Our Business Systems and Development team provides custom software development to support school operations.
Custom Business Operational Systems
In support of a complex organization with unique business practices, we have developed several online business processes and workflows that help to improve workflow and communications across the various business units. Examples of this are the MyKE:Admin modules for our registration staff, an advising system, financial tracking systems, and soon to come employee onboarding.
System Integration
Through the development and use of ETL tools and data integration services, we offer enterprise system integration to help with systems such as Connect Carolina, Canvas and 2U.
Web Services
Offering in-house web development for operational systems, we specialize in online business processes and custom responsive design.
Personal Websites
UNC-Chapel Hill offers the ability for students, staff, and faculty to create and host their own personalized websites at
https://tarheels.live/.This is a web publishing service that allows anyone with a main campus Onyen account to create a website at no charge. WordPress is the platform that main campus has selected for creating sites quickly and customizing the look and feel. Support is provided by ITS at
https://digitalservices.unc.edu/selfservice/.
Operational Reporting
Operational reporting is intended to support the day-to-day activities in the traditional reporting formats. The DIA team will to continue offering support of existing operational reports well as provide consultative services and guidance to stakeholders who have new or modified reporting needs.
The UNC Research Computing group offers a variety of resources that UNC Kenan-Flagler faculty and staff can leverage. Research Computing for UNC-Chapel Hill is developed, supported and maintained by the ITS Research Computing group.
UNC Research ComputingGetting Access to Research Computing clusters
Wireless projection is available in our upgraded classrooms and is provided through AirMedia. This allows easy presentation wirelessly using laptops and mobile devices. No additional software is needed if you are using a laptop, but mobile devices must download an app. Projecting is as simple as selecting AirMedia on the classroom touch panel and typing the displayed IP address into your web browser. If you have any questions, issues, or would like to request a demo please contact the IT Academic Technologies team by email or phone
UNC-Chapel Hill offers the ability for students, staff, and faculty to create and host their own personalized websites at
http://tarheels.live.
This is a
self-service web publishing platform that allows anyone with a main campus Onyen account to create a website at no cost. WordPress is the platform that main campus has selected, it allows sites to be created quickly, has advanced content management, and allows for customization of the look and feel.
Wordpress is best for publicly accessible webpages.
If you are a faculty member who needs to share a lot of documents with your students, your Canvas course website is best location for that.
Getting Started
More information on how to
get started with campus-hosted WordPress websites is available if needed. Review the TarHeels.live
Terms of Service before getting started.
Need more assistance with editing a WordPress site? Tutorials are available at
WordPress.org. The Undergraduate Library also has guidance for
editing a TarHeels.live website.
Information Security is essential to prevent those with malicious intent from accessing data. Practices may include: Changing your online account passwords, avoiding unsolicited emails, locking or logging off your PC as you walk away, all of these things help prevent data loss from anyone who might wish to compromise accounts.
INSTRUCTIONS
Do not store any personally identifiable information on your computer
Do not store any personally identifiable information (such as Social Security Number, date of birth, Driver’s License Number, credit card information and home addresses) on your computer or removable media (such as disks, tapes, USB drives)
Create Complex Passwords
- at least 8 characters
- at least one letter
- at least one digit
- at least one special character, such as !, #, $, %, ^, etc. Do not use @, /, <, or ?
- cannot contain all or part of your username or be one of your previous five passwords
Regularly Change Passwords
- Change on a Monday so you have all week to remember
- Change all passwords at the same time
- Use different passwords for each account
- Do not write down passwords
- Do not share passwords
- Shred papers and destroy CD/DVDs that contain confidential information (use cross-cut shredder)
- Delete or move information off-line that is no longer needed
- Old computers should have data completely erased before being discarded.
Password protect computers and use password protected screen savers
All computers should have login passwords
- Lock your computer when you leave your office (on a PC, press Ctrl+Alt+Delete and select “Lock Computer” on a Mac)
- Set your computer to automatically lock after 15 minutes of Inactivity
- Set automatic updates for your computer
- Your computer should be set with Windows/Mac OS automatic updates option enabled
- Operating system firewalls should be enabled
Anti-virus and anti-spyware software
- Anti-virus and anti-spyware software on your computer should be configured to update definitions at least once per day
- Computers should be scanned daily for new viruses/spyware missed by active protection
- Viruses/spyware are commonly distributed by websites, screen savers, game software, and other “free” programs
Review our information regarding spyware and viruses or
anti-virus software for more information.
Do not click links in unsolicited e-mails
Links in unsolicited emails can appear safe but can actually link to websites with malicious content. If you don’t recognize the sender or are not expecting the email the best action is to not click on any links at all. If you must click on a link:
- Type the URL address in the browser
- Follow a link from a trusted web page
- Use a previous bookmark
Report phishing or spam emails to Kenan-Flagler IT
Outlook has a Report button which allows you to identify phishing or spam emails, use this instead of emailing the Service Desk unless you happen to have acted upon one:
- In Outlook
- Windows – Report button appears on right side of ribbon.
- macOS – Report button appears in the middle of the ribbon.
- Outlook Webmail – Report button appears on the left side of the ribbon.
- When reporting use “Phishing” or “Junk” options.
Tips for securing laptops & other mobile devices
- Store all passwords, account names, access codes, login instructions, and authentication tools separately from laptops (not in the pockets of the carrying case)
- Lock up laptops when not attended (cable lock during the day, in a locked drawer or cabinet when you leave for the day)
- Keep laptops out of sight when temporarily stored in a car, hotel room, or home
- When traveling always keep laptop in your possession
- Record make/model & serial number of your device
- If a device is stolen or missing contact the IT Service Desk immediately