News
Joanna Young has been recommended to serve as Michigan State University’s vice president for information technology and chief information officer.
Young is currently the associate vice president for finance and budget and CIO at the University of New Hampshire.
Her appointment is subject to approval by the MSU Board of Trustees, and if approved, Young’s appointment would be effective August 26. Read Full Article →
The MSU IT Conference was held June 10, 2014, in the MSU Union with breakout sessions in the Human Ecology and Natural Science buildings.
More than 200 attended the conference open to those in the MSU community interested in information technology.
The MSU IT Conference was started in 2007 to build the IT community and encourage collaboration. Read Full Article →
The tech.msu.edu site provides a gateway to technology resources at Michigan State University, as well as technology help and support.
Follow TechAtMSU on Twitter for ongoing technology news, updates, and safe computing information.
Check out the New Students link for technology information important to those newly accepted to MSU and new to campus. Read Full Article →
The 2014 MSU IT Conference will be held on June 10 from 8:00 a.m. to 4:30 p.m.
The conference kicks off at the MSU Union and various breakout sessions will be held throughout the day in nearby buildings on campus.
The MSU IT Conference was started in 2007 to build the information technology community at MSU and encourage collaboration. Read Full Article →
Update as of May 1, 2014: Microsoft has released an emergency patch for the Internet Explorer vulnerability. Users should apply Windows Updates and then reboot their computer. Microsoft did release a version of the patch for Windows XP systems. Windows XP users should also apply these updates and reboot.
Microsoft released a security advisory (number 2963983) for Internet Explorer (IE) on Saturday, April 26, 2014. Read Full Article →
Four outstanding instructors for online and blended courses were selected as recipients of the 2014 MSU AT&T Faculty-Staff Awards in Instructional Technology.
“The AT&T Awards provide a venue for MSU to recognize outstanding faculty and staff whose innovation and creativity inspire others in new ways of using technology in instruction,” said Severin Grabski, lead judge for 2014 AT&T Awards; associate professor in the Department of Accounting & Information Systems, College of Business; and senior faculty advisor to the CIO of MSU. Read Full Article →
MSU IT Services is beginning preparations for computer lab and lecture cart software upgrades for the fall 2014 semester.
Instructors should fill out the Classroom Software Request Form if they need software or a version upgrade added to classroom or lab computers for fall 2014 or spring 2015 courses.
Software requests should be submitted by May 31. Read Full Article →
MSU IT Services is upgrading the Desire2Learn (D2L) Learning Management System to version 10.3 over the summer. In addition, to the upgrade several new integrations will be available.
This upgrade will offer many new features including:
- The ability to upload, publish and share media directly from the D2L environment using the Kaltura MediaSpace integration.
The MSU Attendance System currently available as wall-mounted card swipes in 12 lecture-style rooms will be retired on May 7 upon completion of the Spring Semester 2014.
Historical attendance data will be available on an as-needed basis for one year past the system retirement date.
IT Services consulted with the Undergraduate Assistant and Associate Deans Group, the Learning Systems Advisory Group, the University Classroom Committee, and other academic groups prior to making this decision. Read Full Article →
A major security vulnerability called the Heartbleed Bug was disclosed Monday night with serious implications for the entire web.
What is the Heartbleed Bug?A security defect was found in a component that is the foundation of security for a large percentage of Internet websites.
The security defect, in a component called OpenSSL, allows attackers to acquire random data from “secure” web servers without logging in. Read Full Article →