Category: Allied Health

Best Practices for Panopto

Best Practices when Recording with Panopto

Follow these tips to ensure you always sound your best when recording with Panopto.

  • Minimize Environmental Distractions
  • If you are recording from your home or office, it is easy to forget about small distractions that can turn out to be huge distractions on screen. To minimize these distractions:
  • Close your windows and door (consider putting a “recording in progress” note on your door)
  • Silence your cell phone and avoid sitting next to an office phone that might ring (or take it off the hook)
  • Project your voice. Speak as if you want to be heard by someone on the opposite end of the room.
  • Use the lapel mic whenever possible
  • Repeat student questions when giving an answer
  • Use mute or turn off the microphone when having private conversations
  • Turn off/mute any sound coming from your music device, TV, radio, etc.
  • Wear solid colors if recording with video. Patterns can be distracting and can show up as moving when recorded, such as Houndstooth or Herringbone patterns.
  • Make sure there is nothing distracting behind you that could disrupt your video

Minimize Technological Distractions

  • Eliminate desktop distractions (email pop-ups, Twitter feeds, etc.)
  • Close all other applications on your computer, except what you are using, and try not to use more than one application at a time. Too much load on the computer can distort audio and video quality.

Who doesn’t like the word FREE or NEW?

ECU’s Software Download Center has a new, updated look!

Bold icons for quick, easy access to the software you need

ECU offers licensed software packages to the university community or to specific groups like faculty, staff, or students at no cost or for a reduced price. Log into download.ecu.edu to download available software.

Available Software (partial listing)

Adobe Creative Cloud ─ Subscription access to popular design, web, video, and audio applications like Photoshop, Illustrator, InDesign, Acrobat Pro, and many other desktop and mobile applications.

Adobe student request I Adobe faculty/staff request

AutoCAD ─ Draft, annotate, and design 2D geometry and 3D models with solids, surfaces, and mesh objects.

Mathematica ─ Computational software package developed by Wolfram Research that covers the breadth and depth of technical computing.

MatLab ─ Core mathematics and advanced graphical tools for data analysis, visualization, and algorithm and application development in an easy-to-use environment.

Microsoft ─ Windows Operating System / Microsoft Office / Microsoft 365 ─ All currently-enrolled students are eligible for a FREE Windows 10 operating system download. This full license is yours to keep, even after you graduate.

Windows OS upgrade for students

ECU’s Microsoft 365 subscription for enrolled students includes FIVE FREE downloads of the latest version of MS Office with automatic upgrades.

NVivo ─ Qualitative and mixed methods data analysis tool.

SAS (Education Analytical Suite) ─ Tools for data analysis, report generation, and enterprise-wide information delivery.

SPSS ─ Provides data analysis for descriptive statistics, numeral outcome predictions, and identifying groups.

In case you missed the Technology Newsletter…

New ‘Safety Tips’ Enabled for ECU Inboxes

FILED UNDER:

New ‘Safety Tips’ enabled for ECU inboxes to help users recognize email phishing and sender impersonation

Considering current unfortunate geopolitical events, ECU is implementing additional safeguards for the campus community. While safety measures can be enhanced by ITCS behind-the-scenes, please keep in mind that ‘Safe computing is everyone’s responsibility.

The following Outlook safety features are being enabled to better protect faculty, students, and staff.

First Contact Safety Tip

You may see this safety tip the first time you get a message from a sender and if you don’t often get messages from the sender.

Examples:

User Impersonation Safety Tip

You may see this safety tip in messages where the sender’s email address is included in user impersonation protection.

Tip text: “This sender appears similar to someone who previously sent you email, but may not be that person.”

Example:

They say “one bad Apple can spoil the whole”…..

In case you missed this notice ITCS has been alerted that multiple vulnerabilities have been discovered in Apple products.  Per ITCS, depending on the security settings associated with the application that was exploited, an attacker could install programs, or view, change, or delete data.

We recommend the following actions be taken:

  • Apply appropriate patches provided by Apple.
  • Run all software as a nonprivileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Do not download, accept, or execute files from untrusted and unknown sources.
  • Do not visit untrusted websites or follow links provided by untrusted or unknown sources.

