82 items found for your search. If no results were found please broaden your search.
(11/09/05 4:32am)
Security monitors developed by IU Pervasive Technology Labs are currently being used by the Federal Department of Defense as a tool to beat terrorist hackers.\nThe mantra, "Know Your Enemy," is the drive behind the development of these security monitors by the international HoneyNet Project, a non-profit organization committed to maintaining and developing internet security and giving free access to the public.\nStarting in 1999 as a loose band of security researchers, the HoneyNet Project has now spread to a global effort for understanding and stopping potential attempts to influx computer networks funded in part by the National Intelligence Council. The IU Pervasive Labs are entering their fourth year as members of the HoneyNet team, designing key components to some of the Project's biggest developments -- many of which are being used by the federal government. \n"It is my understanding that (the government) is doing pilot studies now on some of HoneyNet's projects," said Researcher for the Advanced Network Management Lab Ed Balas. "Some of the other components have been used by the FBI in different investigations." \nAccording to project.honeynet.org, HoneyNet's primary purpose is to capture extensive information about cyber threats through a highly controlled network -- one that can control and monitor all activity that happens within it. \nA need for this information came after hackers and other network intruders started to impose threats on a personal and national level.\n"We started seeing a good number of worms and we just started to look strongly into security," Balas said. "We needed to know what should be done to keep networks running efficiently." \nOne of the components born in the IU labs is Sebek. Designed by Balas, Sebek is an operating system enhancement developed to watch intruders once they break into a system. Information such as this could allow the government to track an intruder and mislead them with false information.\nKnowledge, stresses Balas, is the biggest defense against cyber-invaders.\n"What we are doing won't stop anything from happening," Balas said. "What it does is help us understand the risks. There is a lot of doubt in the security world, but what you want to know is how to apply the knowledge that you find"
(11/08/05 4:39am)
IU and Purdue University might be opponents on the football field, but in the field of information technology, the two universities are pairing up to bring high-speed computing to public colleges across the state of Indiana.\nGov. Mitch Daniels announced that the state has awarded a multi-million dollar grant to IU and Purdue for the I-Light2 project to expand inter-collegiate network connectivity to include all state colleges and universities. The statement came last week at the Techpoint's Indiana Technology Summit in Indianapolis.\nI-Light2 is a continuation of the original I-Light project that connected IU, Purdue and IU-Purdue University Indianapolis and now opens a high-speed fiber optic computing infostructure that will make it easy for Indiana's higher education community to share research and access databases.\n"I have agreed to 'light,' or turn on the fiber connections linking colleges and universities in Indiana because I believe that creating this super high-speed network will lead to greater advancements for our institutions of higher learning," Daniels said in a statement. "I-Light2 will be preserved for the exclusive use of higher education. State government will not become a competitor to private sector companies which provide broadband Internet connections to Hoosiers."\nLeading the original project, IU and Purdue will now head the expansion project and oversee the completion of an infostructure to cover Indiana's state universities. \n"Our assignment is to continue expanding the I-Light infrastructure to all of Indiana higher education, and then also manage and operate the resulting network," said Mark Bruhn, associate vice president for IU telecommunications. "Discussions will now begin to determine who will do what, but it's likely, given our strengths, that IU will do the majority of the remaining network engineering and will probably host the network operations center for the new broader network, as we do those things now for a variety of other networks."\nThough the initial project is a large one, it makes sense for IU and Purdue to lead other institutions through the process, said Steve Tally, manager of editorial services for the vice president of information technology's office at Purdue. \n"IU and Purdue are national leaders in this -- we have worked closely together for the past couple of years," he said. "This will bring other universities into the collaboration and develop a strong bond between Indiana's higher education system." \nThe bond will increase Indiana's ability to continue educational research among its universities by permitting an easier outlet for sharing scientific information for educational purposes. \n"This super-fast network will enable IU to maintain its position as a national leader in high-speed networking and will greatly assist us in seeking additional federal grant and contract support for our research efforts," IU Vice President for Research and Information Technology Michael McRobbie said in a press release. "The issue of broadband access in Indiana more generally is on such a scale that it can only realistically be addressed by the private sector." \nAlthough an exact starting date and estimated completion time is still unknown, the effects of the I-Light2 project are already calculated in the minds of those involved. \n"This project through the collaboration of IU and Purdue will only strengthen the possibilities of what the two collaborating as one can accomplish -- it will break down boundaries," Tally said.
(10/31/05 5:44am)
University Information Technology Services concludes its National Cyber Security Month campaign warning IU Web users about the dangers of spyware and adware with an advertisement to "Beware of the Eye of the Spy." \nSpyware and adware are programs that enter computer systems (usually through downloading or advertisements) and monitor Web-browsing habits. That information will then be sold to companies who bombard the system with advertisements based on the type of sights visited.\nAlthough the threat can seem small, spyware and adware programs can hinder a computer's performance as well as alter the ability to access sites on the IU network such as Webmail, Oncourse and OneStart. \nEven though contracting spyware and adware is an easy task, identifying their programs inside a computer can be difficult. Erasing them can be an even more daunting task. \nIU recommends programs Spybot: Search and Destroy, Ad-aware and a Systematic Anti-virus for spyware and adware removal. \nAlthough programs can be removed with the help of designated programs, there are some ways to steer clear of spyware and adware. \nTips to Avoid Spyware and Adware: Watch your step\nMany downloading services install spyware or adware onto your computer through your use of their Web site. Some common sites identified by Spybot or Ad-aware are Ares, iMesh, KaZaA, and LimeWire. If you download, make sure to install a program that will destroy and detect spyware and adware on your computer. \nDon't touch the cookies\nWhen you visit some Web sites a "cookie" acts as an identification card, said UITS. When you return back to the same sight the browser passes the cookie back to the server. Cookies can generate a very simple way to keep tract of which sites you visit the most. Many Web browsers offer options in their programs to view and delete cookies; visit www.keepITsafe.iu.edu for details on how to remove cookies from your specific browser.\nAvoid the Ads\nMany advertisement banners and pop-ups are just dying for you to click so that they can send spyware and adware into your computer system. If you are sincerely interested in their product, try searching on the Web or verifying the company providing the \nadvertisement before visiting the site.\nLDon't click and chat\nAvoid clicking on many URLs received through instant messaging programs -- they can contain viruses aimed at phishing your computer or installing it with spyware or adware programs. Always verify the link with a buddy before viewing.\nAlways scan\nSimply installing programs such as Spybot: Search and Destroy or Ad-aware is not enough. You must open the programs and search for spyware and adware threats. Running this feature after each Internet visit will keep your computer safer from invasion. \nFor more information on the dangers of spyware and adware and the rest of UITS's top cyber security concerns, visit the Web at www.keepITsafe.iu.edu and inform yourself on cyber protection.
