KJB136's blog | Information Technology | University of Pittsburgh
!

You are here

KJB136's blog

Digital Accessibility for Superior Performance

To create a truly vibrant learning, research, and teaching environment, the University needs the full participation, contribution, and engagement of every person in our community. That means everyone must be able to access all our resources and programs, including those that are online.

People often think of physical services when they hear the term accessibility—e.g., wheelchair ramps, automatic doors, ASL interpreters, or braille textbooks. But when it comes to the Internet, accessibility looks a little different.

Securing Data Privacy

From the moment a person submits an employment or admissions application until the day they leave the University, Pitt collects a wide array of data about the people in our community. This information is necessary to track academic progress, run payroll and benefits, apply financial aid, enable smart IDs, grant system access, and nearly every other facet of daily operations.

Gen Z Tech Trends

Gen Z really are the Zoomer generation, given how much time they’ve spent in online classes and events in the last year and a half! This generation is tech savvy, self-motivated, and always connected. While you might not share the habits and preferences of today’s students, it’s important to understand how their digital habits shape the way they interact with you.

Perfect Your Password Protection

Passwords – you can’t escape them. Logging into your computer? Enter your password. Checking your email? Enter your password. Online banking? Enter your password. Passwords are such an integral part of online life, it’s easy to forget how important they actually are for protecting your digital footprint. Here are some tips for becoming a password pro.

Hacking the Human

It’s Cybersecurity Awareness Month—Pitt IT’s favorite time of year. Techies often focus on the high-tech methods hackers use to crack passwords, bypass firewalls, infect a device, and steal people’s data or money. But the truth is that most cybercriminals don’t hack your system. Instead, they hack you. In other words, they trick you into giving them the keys to the castle using social engineering.

The A–Z of Cybersecurity

It’s finally October! While many people are hyped for Halloween and pumpkin spice lattes, the folks in Pitt IT are jazzed for Cybersecurity Awareness Month. Despite all the advanced tools, security reviews, secure network design, and constant vigilance of Pitt IT to protect University systems, accounts, and computers, the most crucial security safeguard is … YOU! By understanding how hackers work and what to look for when it comes to cybersecurity risks, you can stop hackers before they arrive. Here are 26 terms* you should understand to #BeCyberSmart!

IT Tools for Researchers

Pitt researchers use their extensive knowledge, boundless curiosity, and innovative techniques to bring new ideas to life. It takes robust technology tools to help investigators collect, store, and analyze the data; document their processes and results; and share and work with collaborators and lab personnel. Pitt IT supports the work of researchers, so they can focus on doing what they do best: making the University of Pittsburgh one of the top research institutions in the world!

Visualizing Data for Better Decision-Making at the CRC

Pitt’s Center for Research Computing (CRC) provides researchers with free access to advanced computing hardware and software, along with training and consultation by CRC research faculty. University faculty are able to perform resource-intensive functions, such as simulations; data, image, and text analysis; and genomic sequencing to help give shape to innovative ideas.