or ‘be just like you,’’ that is when you can declare you have reached such a goal,” he said.
His department’s scope is broad, he explained, and serves many functions at three locations:
· Data centers
· Server management
· Support services(OIT Connect)
· Computer labs
· Classroom and event support
· Video/web conferencing
· Telephone services
· Application development and support
· Software licensing
· Information security
· Video production
· Online learning/academic technology
He described several initiatives in which operations have been or are being moved off campus, or “in the cloud.” These include Microsoft Office 365, which offers up-to-date and accessible cloud-powered applications; Lync, a unified communications platform; SharePoint 2013, a web applications platform; and Unified Messaging, an integrated voicemail system. In addition, for storage, OIT is migrating to Box.com, an online file sharing and cloud content management service.
He summarized the major tools and technologies used by OIT, such as Banner, a student information system; Blackboard, a learning management system and CrashPlan Pro, for desktop backup. Oracle’s UTShare/PeopleSoft, to be implemented May 1, addresses the university’s most complex business requirements, to include human resources and financial management.
Pierce touched on the department’s strategic initiatives and its plan to “run, grow and transform” as it helps UTSA reach its goal of becoming a top-level economic and research powerhouse. Many of these initiatives deal with improving the university’s graduation rate, he explained, including a global advising system, degree planning and degree auditing.
One system the university is adopting toward this end is Degree Works, a comprehensive, easy-to-use web-based academic advising and degree audit tool that helps students and their advisors successfully navigate curriculum requirements.
The University of Texas at San Antonio is considered by security practitioners as the best in the country for cybersecurity courses and degree programs, according to Computerworld.com.
UTSA’s 14 undergraduate and graduate programs in areas such as digital forensics, secure design and intrusion detection and response, were ranked first for academic excellence and practical relevance in a survey sponsored by Hewlett-Packard of about 2,000 certified IT security professionals.
The experience and expertise of program faculty and the school’s professional reputation within the security community were also factors that contributed to the school’s top ranking, according to IT News.
Other top schools included Norwich University, a private military college in Northfield, Vt.; Mississippi State; Syracuse; Carnegie Mellon; Purdue; USC; the University of Pittsburg; George Mason; West Chester University in West Chester, Pa.; the U.S. Military Academy at West Point and the University of Washington in Seattle.
The schools that cracked the top-10 list, including UTSA, are NSA and Department of Homeland Security-certified centers of academic excellence. Their curriculums address both technical and theoretical issues in cybersecurity, undergraduate and graduate level programs and hands-on learning opportunities. Typically, schools in the top 10 list such as UTSA have faculty members who are leading practitioners or researchers in the field of cybersecurity.
“I have taken the course named Secure Systems and Software as a graduate student,” said Abhishek Gwal, student worker at The Office of Information Technology. “It’s a good course because we learn all the latest information relating to security as well as the techniques to implement and create new security products.”
Network Technician/Support Specialist I - Open until filled
Enterprise Database Specialist (DBA) - Open until filled
Enterprise System Programmer - Open until filled
Team Librielah, at the 2014 Knowledge Bowl.
The student team,“Librielah,” was named reigning champion of UTSA’s recent Black History Knowledge Bowl. The annual event, held Feb. 18 at University Center as part of Black History Month celebration, was co-sponsored by The Office of Information Technology and others. In second place was “No Name Necessary,” and in third place, “Anzaldua’s Apostles.”
OIT student worker Jared Gonzales participated in the six-team double elimination style tournament as a member of the team, “Voices.”
“It was a fantastic event that featured African-American trivia for the entire student body to learn from,” said Tony Daniels, president of UTSA’s Black Faculty and Staff Association, who served as official photographer for the 2014 Knowledge Bowl.
The three-member “Librielah” team comprised of Lillian-Ann Bonaparte, Hannah Beck and Gabriel Diamant captured the title by knowing the most about the musical, political, social, linguistic and innovative contributions of American-Americans since the 1800’s.
The purpose of the event, Daniels explained, is to educate students on Black History knowledge. “What really brings significance to this event is that the Black Faculty and Staff Association takes the lead in bringing the event to life,” he said. Most such events are sponsored off-campus or by outside groups.
UTSA student teams at 2014 Knowledge Bowl
Participants were able to view historic footage of the accomplishments of earlier generations such as gospel singer Mahalia Jackson and baseball great Jackie Robinson.
“This is the first year that technology allowed us to show historic clips from the early 1900’s so that the visual supported the verbal questions,” Daniels said. “It’s one thing to memorize an answer, but to actually see what happened, that’s rich.”
Students competed for $1,000 in first place prize money by testing their knowledge in such areas as:
Q. Name the first African-American female astronaut; she went into space in 1992 on the Endeavor. (A: Dr. Mae Jemison)
Q. In the year 2001, who became the first African-American U.S. Secretary of State? (A: Colin L. Powell, who was also the first black chairman of the Joint Chiefs of Staff)
Q. What state was involved in the Loving case? (A: Loving vs. Virginia, a landmark civil rights case which invalidated laws prohibiting interracial marriage)
Q. What was Brown vs. The Board of Education? (A: A case that ended legal segregation in public schools)
Last year, as Daniels took photos of the event, he noticed the audience was not as engaged in the questions as they might have been. “By fusing technology with the quiz, everyone in the ballroom became engaged in active learning,” said Daniels. He is Associate Director, Campus Recreation, and was just named at-large director for the National Intramural Recreational Sports Association’s (NIRSA) national board.