(10/26/05 4:50am)
An expansion on an 11-year-old law issued by the Federal Communications Commission has national associations representing U.S. universities up in arms -- but has left IU waiting. \nThe updated Communications Assistance for Law Enforcement Act makes it mandatory for all universities providing Internet services in the United States to upgrade their online networks to make it easier for the government to monitor Internet communication at the school's expense. The act is a direct expansion of a 1994 Federal wiretap law that required all telephone carriers to re-engineer their switching so that all phone wires could be tapped by the government. \nRequiring each individual university to fund their own ways of meeting the standards of CALEA has sparked the attention of some of the nation's leading associations of universities and colleges. The American Council on Education filed an appeal Monday arguing against CALEA and its policies.\nEducause, a nonprofit association of which IU is a member, is among these who will be filing suit with the FCC.\n"IU directly does not have involvement with the appeal. We are just a member -- they are filing," said Merri Beth Lavagnino, IU deputy information technology policy officer. "We do not know enough to move forward with anything involving CALEA until we learn more."\nAccording to reports made in the Chronicle of Higher Education, universities would need to spend billions of dollars to engineer the switches, purchase new routers, as well as hire new staff to oversee and maintain the project -- a cost that would likely raise tuition costs among students. \nCurrently, the order states that the policies of CALEA would go into effect Nov. 14, but universities would not need to be in compliance until June 2007. \nWith a gap of time remaining between the policy orders and IU, Lavagnino said the University is waiting on the outcome of the appeals filed against the law. \n"There has been so much that has happened already," Lavagnino said. "It would be imprudent of us to start on this before we know everything." \nThough the law is considered final, The Chronicle states that many college lobbyists are hoping for an exemption from the law or at the very least an extension for compliance. \nAnd though it is too early to tell what the outcome concerning CALEA will be, Lavagnino states that to her knowledge, there have been no cost estimations or possible plans created.\n"It is just too early to tell," she said. \nVice President of Information Technology Michael McRobbie was unavailable for comment by press time.
(10/25/05 5:52am)
This week, Yahoo! closed a deal with Stanford University to provide free legal music access to students. More universities than ever are signing contracts with music download companies, according to an article in The Chronicle of Higher Education. \nBut, these agreements have not been met with overwhelming support of students.\nAnd that lack of student support is exactly why Deputy Information Technology Policy Officer Merri Beth Lavagnino said IU does not offer this service to students. \n"We feel as though the time and money has to be worth the effort," she said. "There has to be student body interest and support for something like this." \nAlthough a contract with a major music and movie file provider is not a feature at IU, that does not mean it is not a consideration.\nFor the past two fall semesters, the Information Technology Policy Office has coordinated a discussion about this topic with representatives of the Residence Halls Association, the IU Student Association and University officials, Lavagnino said. The administrative units represented at these meetings have stated they do not wish to pursue a University-coordinated music and movie licensing service without the support of the student population.\n"Both years -- last year and this year -- the elected representatives of the IUSA and RHA were not supportive of the University entering into such a licensing agreement on the students' behalf," she said. "But, we continue to monitor the online music and movie subscription industry in case student body interest grows." \nIUSA president Alex Shortle said he believes support is low because of the cost of such a service.\n"I have never heard strong support for a contracted downloading service because of the fee," he said. "We are a user-fee campus and as far as we are concerned, this is why we voted against the athletics fee. We would want a contract with a company that would fall under a user-fee, but companies such as Ruckus would include individual fees for each piece downloaded." \nIn the meantime, the ITPO has chosen to focus on education about copyright, file sharing and the legal services students can choose to use on their own. In fact, IU sponsors a "Keep it Legal" campaign, informing computer network users of the consequences of downloading illegally. \nAside from campaign work, all students agree never to illegally download or share computer files when their IU username is issued. Students also receive notices when moving into off-campus or on-campus housing. \nViolation of this agreement is taken seriously by University officials.\nEach student implicated in a copyright violation must study an online file-sharing copyright tutorial and pass a quiz, Lavagnino said. The tutorial discusses copyright issues, the student's obligations under the law and the University's position and procedures.\nIn addition to the quiz, students also must attest that they have wiped all illegally obtained copyrighted material out of their computer's system. \nSecond and third offenses mean having to retake the quiz. These students are also prohibited from connecting to the IU network for a duration of between two weeks to indefinitely, Lavagnino said. Third-time offenders are also charged through the University's judicial process.\nAs an educational process, ITPO held its first "downloading fest" in January 2005 for a crowd of 1,600 guests (mainly students), named "Digital Karma" -- a program showcasing six major online music and movie services.\n"The purpose of the event was to increase the interest and awareness of graduate and undergraduate students in legitimate digital downloading and streaming technologies and services, which could then lead to a decrease in illegal and unethical file sharing behaviors, Lavagnino said."\nFor a list of alternative downloading services look on the Web at http://filesharing.iu.edu/alternate.php.
