Schedule

Conference schedule

Preconference

Developing with Docker (option 1)

View more about Developing with Docker (option 1)
Docker can allow developers to build consistent development environments in seconds instead of maintaining clunky, outdated descriptions in wikis or text files. In this training session, you’ll learn the basics of using Docker, including how to utilize it for building complex development environments. Some of the considerations used to build development environments can also be applied for successfully running an application in Docker for test or production workloads.
Presenter(s): James Bennett

Agile Community of Practice meeting

View more about Agile Community of Practice meeting
The Agile Community of Practice - Agile Ninjas is a group aimed at providing resources, leadership, and support for continuing and sustaining agile adoption across IU. In this highly interactive Open Space meeting, participants will have the opportunity to share ideas, engage in peer-to-peer coaching, and learn more about how other colleagues are using agile across IU. In addition to the organic open space discussions, the Ninjas may also provide more targeted discussions on relevant topics including updates and a demonstration of our pilot of the Agility Health suite of tools.
Presenter(s): Agile Ninjas

Getting started with Decision Support Initiative technologies

View more about Getting started with Decision Support Initiative technologies
Participants from the Decision Support Technologies Users Group will share relevant demonstrations and discussions related to the IU Decision Support Initiative, including topics such Denodo and Data Cookbook, and with an emphasis on Tableau.
Presenter(s): Decision Support Technologies Group

UX Bootcamp

View more about UX Bootcamp
UX is far more than the user interface and it requires effort from everyone on a project team – not just designers and developers. Nowadays, users compare their experiences at IU with those on their personal devices (iPhone, MacBook, Amazon), not just with other universities. How do we start to ensure that our digital experiences match those of the best tech companies in the world? How do we design better end-to-end contacts for the students, faculty, and staff of Indiana University? In this workshop, we’ll answer those questions and more as we look at what goes into designing better experiences with hands-on, practical projects. Come in prepared for teamwork and collaboration. No laptops needed – just bring yourself!
Presenter(s): UX Office (Brian Hawkins, Madeline Grdina, Greg Hanek, Alan Milner, Levi McGranahan)

Developing with Docker (option 2)

View more about Developing with Docker (option 2)
Docker can allow developers to build consistent development environments in seconds instead of maintaining clunky, outdated descriptions in wikis or text files. In this training session, you’ll learn the basics of using Docker, including how to utilize it for building complex development environments. Some of the considerations used to build development environments can also be applied for successfully running an application in Docker for test or production workloads.
Presenter(s): James Bennett

Developing with Docker (option 3)

View more about Developing with Docker (option 3)
Docker can allow developers to build consistent development environments in seconds instead of maintaining clunky, outdated descriptions in wikis or text files. In this training session, you’ll learn the basics of using Docker, including how to utilize it for building complex development environments. Some of the considerations used to build development environments can also be applied for successfully running an application in Docker for test or production workloads.
Presenter(s): James Bennett

Death By Design: The Dirty Secret of Our Digital Addiction

View more about Death By Design: The Dirty Secret of Our Digital Addiction
Consumers love—and live on—their smartphones, tablets, and laptops. A cascade of new devices pours endlessly into the market, promising even better communication, non-stop entertainment and instant information. The numbers are staggering. By 2020, four billion people will have a personal computer. Five billion will own a mobile phone. But this revolution has a dark side, hidden from most consumers. In an investigation that spans the globe, filmmaker Sue Williams investigates the underbelly of the electronics industry and reveals how even the smallest devices have deadly environmental and health costs. From the intensely secretive factories in China, to a ravaged New York community and the high tech corridors of Silicon Valley, the film tells a story of environmental degradation, of health tragedies, and the fast approaching tipping point between consumerism and sustainability. Come see the film and then listen to a panel of experts from IU who will share tips about we can all reduce the impact of our technology use.
Presenter(s):

Breakfast

Statewide opening breakfast

View more about Statewide opening breakfast
Presenter(s):
8:00am | IU Auditorium

Keynotes

Automation: Ready or not, here it comes

View more about Automation: Ready or not, here it comes
In the field of computer science, the word “automation" can refer to many different things. Levels of automation are increasing at an unprecedented rate, whether measured by number of installations or by system complexity. Automation is getting easier to do but harder to do correctly—what would have been an unthinkable automation-created error a decade ago has become commonplace. The economic, social, and legal ramifications that can result from the failure of an automated system can be staggering, but they’re only increasing as more of life becomes automated. Join Phil Salkie, computer scientist and managing partner of Jenariah Industrial Automation, for the 2017 Cybersecurity Summit kickoff keynote address as he discusses the meanings of automation, its security implications and failure modes, and methods of ensuring that inevitable failures do not turn into nightmares.
Presenter(s): Phil Salkie
Cybersecurity Summit

