| A Message from Geneva Henry, Vice Provost for Libraries and Information Technology |
|
|
GW IT is committed to providing the right access at the right time by expanding the implementation of Role-Based Access Control (RBAC). Not only does this enhance security, but it also streamlines operations, reducing the time it takes to gain access to critical work systems. After the successful Spring 2024 pilot with Human Resource Management and Development (HR), we have started working with additional campus partners to understand their role and access needs and integrate them into RBAC.
RBAC is an access control model that grants permissions to specific roles within a school or department, rather than to individual users, so the permissions automatically change if an individual changes roles at the university. By assigning permissions to roles, we can ensure that users only have the access they need to perform their jobs, and adjust permissions easily. RBAC reduces the risk of unauthorized access to sensitive information and allows us to adapt quickly to new staff, programs, and changes in roles, maintaining security and efficiency without significant disruptions.
Implementing RBAC is a critical step in modernizing and securing the digital experience at GW. Throughout the process, we will work closely with our campus partners to establish timelines, facilitate testing and support implementation. Your support and collaboration are essential as we move forward with this initiative.
|
|
|
| January is Data Privacy Month at GW |
In an effort to maintain the university’s commitment to privacy and cybersecurity, GW IT’s Data Governance team is excited to partner with the GW Privacy Office to celebrate Data Privacy Month. This month, we are bringing you a series of virtual workshops focused on privacy and information security principles and best practices.
|
|
|
| Get More with Zoom Meetings |
Take full advantage of what Zoom has to offer by migrating your Webex meetings to Zoom and get more from your meetings using new features. Zoom AI Companion can provide real time meeting summaries, smart recordings and meeting notes, and can be paired with the Zoom transcription and Zoom translation. These new features remove the need for third party AI Bots that are not covered by an enterprise agreement, and can lead to data and security risks.
|
|
|
Getting Started with Zoom Meetings |
|
Keep Your Zoom Meetings Secure |
|
|
|
Banner Modernization Offers Automation of Grades Between Blackboard and Banner |
Through the Banner Modernization project, we are focusing on building efficient processes and improving the grading experience is a top priority. We are now able to sync grades entered in Blackboard with Banner, eliminating the need for Faculty to log in to Banner to input grades. This past fall, we completed a pilot of the grade integration and while we continue to fix minor issues identified, the Grade functionality will be available to all faculty this semester. Videos and instructions will be available on the Blackboard website, and you will find more information from the Office of the Registrar.
|
|
|
| Windows 11 Upgrade Coming to GW Managed Computers |
GW IT will upgrade managed computers to Windows 11 before Windows 10 is retired. Windows 11 offers new features, a redesigned interface, better Microsoft services integration, and enhanced security.
Starting Spring 2025, we will coordinate with schools and departments to schedule upgrades and address computers with specialized software. This includes faculty and staff workstations, and computers in classrooms, labs, conference rooms, and shared spaces.
|
|
|
|
GW IT Security Blog Helps You Stay Ahead of Scammers with The Core 4 |
Learn The Core 4 from the GW IT Security Blog to stay ahead of scammers and safeguard your money and information.
|
|
|
| Advancing Research at GW by Expanding HPC |
GW IT, in partnership with academic and administrative units, is in the process of expanding the High Performance Computing (HPC) platform, Pegasus. The expansion integrates the Nvidia Grace Hopper superchip, L40S GPUs, and additional compute nodes. With enhanced compute power and memory capabilities, this expansion will advance research efforts across various fields.
|
|
|
| Did You Know You Have Choices for 2SA? |
GW Two-Step Authentication (2SA) is one of our key tools in preventing unauthorized access to GW accounts. To make this process easier and account for things like lost phones, there are several methods you can use to accomplish 2SA.
GW IT recommends the Microsoft Authenticator App as your primary method and having a validated secondary method like a text message, phone call or even a yubikey.
|
|
|
The Data Days Event is February 20, 2025, from 11 am - 12 pm |
Navigating Data Sharing: From Administrative Data to Research Data
Join the Data Governance team and the Office of Research, Compliance and Integrity as we provide an overview of data sharing practices and requirements for using administrative data and research data.
|
Classroom Technology Training |
Classroom Software Requests |
|
|
Need additional software in your classroom? Submit a software installation request before the semester deadlines:
|
- Summer sessions: February 1st
- Fall semester: June 1st
- Spring semester: November 1st
|
|
|
Manage your preferences | Opt Out using TrueRemove™
Got this as a forward? Sign up to receive our future emails.
View this email online.
|
1918 F Street NW | WASHINGTON, DC 20052 US
|
|
|
This email was sent to cfoster@gwu.edu.
To continue receiving our emails, add us to your address book.
|
|
|
|