(10/24/05 4:15am)
University Information Technology Services enters into the fourth week of the National Cyber Security Month campaign by asking users to beware of "The Thing from the Internet." \nThe invasion of a personal computer can happen through many outlets used by parties attempting to corrupt a computer's data. The most common forms of infection are obtained by clicking links through AOL's Instant Messenger, e-mail attachments or downloads. The dangers of viruses or adware and spyware infections are daily, coming standard with a vast number of possible entryways into your computer system. \n"There is just so much that can happen," said Merri Beth Lavagnino, deputy information technology policy officer for IU. "But you can help to make yourself aware about the possible dangers and even someday use those skills to help someone else."\nAlthough there seems to be a direct relationship between viruses and being an internet user, UITS Web information says monitoring file sharing and downloading, internet browsing, e-mail attachments and links received through AIM can significantly decrease your risk for infection.\nTips for Safe Internet Surfing\n• Think Before You Click\nAccording to UITS information, receiving viruses through instant messaging is becoming one of the most popular forms of mass corruption because users can so easily be tricked into following a friendly appearing link received from a buddy. Links saying, "Check out my pictures" or "LOL" have become common. \nTo avoid an invasion of these viruses, always remain skeptical of links received from buddies, especially if a link appears without an explanation from a friend. Always check before you click. \n• Scan Your Attachments \nE-mail attachments sent from "phishers" can often contain viruses that will not only corrupt data but tap into your system to detect your personal information. Always run your anti-virus software to ensure your safety before opening an e-mail attachment.\n• Don't Share\nFile sharing and downloading are among the top causes of a computer becoming infected with spyware and adware. The best way to escape the contamination through file sharing is not to do it, said UITS, but if you do use them, be sure to not use free software because many of these networks are infected with viruses in disguise. \n• Browsers Beware\nWhile surfing the Internet, it is important to remain within secure Web locations. Most programs such as Internet Explorer, Netscape, Mozilla Firefox and Safari will notify you of entering an insecure location. While receiving this warning, be sure to think carefully if the information on the page is something you need to access or look for elsewhere.
(10/20/05 5:43am)
When IU was declared an absentee from this year's "Most Unwired College Campuses" in a national survey conducted by Intel Corp., IU technology representatives claimed they would take the results with "a grain of salt."\nClaiming the survey methodology was partial to smaller campuses, IU and other big schools would almost always be absent from the list, said IU spokesman Larry MacIntyre in an interview. \nBut according to an Intel press release, data for the study was collected from various sources: the "America's Most Connected Campuses" ranking conducted by The Princeton Review; an online survey that schools completed between May 1 and Sept. 1 that was executed by the Center for Digital Education and Intel Corporation; and public documents, additional industry sources and individual university interviews.\n"We sent about three e-mails to each university (we) looked at," said researcher Bert Sperling, the head of the survey project. "IU responded to one of those messages -- it was just a couple of sentences."\nOther universities, Sperling said, sent back paragraphs in regards to his inquiries about each school's technology advancements on campus. Ball State University -- the No. 1 most "unwired campus" -- was one of these. \nBecause of the school's in-depth reply to his questionnaire, he was able to acquire a better window into the school's efforts for wireless technology, Sperling said. \nAccording to Intel, much of the judging is done on a weighed process to incorporate the size of each individual university. \n"We understand that it is harder to maintain a 100 percent wireless network for 1,000 than it is for 10," said Allison Wesley, public relations representative for the Intel Corp. \nStill, IU was surpassed by at least 50 other universities \nnationwide on the issue of wireless technology.\n"Our feeling is that IU is pretty accessible. I don't know what we could do to compete with the smaller campuses of only a few thousand students," MacIntyre said. "We have over 31,000 undergrads here." \nAccording to Sperling's findings, many schools large and small have taken the technology ball and hit a homerun, he said. \nMany schools are providing more unique services for their students than ever, and the top contenders on the Intel survey are no exception. No. 1-ranked Ball State and No. 15-ranked Purdue now give students the ability to view any sporting event occurring on campus through their wireless networks. Dartmouth College and Carnegie Mellon University have programs that allow students to virtually check the status of their laundry within the residence halls without having to leave their desks. Features such as these are all "icing on the cake," Sperling said. \nIn fact, Ball State has wireless coverage in every food court and every green space -- including their arboretum, for more extensive biological research to be done by students. \nAside from 100 percent connectivity, Ball State and other universities have implemented a service called Wi-Fi phone, in which a headset is plugged into a laptop and used as a cell phone. \n"Dartmouth has provided many Wi-Fi headsets to act as phones because the cell phone coverage is so terrible on campus," Sperling said. \nComparing applications of wireless services, Vice President of Information Technology Mark Bruhn said the University might not know the various creative ways in which its networks are being used. \n"We make it robust and reliable, and then people just do what they need to do," he said.\nAli Jafari, IU-Purdue University Indianapolis professor of technology and engineering, believes IU is one the best when it comes to network infrastructure and high speed data connections within and among the campuses. \n"I believe IU has too much of it for typical day-to-day learning and teaching needs," Jafari said. "However, I believe IU has a lot of catching up to do when it comes to offering software solutions to support learning, teaching, collaboration." \nJafari said OneStart and Oncourse, in particular, are in need of "a lot of updating" to offer more dynamic services.\nOne interesting use of IU's network, Bruhn said, is the project to pilot Macromedia Breeze -- software that will allow IU users to collaborate with other students and faculty by sharing multimedia files and chatting with each other, all while the wireless network allows them do this from almost anywhere on the core campus. \nThough IU has slipped from the rankings, the University still has much to be proud of, Sperling said. \n"It is difficult to become 100 percent wireless with a large campus," he said. "And how IU ranked last year says a lot about the University as an innovator among technology -- everyone else just took their ball and ran with it." \nChief Information Officer Michael McRobbie did not return phone calls by press time.