Systems Affected:

  • iOS and iPadOS prior to 15.1
  • iOS and iPadOS prior to 14.8.1
  • macOS Monterey prior to 12.0.1
  • macOS Big Sur prior to 11.6.1
  • macOS Catalina prior to security update 2021-007
  • watchOS prior to 8.1
  • tvOS prior to 15.1

To view more click HERE.

Ready, Set, Go…. Panopto

Panopto is well on its way and the CAHS couldn’t be more excited.  As we are preparing for the implementation.  There are few updates that you need to make a note of.

  • According to ITCS our ability to record in Mediasite will end April 27, 2022.
  • Spring Early Adopter Group – Hopefully you had to opportunity to register for this opportunity.
  • Campus-wide training will begin in February.

If you would like to learn more about Panopto please visit the following links below.

https://itcs.ecu.edu/teaching-learning/november-2021/

https://howtovideos.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=f2d74e7b-4c52-444a-82f1-a993016bf2b7

https://howtovideos.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=7dec6358-93fc-4db0-966a-a9ee014b1251

Wait… no don’t leave

WHAT IS CYBERSECURITY?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.  Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information or interrupting normal business processes.

Examples:

  • Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources.  The aim is to steal sensitive data like credit card numbers and login information.  This is the most common type of cyber attack.
  • Ransomware is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
  • Intellectual property violations involve robbing people or companies of their ideas, inventions, and creative expressions—known as “intellectual property”. There are four types of intellectual property (IP) rights: patents, trademarks, copyrights, and trade secrets.
  • Social engineering attacks target people with legitimate-looking emails and social media messages that trick users into providing confidential data, such as credit card number, social security number, account number, or password.
  • Harmful web robots (or ‘bots’ for short) are automated programs that are placed across the internet to do various tasks.

For more in depth information on cybersecurity, check out the links below.

https://reciprocity.com/resources/cybersecurity-challenges-facing-higher-education/

https://itcs.ecu.edu/security-compliance/csam-thats-a-wrap/

Should you download this? Monterey?

Apple recently released its next client operating system, macOS 12 Monterey. Please continue to use the current university-supported macOS, 10.15 (Catalina) and 11.x (Big Sur), until ITCS is able to complete a full assessment of macOS 12 Monterey.

In the upcoming months, ITCS will ensure that macOS 12 Monterey meets university standards for security and application capability, and make certain this new operating system does not present challenges to ITCS’s ability to support your device.

An announcement will be made to campus when we are ready to launch macOS 12 Monterey for ECU.

If you have any questions, please don’t hesitate to reach out to me or post a comment.

Goodbye Windows 10… Hello Windows 11

Say Goodbye to Windows 10 - YouTube

Microsoft recently launched its next client operating system, Windows 11. Please continue to use the current university-supported operating system, Windows 10, until ITCS is able to complete a full assessment of Windows 11.

In the coming months, ITCS will ensure that Windows 11 meets university standards for security and application capability, and make certain this new operating system does not present challenges in ITCS’s ability to support your device.

An announcement will be made to campus when we are ready to launch Windows 11 for ECU. If you use Windows 10, we believe Windows 11 will be a natural transition and update to what you know and are familiar with as it is built on the same foundation as Windows 10.

To learn more about some of the new features check out this ARTICLE.

Every year we FALL for…..

(ECU Photo by Rhett Butler)

Okay, wow are we already almost halfway through Fall semester? What is going on?! Where is the time going? Fall break is approaching October 9th – 12th, Saturday – Tuesday with classes resuming on Wednesday, October 13th.  

During the quiet days of Fall break, if anyone is in need of any technical assistance, or simply needed answers to questions that you may have had to put on hold due to a very busy start of Fall semester please feel free to stop by my office 3360 or schedule some time with me and I will gladly assist.

In the meantime, stay up late and sleep in, travel, work if you want too, pursue a hobby, and most of all RELAX.

Autumn Emoticon | Symbols & Emoticons