In the Age of the Smart Machine, 30 years later: A conversation with Shoshana Zuboff

View more about In the Age of the Smart Machine, 30 years later: A conversation with Shoshana Zuboff
Statewide opening keynote: Join IU VP for IT and CIO Brad Wheeler and author Shoshana Zuboff in a Q&A about Zuboff’s In the Age of the Smart Machine from the ’80s. The two will discuss Zuboff’s predictions made 30 years ago about artificial intelligence and the future of work and power. We’ll also look at Zuboff’s predictions for the next 30 years in terms of how we’ll work, the jobs we’ll do, and who will have power and influence in our society as machines change the workforce and economic landscape.
Presenter(s): Shoshana Zuboff & Brad Wheeler
9:00am | IU Auditorium

Will IT kill the Fourth Amendment?

View more about Will IT kill the Fourth Amendment?
If intellectual property is everywhere, then what constitutes illegal search, right to privacy, protection of personal identity, and intellectual property? Have we effectively traded bullets and bombs for bits and bytes? Professor Bob Wichlinski (Valparaiso University) moderates a discussion centering on privacy, identity, theft, surveillance, and the power of government to regulate information technology with guests Dr. Eric Deitz (director of the Purdue Homeland Security Institute and former director of Indiana Homeland Security), Dr. Dom Caristi (senior fellow of the Digital Policy Institute & professor of Telecommunications at Ball State University), and Dr. Nick Rosasco (assistant professor and director of the CyberSecurity program at Valparaiso University).
Presenter(s): J. Eric Dietz, Dom Caristi, Nicholas S. Rosasco, Robert J. Wichlinski
Cybersecurity Summit

Clever criminals and smart machines: The future of cybersecurity

View more about Clever criminals and smart machines: The future of cybersecurity
Join Dan Geer, CIO for In-Q-Tel, for his opening keynote as we take a look at the future of cybersecurity. Geer will share what he considers to be the biggest risks and challenges facing universities and corporations as new technologies like artificial intelligence and machine learning become more pervasive and sophisticated.
Presenter(s): Dan Geer
10:30am | IU Auditorium

Lunch

Breakout session 1

You’re worth it: Putting health before work

View more about You’re worth it: Putting health before work
It’s one thing to work hard. It’s another thing to work ourselves to the point that it’s unhealthy. Far too often in the cyberinfrastructure community we focus on the stressful tasks in front of us and not enough on our own health. In this session, Craig Stewart shares his experiences as a person recently diagnosed with colon cancer. The goal of this talk is to consider steps each one of us can take as part of our annual healthcare cycle to detect health problems early and help assure a better long-term outcome.
Presenter(s): Craig Stewart

Secure destruction: Safely decommissioning IU electronics

View more about Secure destruction: Safely decommissioning IU electronics
Want to ensure the security of your data at device end of life? IU Surplus Stores has a service for ensuring the complete destruction of your hard drives. Surplus Store managers will discuss services that make decommissioning IU-owned electronics fast, at low or no cost, and secure for all departments. Attendees will also learn how to turn unneeded equipment into cash for their departments and find items that meet their needs at IU Surplus.
Presenter(s): Noma Maier

Kaltura: The latest in lecture capture

View more about Kaltura: The latest in lecture capture
Adding video to your courses is easier than ever with Kaltura, a cloud-based video management system for storing, publishing, and streaming media. With Canvas integration, it allows faculty to easily create, upload, and share multimedia content. Kaltura replaces Echo360, IU’s previous lecture capture service. In this session, you’ll hear about its features and functions, learn about the new hardware devices for larger lecture rooms, and see how faculty are already using Kaltura in the classroom
Presenter(s): Nate Pairitz

Automating accessibility testing

View more about Automating accessibility testing
Web accessibility is vital for ensuring equal opportunity to all web users. But ensuring that web pages are compliant with accessibility standards can be time consuming. Automating the testing process can enable teams to catch errors much earlier in their development, helping to prevent corrections and rewrites down the road. This presentation will discuss several tools and techniques that have been successfully used by the Enterprise Systems Integration team to ensure a high level of compliance with established standards in our applications. We’ll introduce Pa11y and Chrome’s Accessibility Developer Tools and show how you can start using them to test your own applications.
Presenter(s): Jeff Largent