(10/20/05 5:43am)
University Information Technology Services has announced plans to merge the Common File System and the storage features made available on Oncourse. The change is slated to go into effect throughout the 2005-2006 school year. \nCFS, a storage service first made available to IU in 2000, will officially be retired May 15, 2006 -- although no new accounts will be created past Dec. 23, 2005. Shortly after, all existing files will become read-only as of Jan. 15, 2006, said Joann Farris, CFS migration committee chairwoman. \nAfter the date of retirement, centralized file storage at IU will begin to change. CFS and Oncourse's My Filemanager space will combine to create a single virtual storage facility for the IU community. The new storage unit will be available through Oncourse CL and will contain at least 250 megabytes more than CFS and My Filemanager combined. The new service will also provide easy access to files within course worksites and be just as easily available to share with others, Farris said. \n"Bringing these resources together means that new users have fewer systems to learn and support," said Brad Wheeler, IU associate vice president for community source initiatives and IU-Bloomington dean of information technology.\nAs of Wednesday, fewer than 700 people a week access the CFS service, and by the end of the year, each of these users will need to be prepared to make the switch. Notifying all the CFS users is a task not far from Farris' mind.\n"Support center staff and Student Technology Consulting are aware of the pending retirement and are available to help customers move their files," she said. "A notice has been placed within CFS that advises the customer of the pending retirement." \nIn the mid of the CFS retirement, Oncourse will make the final switch to Oncourse CL -- a program which will provide the foundation for IU's next chapter of teaching, learning and collaboration support, Wheeler said. \n"Oncourse CL makes IU a member of a global community of colleges and universities that are sharing resources and building new capabilities and tools to support teaching, learning and research," he said. "This will pay off in savings and easily obtaining open source teaching tools developed at other universities." \nThis merge is separate from the CFS retirement -- it was born because of the potential of a better form of Oncourse seen by the IU community. \n"The original Oncourse has been very successful, but as a homegrown system, IU was an island for maintaining and enhancing it," Wheeler said. "There are many things that it did not do that faculty want for online course support."\nHowever, with a move as large as this, how are most IU users adapting?\n"IU has a wonderful and vast diversity of faculty and disciplines that have come to use Oncourse Classic in a variety of ways," Wheeler said. "Some are finding an immediate fit with Oncourse CL, while others prefer to wait for additional features that will be in the December update."\nAlthough a glitch-free program can never be entirely assured, Oncourse CL has gone through multiple stages of quality assurance testing before deployment to IU users, Wheeler said.\n"No testing process assures that users won't encounter any bugs -- the same is true for commercial software," he said. "But our process seeks to do everything possible to minimize that possibility while providing timely updates and quality services."\nFor those who are experiencing difficulties making the switch, Wheeler assures the Oncourse CL team tracks every support call, message and concern, and it is fixing bugs along with other universities as they are identified. \nFor more information regarding the CFS retirement and merge with the new file-sharing capabilities of Oncourse CL, visit http://uits.iu.edu.
(10/19/05 4:49am)
University Information Technology Services unveiled a plan Monday to replace the University's current Webmail services with an improved version -- and users only had to log on to find out.\nA notice appearing above the log-in feature of the IU Webmail page informed users of the change to come and the opportunity they have to test it.\nThe switch is the second part of a planned upgrade in place to maintain updated hardware for IU users, said Rick Jackson, manager of University Information Technology Services messaging department. \nPhase one of the upgrade -- which replaced the servers that stored mail -- was in place by this spring. Phase two will replace the hardware users access to connect to their mailboxes and will be upgrading material that is six years old. \n"This (upgrade) is part of normal life cycle replacement of hardware. The planning has been ongoing since we implemented Webmail and will continue after we finish this hardware upgrade," Jackson said.\nThe services of the new Webmail will be almost identical, but there will be a few added highlights based on user-feedback received in the past. Updated processes such as attaching documents to Web-messages with one click as well as easier cancellation of vacation messages are improved features, Jackson said. \nThe Web-based forwarding and filtering system, designed to forward messages as well as monitor messages possibly containing viruses, are now fully integrated into the Webmail's components. \nTo test the new service, UITS is requesting volunteers to use and evaluate the new Webmail -- a piloting phase set to begin the first week of November. Potential volunteers can sign up for the testing period through a link provided at the top of the Webmail log-in page -- an opportunity Jackson hopes users will take advantage of.\n"We had around 2,000 people sign up in the first day," Jackson said. "But we would like to have around 10,000 people sign up for the pilot." \nVolunteers will find all of their mail in its familiar place without having to move it and are also able to back out of the process at anytime. Testing will run until the end of the semester, at which time the entire University will make the move over to the new Webmail program. Although the move is large, complications to users are projected to be minimal. \n"(Users) may not be used to the improved response times we expect, but I doubt that people will have any difficulty getting used to that," Jackson said. \nFor more information on becoming a volunteer tester, access the current log-in page of IU Webmail and follow the link provided.
(10/17/05 5:02am)
____simple_html_dom__voku__html_wrapper____>University Information Technology Services continues into the third week of the "fright-fest" of National Cyber Security Month issuing a warning to the IU community to "Beware of Phishing Scams."
"Phishers," use fake e-mail messages to gather a recipient's personal information (social security number, credit card numbers, passwords, usernames, ect). If successful, scammers then use the information to steal the victim's identity.
"Identity theft is becoming a bigger problem," Merri Beth Lavagnino, deputy information technology policy officer for IU, said. "The numbers are coming in at surprisingly large amounts."
The most common form of these e-mail frauds come as messages from national banks, credit card companies and popular retailers with whom the victim is affiliated. By asking to verify information for them to perform any number of tasks, a doorway to identity theft opens upon the victim's reply.
According to a study performed from October 2004 through August 2005 by the Anti-Phishing Working Group's Web page, the number of phishing reports (possible identity theft attempts) received has more than doubled -- making phishing one of the leading problems in online banking and shopping.
To ensure online safety UITS has provided several tips to assist in protection from and awareness of phishing scams and opportunities of identity theft.