OIT’s Gonzales, 23, a math major in the College of Science, serves as fundraising coordinator for Voices, which stands for “Volunteer Organization Involving Community Education and Service.” The on-campus group helps with such groups as the San Antonio Food Bank, Haven for Hope, Girls’ and Boys’ Clubs and SAMM Ministries. “We thought it would be fun to put together a team,” explained Gonzales, who works for the OITConnect call center. “It was a good competition. I thought it was great even though we were eliminated.”
It was clear, he said, that the sponsors “really wanted participants to have a good time.”
“It was really relaxed and really fun, in the spirit of Black History Month,” he said. “It was definitely a great experience, with a real element of competition. I hope that my organization is able to participate again in the future.”
Event chair this year was Mallory Banks, Student Development Specialist I in the Department of Bicultural-Bilingual Studies in the College of Education and Human Development at UTSA. She also serves as the Black Faculty and Staff Association secretary.
At the Knowledge Bowl: Douglas Washington, Academic Advisor; Dr. Vanessa Kenon, Assistant Vice Provost, Information Technology and Larry Williams, Vice Provost and Dean.
Besides The Office of Information Technology, other sponsors this year included:
· Sonja Lanehart, professor and Brackenridge Endowed Chair of Literature and the Humanities, African American Studies;
· John Frederick, Provost and Vice President for Academic Affairs;
· Office of the President;
· Student Center for Community Engagement and Inclusion;
· African America Literature and Cultures Institute;
· Department of English;
· College of Architecture;
· Honors College;
· College of Sciences;
· College of Liberal and Fine Arts;
· College of Engineering;
· College of Business; and
· College of Public Policy.
To view photos of the event, please click here.
As the university migrates to UTShare/PeopleSoft, all employees including full-time and part-time staff (non-students, students and work studies included) will be required to submit their time and absences on a weekly basis.
Training classes for time keeping for exempt employees in The Office of Information Technology are available as follows: 9 - 11:30 a.m., March 3; 1 - 3:30 p.m., March 5 and 9 - 11:30 a.m., March 6. Training for non-exempt employees including all hourly (student and non-student) will be held from 9 - 11:30 a.m., March 4.
UTShare is an enterprise system software that is also known as PeopleSoft. It’s a collaborative effort between UTSA and six other UT campuses that provides common institutional reporting and replaces a number of current systems including DEFINE, HRMS and UTDirect. It’s important to note that UTShare/PeopleSoft will not replace Banner.
UTSA’s Chip Meadows, a self-described “IT Security evangelist, lover of technology and hacker at heart,” is being honored for his contributions to cybersecurity at a reception today in San Francisco. Unfortunately, he is not able to attend the RSA Conference 2014 at the Moscone Center.
Meadows has been named a Distinguished Fellow by the Information Systems Security Association (ISSA), the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
Twice a year an exemplary group of long-term ISSA members are recognized in two categories: Fellows and Distinguished Fellows. These individuals have distinguished themselves in advancing the professionalism, stature and influence of information security professionals. They achieved this goal through serving as leaders of ISSA and significantly contributing to the cybersecurity community as well as chapter leadership and the national or international security posture. Honorees are selected by the Fellow Selection Committee and voted on by the ISSA International Board of Directors.
“The Fellow Program attracts a highly competitive pool of candidates and I am pleased to announce that seven Distinguished Fellows and 13 Fellows have been recognized by their peers,” said Ira Winkler, President. “We congratulate Chip Meadows and greatly appreciate his contributions to this association and the international cybersecurity industry.”
Meadows, CISSP, CISA, GWAPT, has been a Senior Information Security Analyst at UTSA since May 2012. He currently leads a team that secures the perimeter of UTSA networks, external facing systems, networks and infrastructure. He has more than 25 combined years in IT Security, Audit and Compliance, and Information Technology while having served in the financial services, academic, military, medical and retail industries. He is a sought-after speaker and has presented at numerous local, national and international conferences as well as various certification preparatory workshops.
He formerly served as president of both the Alamo ISSA Chapter and the San Antonio Chapter of Information Systems Audit and Control Association (ISACA) and is currently involved with other organizations such as InfraGard, a partnership between the FBI and the private sector.
“As Fellows and Distinguished Fellows, these individuals participate in an elite group of learned professionals who work together as peers in the pursuit of service, knowledge and excellence for the benefit of the information security field. They are an inspiration to us all,” Winkler added.
ISSA members and award winners include many of the industry’s notable luminaries and represent a broad range of industries, from communications, education, health care, manufacturing, financial and consulting to IT. Also represented are federal, state and local government departments and agencies.
Through regional chapter meetings, conferences, networking events and content, members tap into a wealth of shared knowledge and expertise.
Visit ISSA on the web at www.issa.org and follow them on Twitter at @ISSAINTL.
Note: @ISSAINTL to honor 5 Distinguished Fellows and 8 Fellows for #cybersecurity service at Member Reception #RSAConf http://bit.ly/11Ly0E7