Better than the real thing: Reality Labs at IU

View more about Better than the real thing: Reality Labs at IU
Over the past 20 years, IU has provided state-of-the-art virtual reality (VR) facilities and solutions for its community. Recent advances in VR have expanded both capabilities and access, fueling an exciting new initiative called Reality Labs. These are existing classrooms that have been transformed into spaces where students and faculty use VR to immerse themselves in the educational experience. In this session, you’ll learn how the Advanced Visualization Lab, Learning Space Design, and Student Technology Computing teams partnered on this effort to provide VR to a wider audience and what plans are in store for Reality Labs.
Presenter(s): Michael Boyles, Julie Johnston, Eric Wernert, Matt Decker

Negotiation skills for our digital world

View more about Negotiation skills for our digital world
We negotiate every day—with managers, co-workers, contractors, stakeholders, and the public. As technology globalizes communication, historically face-to-face processes have had to adapt to digital contexts. Practitioners need new skills for negotiating or mediating via email, arbitrating through an online jury, or designing a system that quickly resolves disputes involving people on the other side of the globe. Learn how 1IUIT professionals, who often hold virtual meetings, master the unique challenges of negotiation in the digital space.
Presenter(s): Lisa Blomgren Amsler, IU Women in IT

Big decisions: The software and services selection process at IU

View more about Big decisions: The software and services selection process at IU
When choosing new software and technological services, it’s critical that IT Professionals and university administrators collaborate to assure timely access for users while maintaining good stewardship of university resources. Fulfilling this dual mandate can be challenging, and because of this, there have been changes in the process for the selection and acquisition of software and services. This session will feature a panel discussion that walks through the new process, highlighting the key role of local IT Professionals.
Presenter(s): Cathy O'Bryan, Jim Kippenbrock

The legal and ethical challenges of automation

View more about The legal and ethical challenges of automation
Panel discussion
Presenter(s): Dan Geer, Susan Ramsey, Phil Salkie, Craig Jackson
Cybersecurity Summit

Breakout session 2

Railroads, interstates, and the Internet: How economic, social, and political forces impact IT in the developing world

View more about Railroads, interstates, and the Internet: How economic, social, and political forces impact IT in the developing world
Conventional wisdom assumes that advancements in information and communications technology should make it possible for a lesser developed country to bypass investments in roads, highways, and landlines. But recent initiatives by Google, Tesla, and others have failed to achieve the goal of bringing ubiquitous Internet access to the developing world. Why? This talk will explore how moving goods, people, and information are intrinsically connected, and how technology alone cannot revolutionize the economics, politics, or culture of a country.
Presenter(s): Dan Calarco

Data tools: A Denodo live demo

View more about Data tools: A Denodo live demo
Are you interested in Denodo but not sure how to make the most of it? Here’s your chance to learn. We’ll demo a variety of features, including how to search for data with Denodo Self-Service, how to pull data from Box, how to publish your data as an API, and much more.
Presenter(s): Colin Roy-Ehri, Joel Rettinger, Justin Kahrs

Value stream mapping: A tool for your productivity arsenal

View more about Value stream mapping: A tool for your productivity arsenal
This session will define Value Stream Mapping and how Clinical Affairs IT Services (CAITS) applied it to increase productivity and engagement. In this session, we’ll walk through the exercises used by the CAITS team and the high-level steps they applied, as well as the key concepts of waste, value, and how the two are related. Finally, we will discuss the real-world changes CAITS is making as a result of these practices.
Presenter(s): Tanya Clark, Kevin Cusimano, Lisa Schunk

Safeguarding systems, software, and networks using CIS Secure Suite

View more about Safeguarding systems, software, and networks using CIS Secure Suite
Did you know that IU subscribes to the Center for Internet Security (CIS) SecureSuite program? Formerly known as CIS Benchmarks, CIS Secure Suite provides a number of resources designed to improve security like configuration benchmarks, automated configuration assessment tools, security metrics, and more. In this session, you’ll learn more about CIS SecureSuite and how you can make the most of this valuable resource.
Presenter(s): Gary Browning

No more stale web content

View more about No more stale web content
Keeping web content fresh, accurate, and accessibility compliant is a must, but with our busy schedules, it’s not always an easy task to stay on top of. That’s why the Web Services Team at IU Kokomo began implementing an annual review process to increase customer engagement. They developed a process in which each subsite receives an annual checkup, including content updates, broken link repair, and accessibility review. This presentation provides the details of the overall initiative as well as the breakdown of a sample client visit.
Presenter(s): Johnathan Grant