(10/13/05 5:37am)
The numbers are in for this year's Most Unwired College Campuses and it seems IU has been given the plug.\nThe survey done by the Intel Corp. ranked IU as the No. 1 unwired college in the nation last year, but on this year's list IU was nowhere to be found. \n2005's reign belongs to Ball State University, which has recently updated its wireless services to include every area of campus -- a feat that IU Vice President of Telecommunications Mark Bruhn said would be almost impossible for a school of IU's size. \n"We've been at 100 percent wireless coverage of our IUB academic and administrative buildings since early 2004, and we're approaching 90 percent coverage of the outside areas that matter," he said. "We can't and won't ever cover the entirety of our campus -- some 3,000 plus acres -- with wireless, which Ball State and smaller schools would likely be able to do."\nThe Intel survey, which included approximately 1,000 schools nationwide ranks its top 50 results according to wireless (or WiFi) coverage, and also included the number of undergraduate students enrolled and the computer-to-student ratio. \n"We have nearly 3,000 student computer seats at IUB, in campus and residence hall technology centers and in other associated labs. With a total of 37,000 students on campus, of course that ratio is fairly low," Bruhn said. "But what Intel likely hasn't taken into account is that we encourage students to own their own computers, and our recent survey shows that 97 percent of IUB students do, and nearly 50 percent of those are laptops with wireless capabilities." \nComparing the numbers, IU has some 3,000 acres -- Ball State has 600 and has 625 wireless access points on campus. \n"We have installed almost 1,000 wireless access points on the IUB campus (and nearly 600 on the IUPUI campus). We can't improve much in coverage," Bruhn said. "Ball State University, which is No. 1 on this year's most unwired list, -- and I'm not at all denigrating their great work -- does not have to install and manage a wireless network that size."\nIn fact, the top three universities named on the survey, which include Ball State University, Western Michigan University and the University of Akron, all have campuses of 600 or less acres -- Western Michigan with 550 and the University of Akron with only 218. \nWithin previous years, IU has been named the nation's hottest wireless school by Newsweek and was also named Intel's 2004 No. 1 most unwired college, but with small schools taking a jump on technology, schools revered in the technology area are often left off surveys not accounting for size. \n"Once most schools can claim nearly 100 percent wireless coverage, the student-to-computer ratio will likely leave larger schools off the list," Bruhn said. \nSo why don't the bigger schools work to implement 100 percent wireless coverage as well? \n"It would just not be cost effective to install wireless access to every part of our campus," said Larry MacIntyre, director of media relations at IU. "A lot of our east campus is located east of the bypass, a location including IU's golf course."\nThough all academic and administrative buildings are 100 percent wireless, many residence halls and outside areas are uncovered. \nThere really isn't a need for wireless in the residence halls, MacIntyre said. He said there are 2,708 computing places around campus, and 97 percent of IU students bring their own computers for personal use.\nWith a reputation for excellence in the aspect of wireless connectivity, MacIntyre said Intel's survey is just one of those things the University "will take with a grain of salt." \n"We were pleased they recognized us on their list in the previous year -- but now just about every school is 100 percent wireless -- we are never going to get there if you base a survey on ratios compared to computers and the number of students or computers and the number of acres," he said. "Either way you look at we will are always going to lose"
(10/10/05 4:29am)
University Information Technology Services begins today the second week of the month-long National Cyber Security Campaign, asking students to "Beware of Viruses and Worms" on their computers. \nViruses, man-made computer programs constructed to destroy and corrupt data, are hidden within other files and programs and can slip into your computer's system through computing actions known as high-risk behavior. File sharing, music downloading, clicking on links received through instant messenger that are unverified by the sender and opening e-mail attachments from unknown senders are popular examples of high-risk behavior. Performing these actions make your computer more susceptible to contamination by viruses and worms. \nTaking certain precautions, such as avoiding high risk behavior and installing -- as well as maintaining an anti-virus software program -- will contribute to the safety of your personal computer. Merri Beth Lavagnino, deputy information technology policy officer for IU, said many computer users believe one specific action will protect them from virus threats indefinitely. \n"Installing anti-virus software is not enough," she said. "No one action will protect your computer, and that's what this campaign is about -- raising awareness." \nTo ensure the protection of your computer against viruses, following safety procedures can eliminate a high percentage of danger. \nTips to avoid virus attacks:\n• Install anti-virus software. \nAnti-virus software will not only monitor your computer for virus-like activity, it will also scan and remove viruses from disks and files that come in contact with your system. The installation of an anti-virus is essential having a protected computer, but updating your anti-virus is just as crucial. Virus patterns will continue to change as they grow more complex, and to fully be identified by your anti-virus program, your computer must have an up-to-date version.\n• Make sure your software is current.\nPatches (fillers for bugs or security holes within your software) and updates will help to eliminate a virus creator's ability to slip worms through holes in your software. Avoid vulnerability by updating your programs.\n• Always have a backup.\nLarge viruses can cause critical contamination of your computer, resulting in the need to wipe out your entire computer system. Having backups of important files can ease the pain of having to destroy your data.\n• Keep your files locked.\nBefore inserting personal disks into foreign computers, lock them to ensure the protection of your personal files in case the computer is infected with a virus. An infected disk will infect your computer once inserted and opened.\n• Quarantine infected programs.\nIf an infected program is detected by your computer, isolate it immediately by disconnecting it from other programs and applications on your computer. This will eliminate the spread of the virus before you can destroy it. \nVisit www.keepITsafe.iu.edu for more information on the Web about protecting your computer system from virus and worm infections, and how to avoid high-risk behaviors.
