Warning: unserialize(): Extra data starting at offset 1150863 of 1151896 bytes in /var/www/html/_resources/oublog/blog-functions.php on line 458
Posts - University Information Technology - The University of Utah Skip to content

Posts

Aimee Ellett receives Kevin Taylor Memorial Service Award

L-R: Chief Technology Officer Jim Livingston, Special Assistant to the CIO Aimee Ellett, and Chief Information Officer Steve Hess pose at 102 Tower with an oversized

The 2023-24 Kevin Taylor Memorial Service Award was presented to Aimee Ellett, special assistant to Chief Information Officer Steve Hess, during the UIT All-Hands Meeting held online on September 19. Ellett received a plaque and a symbolic oversized check denoting a $500 honorarium.

Share this article:

President Randall approves revised information security policy

The U's Park Building, overlaid with a duotone of yellow and orange

The changes comply with the recently updated USHE Board Policy R345: Information Technology Resource Security and strengthen the university’s information security policy to address the present and increasing risks of cybersecurity incidents.

Share this article:

PMO Corner: Major Avaya voice system upgrade nears completion

Syndi Haywood, associate director for UIT Voice Services and Business Administration

A significant system upgrade for Avaya, the U’s central telephone solution, is on track for completion in early December 2023. The upgrade from Avaya Communication Manager version 8.1 to version 10.1 will impact approximately 15,675 hard phones and softphones.

Share this article:

Artificial intelligence use guidelines from an IT leadership perspective

A magenta brain formed by a close-knit network of overlapping and intersecting lines on a black background and above a grid of magenta lines.

Artificial intelligence (AI) tools must be used with caution to avoid known pitfalls, such as bias, privacy violations, copyright infringement, and inaccuracy. These guidelines are intended to support institutional standards for privacy, safety, ethical practices, and data security.

Share this article:

ITS-UIT golf tournament decided by a tiebreaker

Scene from the 14th annual ITS-UIT golf tournament.

The winner of the 14th annual ITS-UIT golf tournament was decided by a tiebreaker. A UIT team ended up tying an ITS team but edged out the runner-up by posting the best scores on the lowest handicap holes.

Share this article:

Internal IT auditors: We're advocates, not adversaries

Hollie Andrus, chief audit executive (CAE) for the U’s Internal Audit department. Image courtesy of the University of Utah.

Chief Audit Officer Hollie Andrus’ Internal Audit team, which includes an IT audit division, is broadly responsible for independent and collaborative risk assessments and helping colleges, departments, and organizations better align with the university’s strategic goals and core values.

Share this article:

Shields up! Protect yourself online with these simple steps.

A white outline of a shield with a keyhole surrounded by circles of dotted and dashed lines on top of a purple-hued image of the Earth. The photo illustration includes ones and zeros, and technology icons to the left and right of the shield.

October, designated as Cybersecurity Awareness Month, is a good time to review the basics of cybersecurity — easy and common-sense ways to protect your data and devices from threat actors and cybercriminals.

Share this article:

Node 4

Our monthly newsletter includes news from UIT and other campus/ University of Utah Health IT organizations, features about UIT employees, IT governance news, and various announcements and updates.

Subscribe


Warning: unserialize(): Extra data starting at offset 1150863 of 1151896 bytes in /var/www/html/_resources/oublog/blog-functions.php on line 458

Categories


Warning: unserialize(): Extra data starting at offset 1150863 of 1151896 bytes in /var/www/html/_resources/oublog/blog-functions.php on line 458

Featured Posts

Last Updated: 4/11/22