Seeing in 3D: Creating photogrammetry with high performance computing

View more about Seeing in 3D: Creating photogrammetry with high performance computing
Photogrammetry, the technique used to build 3D models, is being used by IU researchers in fields such as art history, geology, and others. In the past, stitching together thousands of photos for these models could take weeks. But by leveraging the power of high performance computing systems like Karst and Karst Desktop, runtimes can dramatically decrease. This session will detail the workflow users need to perform photogrammetry.
Presenter(s): Tassie Gniady, Guangchen Ruan, Esen Tuna

Change, change, change: Rolling out a new IT service

View more about Change, change, change: Rolling out a new IT service
Change is never easy. But in order to ensure the world-class level of services offered at IU, it is essential. In this panel discussion, we’ll discuss best practices for communicating upcoming service changes, resources that are available to help smooth the process, and share our own success stories.
Presenter(s): Noma Maier

Ransomware in high-risk environments

View more about Ransomware in high-risk environments
In the past three years, the number of ransomware attacks in the United States has grown exponentially. While ransomware infections in personal computers can be mitigated with backup processes, automated restore points, or reinstalls of operating systems, the impact of ransomware on corporate environments—especially those without risk mitigation or disaster recovery processes in place—can be disastrous. This is especially true for high-risk environments such as medical, utility, or aviation industries in which public health and welfare can be at stake. This session examines the most recent cases of ransomware attacks in these industries, data recovery mechanisms put in place, and looks the inner workings of ransomware code.
Presenter(s): Sonja Streuber
Cybersecurity Summit

Biometrics: With great data comes great responsibility (for privacy impact assessments)

View more about Biometrics: With great data comes great responsibility (for privacy impact assessments)
Passwords are so 2012. The newest trend in cybersecurity is biometric identification: using unique human attributes to authenticate identity. The facial recognition, retinal scanners, palm-print and finger-print innovations that, just years ago were a staple of science fiction, have now become the latest features for mobile device authentication and the authentication of one's credit card. Biometric technology is widely hailed as the gold standard of user authentication, but it still presents major privacy risks. Biometric data, once digitized, is like any other type of data, and therefore susceptible to unauthorized acquisition or duplication. This session will explore how companies and researchers are using biometric identification to enhance cybersecurity protocol, while also weighing the benefits and risks.
Presenter(s): Zachary Heck
Cybersecurity Summit

Breakout session 3

Common ground: IT Professional affinity groups

View more about Common ground: IT Professional affinity groups
Within the IT Professional community, affinity groups are used to bring together those who share common interests. Group members share information, discuss topics, and foster support with the help of volunteer moderators who guide conversations and organize events for the group. In this session, you’ll learn about the current groups and how to join, as well as present ideas for new groups.
Presenter(s): Nitocris Perez

Leveraging Canvas to boost student success

View more about Leveraging Canvas to boost student success
How can faculty use Canvas data to increase student success and retention? As part of a Next.IU pilot, faculty can now access raw Canvas data via the Unizin Data Warehouse. The Unizin consortium also offers access to the Barnes & Noble Education (BNED) LoudSight platform, which enables users to capture and analyze a variety of demographic, performance, and participation data points through predictive analytics. In this session, presenters will discuss the availability of the BNED LoudSight platform and share the data models and reports that are included in this effort.
Presenter(s): Michele Kelmer, Stacy Morrone, Serdar Abaci

A special patient: Supporting CAITS

View more about A special patient: Supporting CAITS
This panel discussion explores the unique experiences of supporting Clinical Affairs IT Services (CAITS). Panelists from both HelpNet and CAITS will examine the particular needs of CAITS clients, the challenges of supporting IT in a clinical environment, and how such special circumstances are addressed.
Presenter(s): Teresa Velasquez, Matt Zink

Get the most out of Sharepoint Online and K2 Appit environments

View more about Get the most out of Sharepoint Online and K2 Appit environments
Over the past year, IU has migrated several hundred SharePoint sites from an on-premises environment to SharePoint Online. This also meant a change from Nintex workflow to K2 Appit, a cloud-based service that integrates with SharePoint Online. Appit provides developers with all the tools they need to rapidly build SharePoint and Office365 business process apps with workflow, forms, and data integration. This session reviews the Sharepoint Online and Appit environments and provides a demo of how to create SmartObjects and workflows.
Presenter(s): Manjit Trehan

