Category: Information Technology
-
Posted on March 7, 2011
Research software licenses through CALS
CALS IT is currently working on a project (with Engineering, Grad School and DoIT) to run a central service for some research software titles, aiming […]
-
Posted on March 2, 2011
What do do with outdated software CDs
From DoIT Tech News… What to do with that old software? When spring comes, you can hang those useless, outdated software CDs in the garden […]
-
Posted on January 18, 2011
Research computing at UW‐Madison ‐‐ A brainstorming session
Friday January 28th, 2011, 9:00‐11:50 Ebling Symposium Center Microbial Sciences Building, sponsored by the Information Technology Cmte (shared governance), the Office of the CIO, and […]
-
Posted on January 3, 2011
Need a Data Management Plan for your NSF proposal?
NSF proposals submitted or due on or after January 18, 2011, must include a supplementary document of no more than two pages labeled “Data Management […]
-
Posted on April 5, 2010
Advice from DoIT: Don’t click that tempting link. Leave your birthday off Facebook
From DoIT’s Tech News: DON’T CLICK ON THAT TEMPTING LINK We all receive seemingly legitimate emails from scammers posing as our financial institutions, our university […]
-
Posted on December 10, 2009
Request a web link to UW Foundaton to help your donors give online
Request a URL so that your unit may accept online gifts.
-
Posted on October 28, 2009
Weather reports a click away
Working for a Wisconsin university necessitates quick and easy access to weather reports. Recently, the weather module in My UW-Madison was replaced with a new […]
-
Posted on October 26, 2009
CALS communicators will network about social networking on Tuesday, Oct. 27
A meeting of CALS communicators will take place tomorrow, Oct. 27, from 9—10:30 a.m. in room 1360 of the Genetics/Biotechnology Center building (425 Henry Mall). […]
-
Posted on October 14, 2009
Data breaches must be reported
ALL DATA BREACHES NEED TO BE REPORTED Security is taken seriously on campus—personal safety as well as protecting your sensitive data. If your personal safety […]