(10/06/05 5:55am)
The history of the IU Homecoming Court can be traced back as far as 1940 with the crowning of the first Homecoming Queen, but in 1968 the tradition was discontinued for a period of ten years when a discriminatory racial scandal unfolded in the laps of University officials. \nIn October 1968, a three-hour hearing was held before the Joint Committee on Discriminatory Practices after five African American students filed a complaint after they were not selected to the Homecoming Court on what they suspected to be racial discriminatory terms. \nFinding in favor of the students who filed the complaint, the committee made a recommendation to then-IU President Herman B Wells to declare the Homecoming Court void. \n"The Committee concludes that any contest which holds out honors, distinctions and rewards to students of this University should hold forth opportunity on an equal basis to all students of every substantial ethnic and other identifiable group," the Joint Committee on Discriminatory Practices said in an issued statement. "No one entrant should be elevated about the others." \nAccording to University Archives, 70 percent of the Homecoming Court judging was based on beauty alone, followed by a distant 20 percent on personality and charm and lastly by 10 percent on interview questions selected by the judges. \nAccording to a report issued by the committee, the judging criteria was thought of as a type of "institutionalized racism."\n"The committee believes that subconscious acceptance of dominant social beauty standards influenced the decisions of the judges," the report stated. \nDue to minority protests and recommendations from the committee, Wells then gave the order to suspend the Homecoming queen elections until plans to include all races equally could be determined. \n"I regret any inconvenience and disappointment to any individuals or groups," Wells said in a written statement to the public. "But, the customary procedure is no longer adequate in representing a campus which grown cosmopolitan and which itself represents people of nearly every national origin, creed and color." \nAfter a ten-year absence, the Homecoming Court was reinstated into IU tradition in 1978. No longer a beauty contest, the Homecoming Court was turned into a scholarship and recognition program for outstanding seniors in the IU community. Currently, there isn't a single section that deals with beauty, said Chris Gatchel, director of this year's Homecoming Court.\n"Beauty is not what this contest is about," Gatchel said. "In my eyes that's a shallow practice and I'm doing the best I can (with creating judging requirements for this year's Court) according to the way I was raised and for what this University stands for." \nAccording to records in the IU Archives, five years after the Court's revival, the first believed black Homecoming queen, Debora Jackson, was crowned. A black Homecoming queen was chosen again in 1996 when senior Erica Hart's name was called. \nOther minority homecoming queens may still be unknown.\nAlthough progress has been made, there is still far to go, said Eric Love, IU director of Diversity Education and Black Student Union adviser.\n"As a campus we are still quite segregated," he said. "A lot of the students of color who are interested in getting involved find that many of the environments around campus are not welcoming." \nValued as an essence of the campus community, cultural diversity brings character to the Homecoming court, said Elizabeth Roush, president of the Student Athletic Board. To ensure an equal opportunity for all to compete, questions of race, sexual orientation or religion are not included on the applications for the court. Judges do not discover these details until a face-to-face interview session, she said.\n"The Student Athletic Board encourages every senior to participate in the Homecoming court competition regardless of race, religion or ethnic background," Roush said. "The winners will be a best representation of the embodiment of IU, and that decision won't be one of race"
(10/03/05 5:52am)
The National Cyber Security Campaign kicks off October with "Invasion of the Password Snatchers," a poster campaign warning students about password security -- a problem that affects students on college campuses throughout the nation. \nPassword safety can be a main cause of a computer invasion if computers are not properly protected, said University Information Technology Services officials. \n"The biggest problem that can happen when your computer is taken over by an intruder is that this person has control of everything on your machine," said Merri Beth Lavagnino, deputy information technology policy officer for IU. "A lot of people don't realize this."\nTo avoid an intruder's control of personal information, follow a few simple guidelines while creating and maintaining your password information.\nTips for keeping passwords secure\n- Never share your password.\nPassword information is meant to protect you. Keep it private.\n- Never save your password.\nWhen a browser gives you the option to save your password, always decline in order to lower the risk of making an invasion of your computer easier.\n- Change your password regularly.\nPasswords should be changed regularly every six months, according to UITS information.\n- Never send your password via e-mail .\nCrackers (those who attempt to intrude into computer networks) can try to trick you with a fake e-mail requesting your password information, often making the message look very official. (It is actually against University policy to request password information by e-mail).\n- Make administrative passwords different from IU network passwords.\nTo avoid making a cracker's job easier to obtain your personal information, create different passwords for administrative and IU network IDs to act as barriers. \n- More safe passwording tips and other information on creating and maintaining password information can be found on the Web at www.keepITsafe.iu.edu.
(09/29/05 5:56am)
The chain link fence paddock on Seventh Street next to the IU Auditorium will continue to stand until IU gets the money to renovate the area, said Bob Meadows, the University architect. \nIU erected the fence in the fall of 1997 as a staging area for construction at the Auditorium, Meadows said. \nWhen the renovation was completed several years ago, the University didn't have the money to replace the fence with an alternative, but didn't want to reopen Seventh Street to through traffic, he said.\nSo, the fence remained where it was.\nCurrently beginning its eighth year as a part of the IU community, some students wonder when plans will be made to remove the fence and replace it with something that contributes to the beauty of the campus.\n"Right now, it is very contently being used as storage for the construction of the multidisciplinary science building one," Meadows said. \nThe site, which closes Seventh Street to through traffic was a decision made by the trustees to keep driving congestion to a minimum and open to students and staff walking through campus, Meadows said.\n"We really strongly believe that the center of campus should be devoted to bicycles and pedestrians," he said. "The trustees are not planning to reopen the street to traffic."\nBut with the campus's devotion for beauty, the pedestrians still walking there would like to know why the fenced-in mini site has been accommodated for eight years.\n"This campus is so beautiful. It looks like a big brown patch on a beautiful green yard," said freshman Jillian Stansell.\nThough plans have been approved to tear down the fence and create a smaller path open to emergency vehicles and pedestrians only, Meadows said the University does not yet have the funding.\n"After all the money we pay each year, the school can't afford to move their construction site?" asked freshman Abigail Hurrle. "If they can put up new clocks in areas that already look good, they can certainly fix the parts that don't."\nThe official plan, which includes a newer pathway open only to emergency vehicles and pedestrians surrounded by a lit garden where students can sit was approved by trustees a few years ago, said Meadows, but the plan has still not been set into action.\n"It's quite uncomfortable to get to the library," said graduate student Asta Zelenkauskaite. "They don't know how nice it would be to not have to walk the small path that winds like a snake. They can find the funds. They afford computers and all the biggest technologies -- surely they can afford to correct that." \nThough many students are want to see the fence go, some are still happy with the effect it has on their cross of Seventh Street while walking to classes. \n"It's nice that there isn't any through traffic, so we don't have to worry about dodging cars," said sophomore Meghan Clark. "But they could at least do something to make it look better." \nThough University officials and students alike agree that the site is an eyesore, the IU community would like to know how long the project will be put off as a priority. Until that announcement however, the fence still stands.