Building a workplace community

View more about Building a workplace community
Each of us has an important story to tell. In this session, we will explore our strong, diverse higher-education community. We’ll examine our responsibility to create a workplace that values employees’ contributions, ideas, and successes, and offers opportunities for professional growth. Research has shown that employees working in an inclusive environment are more engaged and demonstrate higher advocacy for their organization. We will also discuss the potential impact of microaggressions, share personal perspectives, and talk about ways to ensure inclusion in thought and practice.
Presenter(s): Jill Scott, Deb Allmayer, the UITS HR team

SafeIT Taskforce, one year in: Reflections and lessons learned

View more about SafeIT Taskforce, one year in: Reflections and lessons learned
In May 2016, VP Wheeler chartered the SafeIT taskforce with three specific charges: 1) Implement two-factor authentication for faculty and staff logins; 2) Roll out digital certificates for executives and mass mailings; and 3) Begin an internal phishing program. Since then, the taskforce has been given additional tasks that will work toward strengthening the security of IU students, staff, and resources. In this session, a panel of taskforce members will reflect on their successes and challenges and share their thoughts on future security measures.
Presenter(s): Daniel Calarco, Daphne Siefert-Herron, Andy Korty, Jacob Farmer, Cathy O'Bryan

Security in the system engineering process

View more about Security in the system engineering process
It is well-known that the cost of fixing a software bug rises exponentially with the phase in which it is detected.  Despite this fact, virtually the entire body of literature on information security focuses on the final phase: production. Most systems engineering teams consider security a hurdle that must be overcome after the development process, rather than an integral part of it.  Few development process descriptions say a word about security review in any phase; those that do frequently consider security a part of testing.  There are many opportunities for positive ROI in every phase of the development process and beyond.
Presenter(s): Justin Stimson
Cybersecurity Summit

Information Security Principles

View more about Information Security Principles
Cybersecurity’s need for foundational principles has long been a gap in its intellectual foundation, and this gap will prove debilitating in a future of exploding complexity and rapid innovation. In this talk, we will introduce the Information Security Practice Principles, provide an overview of their usage, and workshop how to apply the Principles to technical, policy, and managerial scenarios that may arise in future cybersecurity decision-making.
Presenter(s): Craig Jackson, Susan Sons, Scott Russell
Cybersecurity Summit

In case of emergency: An incident response exercise

View more about In case of emergency: An incident response exercise
It's 3am and you were just pinged by IU Data Center Operations: Core services on the IU Network are under attack and some are starting to fail. What does IU do? What do you do? This exercise will split participants into small groups (incident response teams). Each team will be presented with scenarios and must decide what steps to take based on available information and tools. Teams will be given an opportunity to present their solution and receive feedback.
Presenter(s): Tim Goth

Breakout session 4

Results of the 2016 UITS Learning Technologies Survey

View more about Results of the 2016 UITS Learning Technologies Survey
Similar to the UITS annual satisfaction survey, Learning Technologies conducted a university-wide survey in fall 2016 to gather more specific user feedback on awareness and usage of teaching, learning, and collaboration technologies provided by UITS. A random sample of IU students, faculty, and staff received the online survey. We will present the results of the survey by user type (student, faculty, and staff) and by specific Learning Technologies service area (e.g., Collaboration Technologies, IT Training, etc.). We will also release an online Tableau report for future access to the results.
Presenter(s): Serdar Abaci, Stacy Morrone

Compose and publish your eText with Pressbooks

View more about Compose and publish your eText with Pressbooks
Pressbooks is a cloud-based tool offered through the Unizin consortium that enables faculty, staff, and students to publish a text in multiple digital formats. For example, faculty can author eTexts for courses or facilitate the creation of a book by their students. Staff can create handbooks or online job aids. In this session, we will demonstrate Pressbooks, share how a few faculty members at IU are using it, and brainstorm ways to expand use in the future.
Presenter(s): Michele Kelmer

Docker containers and deep learning tools on IU supercomputers

View more about Docker containers and deep learning tools on IU supercomputers
Many deep learning tools like TensorFlow require the latest operating systems—but supercomputers often run the same major version of an operating system for 3-4 years. Fortunately, UITS Research Technologies has added the ability to run Docker containers on the Big Red II and Karst supercomputers with a tool called Singularity. With Singularity, deep learning tools can be enabled and supported. Learn how to run any flavor of Linux on the supercomputers by using containers.
Presenter(s): Abhinav Thota

Empowering students through outreach and training

View more about Empowering students through outreach and training
“I didn’t know that was available!” The UITS office at IUPUC used to hear this phrase a lot. In an attempt to educate and empower their students, they developed orientation sessions, outreach opportunities, and trainings to increase awareness of all the resources IT at IU has to offer. Students are now informed from Day One, and instead of saying, “What?!” they want to know how. This discussion looks at how UITS staff at the Columbus campus have refined their process, how it has grown, and provides an overview of the topics they cover.
Presenter(s): Brian Trivett, Brandi Rund, Samantha Skirvin, AJ Amini

Resource scheduling with Ad Astra

View more about Resource scheduling with Ad Astra
Ad Astra is a customizable enterprise software system that can help you effectively manage your department’s classrooms, meeting rooms, and equipment. It has a variety of innovative uses, too, like scheduling volunteers and vehicles. With robust reporting capabilities, workflows, and limited Outlook integration, all departments can benefit from this centralized scheduling system.
Presenter(s): Michelle Bright

Studying human interaction in the online era

View more about Studying human interaction in the online era
Communication trends are shifting from face-to-face interactions to electronic dialogue. This is especially evident in the conversations that occur on social media, and as a result, researchers are now studying the comment sections of sites like Facebook and YouTube. This data, however, is often in flux and difficult to capture. Traditional data collection, handling, and coding methods quickly become tedious and overwhelming, prohibiting research in this medium. We’ll discuss new techniques that allow researchers to easily download data from a Facebook comment thread into Excel and manipulate it directly, eliminating the need for antiquated methods.
Presenter(s): Angela Glosser, Johnathan Grant

Everyday security: Protecting yourself and IU in the modern age

View more about Everyday security: Protecting yourself and IU in the modern age
The game has changed. Will you be an active player or a pawn for others to leverage? In today's complex cybersecurity environment, vulnerabilities can turn into exploits in a matter of minutes. How can you stay defensive, minimize risk posed by your actions, and remain ahead of these threats? This presentation will discuss a variety of technical and non-technical steps you can take to secure your devices, your information, and yourself.
Presenter(s): Kim Milford, Tim Goth

Education vendors and data security

View more about Education vendors and data security
This session provides an overview of how settlement agreements from data breaches can be used to tighten procedures and protect data. The presenters will discuss the steps they’ve taken, including performing risk analysis, improving infrastructure, designing a breach response and notification process, implementing security and privacy safeguards around the transmission of data, and more. They will also discuss lessons learned and continued challenges.
Presenter(s): Michelle Gough, Eric Eliason
Cybersecurity Summit

Staff Appreciation

Breakfast

Breakout session 5

Improving athletic performance through data and analytics

View more about Improving athletic performance through data and analytics
For an athlete, performance evaluation is essential to development. The IU Athletics Department is experimenting with cutting-edge methods and technologies, such as IBM Watson Analytics, to improve athletic training and performance. IBM Watson Analytics is a publicly available SaaS that uses dynamic visualizations to help users make data-driven decisions—without any formal training in programming or statistics. With a powerful, natural-language interface, it enables users to discover the meaning in their data. This presentation will give an overview of these technologies and approaches, as well as highlight real-world implementation by IU and U.S. National Olympic Dive Team Coach Drew Johansen.
Presenter(s): Dan FitzSimmons, Julie England

What's new in Docker?

View more about What's new in Docker?
Docker users, don’t miss this review of the newest features added to Docker over the last year, which can help application owners run them in a more reproducible, secure way.
Presenter(s): James Bennett

Section 508 refresh: Changing web governance to reflect legal concerns

View more about Section 508 refresh: Changing web governance to reflect legal concerns
Section 508 is an amendment to the United States Workforce Rehabilitation Act of 1973. It was enacted to eliminate barriers in IT for people with disabilities, and to encourage development of technologies that will help achieve these goals. In January 2018, Section 508 will incorporate the Web Content Accessibility Guidelines (WCAG) 2.0 AA as part of a final rule. Because of these changes, institutions will face increased liability for inaccessible web content, and many institutions are considering changes to web governance to ensure full compliance. In this session, we’ll hear stories of teams who are rising to this challenge and share advice for what your staff can do to be prepared.
Presenter(s): Johnathan Grant

SWAMP: Software assurance at IU

View more about SWAMP: Software assurance at IU
How secure is your code? Have you inadvertently unleashed the next Heartbleed or WannaCry? The Software Assurance Marketplace (SWAMP) is a free, open-source service that provides access to a growing array of 30 software analysis tools. It includes a curated library of open-source applications with known vulnerabilities to help tool developers improve the effectiveness of their static and dynamic analysis tools. GitHub repository integration is available to make pulling in your code even easier. In this session, we will provide a demonstration of SWAMP’s capabilities, set up beginner accounts, review common coding errors, and get you on your way to analyzing your code base.
Presenter(s): Sarah Schmiechen, Rob Quick, Kyle Gross