(09/29/05 5:27am)
During the month of October, IU will be participating in the National Cyber Security Awareness Campaign, warning students of personal computing risks through a series of posters imitating those of 1950s horror and science fiction films. \nEach week, a different security risk will be introduced to each of the eight IU campuses to alert students and faculty alike of the dangers that lurk throughout the Internet. \n"Every week thousands of attempts are made to probe computers," said Merri Beth Lavagnino, deputy information technology policy officer at IU. "We watch the attacks on our network and every computer connected to the IU network will be probed a few times a day." \nLavagnino, who is also a member of the national EDUCAUSE Security Task Force's Awareness and Training Working Group, said IU's involvement in this year's campaign is to help better inform students and faculty members that just updating anti-virus software is not enough to fend off hackers. \n"Our goal is to make thinking security a natural reflex," she said. "There's so much that can happen, but you can make yourself aware of the actions that will help you and someone else escape computer invasion." \nFor five weeks, UITS will be educating the IU community about risk topics such as viruses, phishing attempts, worms, identity theft and password protection. And with apathy of computer users among topics of personal security risks, the frightfully themed posters will don tips for scaring off scammers. \n"Most people don't want to pay attention until they have a problem," Lavagnino said. "We are trying to catch students' attention with these posters -- show them that security does matter."\nReleased every Monday, the series concept was created by the communication and planning department of IU, which then contracted Digital Media Services digital artist Vincent Cannon from IU-Purdue University Indianapolis to create scenes reminiscent of those from old Hollywood horror and science fiction films. \nBecause computer security issues affect everyone, a series of postcards, released along with the posters, will be sent to all IU campus faculty, Lavagnino said.\nHowever grim the issue seems, Lavagnino ensures that following steps given out during this year's campaign will have a dramatic effect upon the future of safe computing. \n"We are releasing the five topics to keep you thinking," she said. "This is a very good cross-section of hints that will make you aware of potential risks. If you follow the Web site's instruction you can almost consider yourself an expert."\nIU's involvement in the national campaign will contribute creating a large online resource for smaller colleges and universities that might not have the funding to create a campaign of their own. EDUCAUSE, a nonprofit association whose mission is to advance higher education by promoting the intelligent use of information technology, will be contributing to the project to ensure people are highly educated with regard to Internet safety. \nIU is a technology leader in the education community and is often asked to be sent representatives to committees at places such as EDUCAUSE, Lavagnino said. \nThe first poster of the campaign series will be available Monday on campus as well as online at www.keepITsafe.iu.edu.
(09/28/05 5:16am)
IU student Arbara Rogers knows how to keep a 10-year-old group strong and vibrant. For her and the IU Essence dance team, she said it's a mixture of fun, friendship and hard work.\nMembers of the award-winning team will celebrate the club's 10th birthday this year with a season packed with performances. Rogers, an IU sophomore and Essence team co-captain, said the formula for the 10-year run of success is simple.\n"We are a group for girls who love to dance to hip-hop who've never had any experience," Rogers said. "So many other dance teams require years of training. We will help teach you the techniques you need."\nBut for a group of ladies whose dancing backgrounds vary, there is no shortage of talent or awards. Walking away with the first place trophy after their performance at 2005's Star Quest dance competition, the members of Essence still stand to honor one of the traditions by which it was founded by Taprena Augustine in 1995 -- self-expression. \n"We don't look for people with experience," Rogers said. "If you are having fun while you dance and you have style, we will help you with everything else."\nHelping is the technique that helps them succeed in their routines, Rogers said.\n"We have girls on all different dancing ability levels," she said. "If one person is not getting a step right, the whole routine can look off. We all need to be on the same page, so we help each other learn."\nMany of the girls will tell you that dancing is their life, but the ladies of Essence still take time out to be together as friends. To Rogers, being friends is one of the most important parts of good group chemistry. \n"It really shows when you are dancing on stage with someone you don't get along with," Rogers said.\nAside from performance, Rogers said teamwork is just as important offstage, as Essence choreographs all its routines. Everyone adds ideas so the team doesn't put on the same show twice, she said.\nCurrently preparing for upcoming shows Saturday at Kinsey Hollow and later that same day in Indianapolis performing for the Circle City Classic, IU Essence has plenty of bonds that dance through practices, performances and fun. \n"We are always looking for chances to perform -- its what we do," Rogers said. "We are also going to be performing at Yell Like Hell and this year's homecoming parade."\nBalancing busy practice and performance schedules with even busier personal lives, the members of Essence still pour their hearts into what they do best -- dance. \n"It's demanding, but it's also a lot of fun," Rogers said. "It's not always work, work, work. We do have fun at practice, but especially when we perform"
(09/27/05 4:44am)
For potential lawyers, the future is coming to IU -- 105 times to be exact.\nThis Wednesday, IU will play host to Law Day, a conference containing admissions officers representing more than 100 law schools in the country. Held in the Indiana Memorial Union's Alumni Hall, IU's Law Day will is scheduled to have the largest turnout in history and will be preceded by a panel of prominent law school admissions deans speaking on "What I Really Look for in a Law School Application."\nThe event is set to break last year's record turnout of 99 law schools. Pre-law adviser and director of this year's Law Day Mac Francis said IU is attractive to recruiters from around the country because of its \nstudents.\n"We are lucky to be at IU for such an event," Francis said. "Our students have an excellent reputation of being prepared with intelligent questions (for admissions \nrepresentatives)."\nWith an expected attendance of more than 700 students, Law Day's opening statements will be delivered by a panel consisting of admissions deans Dennis Long, IU-Bloomington Law School; Barbara Andelman, Case Western Law; and Mike Burns of DePaul University's College of Law. \nSpeaking on the application process for law school, Dennis Long, IU School of Law's assistant dean for admissions, said he's never seen a major that isn't well-suited for law school.\n"Your major doesn't matter -- it's what you do with it," Long said. "Take tough courses. The most important thing that needs to be proven to us is an applicant's ability to do research." \nIn fact, Francis argues that most law schools are looking for more than just a pre-law or political science major.