Expanding the future of training for IT Professionals

View more about Expanding the future of training for IT Professionals
IU Expand is an e-learning service that delivers professional development and continuing education coursework to the IU community. Expand offers a course catalog with non-credit, continuing education credit, and certificate-based courses, and you can set up your own courses for staff training and compliance requirements. In this session, you’ll learn how to get started in Expand, how to host your own Canvas courses in the platform, and brainstorm ideas for using this for your department.
Presenter(s): Nitocris Perez

Achieving 1IUIT through communication and collaboration

View more about Achieving 1IUIT through communication and collaboration
IU does a fantastic job of communicating and collaborating across the IT enterprise, especially between UITS, the schools and departments, and the regional campuses. But the nature of our IT structure and our sheer size can all pose challenges to the 1IUIT ideals. If we can bridge the gap and further break down often-hidden political divides and other barriers, we can solve a lot of problems. Join the discussion on how to improve involvement and collaboration across the wide array of technology solutions, platforms, and services at IU.
Presenter(s): Chris England

A look at the tech behind MDPI

View more about A look at the tech behind MDPI
The Media Digitization and Preservation Initiative (MDPI) creates many IT challenges to manage and store the thousands of digital audio and video files created from this massive effort. Nearly 30 terabytes of data will be created each day of operations when film scanning is in full swing. The solution requires close collaboration across Library IT, four UITS units, Memnon Archiving Services, and MDPI operations staff. Take a look behind the curtain at the process and technology used to scan and preserve media before securely storing files in the Avalon Media System digital library environment.
Presenter(s): Dennis Cromwell, Jon Dunn, Brian Wheeler

Speed networking with IU Women in IT

View more about Speed networking with IU Women in IT
Come celebrate the 5th anniversary of IU Women in IT and network with your 1IUIT colleagues from across the state. All are welcome to attend. A popular staple of the Statewide IT conference, this event will feature guided activities and short rounds of introductions in small-group formats, so don’t forget your business cards. Celebratory refreshments will also be served.
Presenter(s):

Breakout session 6

Playing for keeps: Game-based learning and higher ed

View more about Playing for keeps: Game-based learning and higher ed
With terms like “gamification” and “game-based learning” appearing in books, articles, and on college campuses, the use of games and game mechanics in education has become a much-discussed topic. But what do these terms really mean, and, most importantly, how can they improve education? This session discusses the terms often used, different genres of games, and how playing games in the classroom can be used to encourage learning and engagement. We will take a look at the kinds of games being used by IU faculty and how you can begin integrating games into teaching and learning both in traditional classrooms and online environments.
Presenter(s): Daniel W. Janicki, Gretchen DeHart, Justin Carroll

Rivet: A design system for web application development in UITS

View more about Rivet: A design system for web application development in UITS
How do we design great experiences for users across UITS applications? Creating consistent front end code and documenting UX design best practices is a great place to start! This talk will introduce Rivet, a design system that is being created by a group of UX designers and developers in UITS.
Presenter(s): Levi McGranahan

Config Manager: I’m in—now what?

View more about Config Manager: I’m in—now what?
Now that you’ve enrolled your devices in Config Manager, how can you best leverage its features? Join HELPnet’s Brandon Rinkenberger as he provides an overview of reporting options, application and packaging deployments, configuration items and baselines, as well as other options for getting the most out of Config Manager.
Presenter(s): Matt Zink, Brandon Rinkenberger

IT-28: Updates to the peer review process

View more about IT-28: Updates to the peer review process
You’re invited to learn about the upcoming IT-28 Peer Review process. During this second round, we are focused on operational security. Helping departments implement better practices around Risk Assessment, Access Control and Change Management. We’ve also developed an online tool to manage your IT-28 server inventories to help you identify and mitigate risk. We have also improved tracking and communications to provide clarity in to the IT-28 Peer Review process. As stakeholders in the security of IU’s data, we’d like to share our progress with you and empower you, the IU community, with the knowledge and best practices to protect yourself from data exposure and compromise.
Presenter(s): Ian Washburn, Charlie Escue

Keeping data secure in Box

View more about Keeping data secure in Box
Box is a cloud tool for storage and collaboration widely used by the IU community. It is essential that users know the steps to take to ensure the security of their accounts and data that is shared or stored. This session will review settings, permissions, user roles, what can and cannot be kept in Box, and other tips to keep data safe.
Presenter(s): Justin Glass

Karst Desktop: What's in store for the future

View more about Karst Desktop: What's in store for the future
Karst Desktop was launched as a beta service during the 2015 Statewide IT conference. It now has more than 700 users with over 150 concurrently using at any time. Karst Desktop is a gateway to IU's supercomputers and provides a desktop interface instead of a command line. It is great for graphical applications and point-and-click actions, and it also lets users disconnect and reconnect to their running sessions. This talk will cover the future upgrades for Karst Desktop, including updates to the operating system and more ways for users to access the service.
Presenter(s): Abhinav Thota

Think before you click: How IU is tackling some big phish

View more about Think before you click: How IU is tackling some big phish
Breaking down an automatic process—such as clicking on links in an email—is not easy. This session will highlight the strategies and results of “Think before you click,” the recent UITS anti-phishing educational campaign. Its goal is to disrupt automatic behaviors and build awareness of the real-world impact of phishing. We’ll talk about what works, what doesn’t, and what can be done to encourage all IU IT professionals to vigilantly practice anti-phishing techniques.
Presenter(s): Stacy Morrone, Jessica Samuel, Dan Calarco

Breakout session 7

Exploring Managed Print

View more about Exploring Managed Print
Want to help your unit become more secure and sustainable—and save money doing so? Join the Leveraged Services and IT Community Partnerships teams as they explore Managed Print with existing clients. Learn about options, features, implementation, and maintenance of the service as well as how it can save money, time, and the environment. You’ll also hear how adopters of this service publicized the change to their constituents using a publicity packet.
Presenter(s): Matt Zink

Bowel sounds, sweet and sour cauliflower, and Chumbawumba: Making sense of your search queries

View more about Bowel sounds, sweet and sour cauliflower, and Chumbawumba: Making sense of your search queries
If your website has a search engine, you’ve probably seen some pretty strange queries. And if you’re like us, you’ve also probably been overwhelmed by the sheer number. This kind of data can seem daunting. But data is also king—and content strategists, information architects, and writers rely on data to make their work better. In this session, you’ll hear how the User Experience Office translated an academic year’s worth of queries into a set of topics, categories, and notes. We’ll share the patterns found in this data, and we’ll discuss ideas for how to present information before users even ask for it.
Presenter(s): Madeline Grdina

Exploring new possibilities with Jetstream

View more about Exploring new possibilities with Jetstream
The Jetstream research system offers a fundamentally new approach to computational service delivery. It was designed to support the entire spectrum of scientific, engineering, and educational communities. Jetstream leverages emerging cloud technologies to provide capabilities that are simply not possible in traditional research computing. This session will highlight features such as interactive real-time computation, programmatic cyberinfrastructure for dynamic workflow, and more. The Jetstream Trial Allocation mechanism, which gives potential users a limited trial access to Jetstream, will also be discussed.
Presenter(s): Stephen Bird, George Turner

Elevate your technical skills with the EdCert program

View more about Elevate your technical skills with the EdCert program
Are you interested in growing your technical skills and credentials? The Education Certification (EdCert) program aims to deliver advanced technical training to IT Professionals and technical staff. This session provides an overview of the program, including course offerings and how to register. Past participants will also share their success stories.
Presenter(s): Teresa Velasquez

Compass and Nexus: Exploring new ways of tracking student engagement

View more about Compass and Nexus: Exploring new ways of tracking student engagement
With the help of Crossroads Education, IU recently began a pilot of digital learning commons and analytics and tracking management software. Through this pilot, the Compass and Nexus platforms were created. These platforms combine data into consumable analytics and showcase a rich collision of technology, online learning, and physical space to improve student success. In this session, presenters will share the agility of the platform and discuss how it can be leveraged for numerous service offerings across the university.
Presenter(s): Kevin Berkopes, Matt Gunkel

Accessibility: Small steps toward great improvement

View more about Accessibility: Small steps toward great improvement
You don't have to be an Accessibility Expert to improve access for everyone. In this session, we'll look at frequent accessibility issues and what can be done to reduce their frequency. While this session is most beneficial to content providers, UI/UX/designers, developers, and managers, we'll explore simple steps that everyone can take to improve accessibility. A little knowledge can help prevent the most common issues encountered in IU websites and applications.
Presenter(s): Greg Hanek

Lunch