\n"Admission boards are looking for more than a GPA and a LSAT score," Francis said. "They are looking for interesting and intelligent people."\nFollowing the question and answer session, students will have the opportunity to speak with any of the more than 100 representatives from law schools across the nation, a figure that Long said is a big compliment to the IU campus.\n"There are lots of good schools out there, and to have them at IU, it's part of the reason we were the hottest school listed in Newsweek," Long said. "They hit the nail on the head there."\nLong attributes the turnout to IU's prestige in advanced technology. There is a better understanding of technology in every undergraduate program at IU and research can be up to 50 percent of a lawyer's daily work, so being updated is extremely important, he said. \nBeginning with the panel discussion at 9:30 a.m. and followed by a chance to meet with admissions representatives from 11 a.m. to 3 p.m., Francis hopes to see students being "drawn in."\n"All students, alumni down to freshmen, should attend," Long said. "Students will be given the chance to hear deans with the utmost credibility speak on a panel that is entertaining as well as \ninformative"
(09/23/05 5:41am)
As use of computer technology increases into a daily necessity, trips between campuses for IU and Purdue University students and faculty will be much brighter due to a laptop's new home away from home.\nIU and Purdue announced Wednesday that the two universities will come together to establish a mutual connection of wireless technology enabling students and staff from IU-Bloomington, Purdue-West Lafayette and IU-Purdue University at Indianapolis campuses to access the Internet while visiting.\n"Up to now, visitors to the opposite university's campus would have to go through administrative procedures to secure accounts for access to that campus's wireless network," said Mark Bruhn, vice president of IU telecommunications. "Visitors can worry about the business for which they are on that campus, instead of having to worry about having to go through these steps (to access the Internet)."\nThe agreement -- which is a continuation of I-Light, a fiber optic network connecting IU-Bloomington, IUPUI and Purdue's West Lafayette campus -- will pave the way for easier business meetings as well an adjustment for commuting students and faculty members free of problems. This means that any IU, Purdue or IUPUI student or faculty member is able to walk onto one of the three campuses and connect wirelessly to the Internet with ease. The service is expected to be up and running by early 2006.\nThe new wireless connection will also dramatically affect research efforts between the two universities. \nNationally, the project will affect the University's effort to collaborate on research projects. People will see what IU is capable of doing in terms of research and realize that by wirelessly connecting to other campuses our research capabilities will become more advanced, said Dave Jent, IU group manager for data network services.\nPresented at this year's I-Light convention, a conference featuring some of the country's best networking, computing, visualization and collaboration efforts and technology co-hosted by IU and Purdue, the project maintains IU's reputation as one of the most technologically advanced campuses in the nation.\n"We are the first two non-affiliated campuses (in the country) to wirelessly connect," Jent said.\nIn fact, IU has been a trendsetter for campuses around the country for years, he said. \n"Since the I-Light project began, a lot of states have followed IU's lead," Jent said. "It doesn't take long for people to pick up on an idea."\nJent said he believes this idea will be no different. \n"IU is the number one network center in the country, and we constantly have a huge demand throughout the world for our specialists to lead classes on technology," he said. "There are few institutions that have the drive of IU."\nAnd the drive will not end there. IU's plans to bring the latest technology to campus are continuous, Bruhn said.\n"Indiana University is committed to the continued development and delivery of IT services and support that will further enhance research and teaching and learning"
(09/20/05 6:04am)
You can refer to her as a world-renowned athlete, a model, an actress and even disabled. Just don't call her an inspiration. \nA woman defying all expectations, Aimee Mullins filled each of these roles, as well as the seats of the Indiana Memorial Union's Alumni Hall Monday night.\n"To call me an inspiration is to deny that I have any real talent," Mullins said in an interview.\nMullins, who was born without fibula bones in both of her shins, is a bilateral below-the-knee amputee. Overcoming adversity, she rose to become a world record holder for the 100-meter and 200-meter dash and long jump events by competing in the 1996 and 2000 Paralympics games.\nAs a child, Mullins remembers thinking to herself that she just couldn't take no for an answer. And she didn't. \nHaving attended Georgetown University on a full academic scholarship, at 17, Mullins became the youngest person ever to work in the Pentagon. However, it was her family background that left her hungry for a competitive atmosphere. \n"I was constantly active in my childhood, and now after two years of just going to class, I was ready to get back into it," Mullins told a crowd of several hundred attendees.\nMaking a decision to focus on collegiate sports, it was under the direction of famed Georgetown University track coach Frank Gagliano that she went on to accomplish more than most athletes without disabilities. \nIgnoring every odd stacked against her and adding to her list of achievements, Mullins went on to model and even act. She \nattributes her success in life with a desire to grow and overcome obstacles.\n"Life is beautiful, gratitude, self-awareness and so many other things. You just have to pull away from the frame of mind that makes things not possible," Mullins said. "You just have to keep going. We are all very disabling to ourselves but we are supposed to have hard times. That's what life's about."\nShe advised college students to embark on a similar path and never settle for the status quo.\n"Remember to stay curious, understand the power you have to make yourself happy and don't believe it when people say these are the best years of your life. Those are people who just got boring," she said.\nSpending her life rising above her status as an amputee, Mullins has recently added the honor of being named one of People magazine's "50 Most Beautiful People," and recalls the time when she was told she was so beautiful, some couldn't even tell she was disabled.\n"I just asked what disabled people were supposed to look like," Mullins said. "The best thing I'll ever do for disabled people is not to be viewed as one." \nAlthough her experiences are anything but ordinary, Mullins still associates her hardships as a simple matter of fear. \n"It taught me what courage is. Everyone feels fear, but only some can rise against it." \nJunior and defensive back on the IU men's soccer team Jed Zayner presented Mullins with a jersey signed by the IU soccer team.\n"Ultimately, it is not about what records she holds or her involvement in the development of new prosthetics that makes Aimee wonderful. It is how she carries herself," Zayner said. \nMullins ended her formal speech by saying everyone in the room had their own disability to cope with as well.\n"We all have that one thing that holds us back," she said. "Rather than have it be a skeleton in the closet, have it be a skeleton key that unlocks the door to opportunity"