The Data Integration and Analytics (DIA) team is about all things data. We are responsible for the identification, evaluation, and integration of all business data at UNC Kenan-Flagler. Our mission is to provide faculty and staff a single stop for insightful data, reporting and analytics to support their business needs.
Enterprise Data and Integration
Our team has built and are managing an enterprise data warehouse (EDW). This is a central data repository housing historical and current data in one system that can be used for reporting, data analytics, and business intelligence (BI). Using our ETL tool, we pull, cleanse, consolidate and store data from over 22 sources. Our EDW is the foundation upon which operational reporting, data visualization, AI and BI can now sit.
Data Visualization
We provide consultation and development support for your data visualization needs. Data visualization is the term used to describe all of the ways people transform data into visual representations. Patterns, trends and correlations that might go undetected in text-based data can be exposed and recognized easier with data visualization software.Tableau is the visualization tool we have deployed for use at Kenan-Flagler. With interactive visualization, faculty and staff will be able to use Tableau to create dashboards and infographics. If you have Data Visualization needs or would like to explore the possibilities on new and advanced ways to visualize and dashboard your business data, please reach out to our team.
Open access to Tableau is not available at this time, but if you would like to request access, please follow the link below:
How To Request Access to Tableau DashboardsData Analytics and Business Intelligence (BI)
Business Intelligence is a set of methodologies, processes, architectures and technologies that transform raw data into meaningful and useful information used to enable more effective strategic, tactical and operational insights and decision-making. By helping our staff apply BI to their dataset, our team hopes to offer new levels of insight around that dataset leading our programs in better decision-making. Stay tuned to exciting services soon to be released in this area.
Enterprise CRM Management
The DIA team, in collaboration with our program partners, is responsible for managing some of our core enterprise level CRMs. We assure production readiness, security and accessibility to these applications. We are happy to consult with key stakeholders of these systems to assist with dashboards, reporting, or other custom functionality your team. Examples of these tools are Salesforce, Slate, and 12Twenty.
Our Business Systems and Development team provides custom software development to support school operations.
Custom Business Operational Systems
In support of a complex organization with unique business practices, we have developed several online business processes and workflows that help to improve workflow and communications across the various business units. Examples of this are the MyKE:Admin modules for our registration staff, an advising system, financial tracking systems, and soon to come employee onboarding.
System Integration
Through the development and use of ETL tools and data integration services, we offer enterprise system integration to help with systems such as Connect Carolina, Canvas and 2U.
Web Services
Offering in-house web development for operational systems, we specialize in online business processes and custom responsive design.
Personal Websites
UNC-Chapel Hill offers the ability for students, staff, and faculty to create and host their own personalized websites at
https://tarheels.live/.This is a web publishing service that allows anyone with a main campus Onyen account to create a website at no charge. WordPress is the platform that main campus has selected for creating sites quickly and customizing the look and feel. Support is provided by ITS at
https://digitalservices.unc.edu/selfservice/.
Operational Reporting
Operational reporting is intended to support the day-to-day activities in the traditional reporting formats. The DIA team will to continue offering support of existing operational reports well as provide consultative services and guidance to stakeholders who have new or modified reporting needs.
The UNC Research Computing group offers a variety of resources that UNC Kenan-Flagler faculty and staff can leverage. Research Computing for UNC-Chapel Hill is developed, supported and maintained by the ITS Research Computing group.
UNC Research ComputingGetting Access to Research Computing clusters
Wireless projection is available in our upgraded classrooms and is provided through AirMedia. This allows easy presentation wirelessly using laptops and mobile devices. No additional software is needed if you are using a laptop, but mobile devices must download an app. Projecting is as simple as selecting AirMedia on the classroom touch panel and typing the displayed IP address into your web browser. If you have any questions, issues, or would like to request a demo please contact the IT Academic Technologies team by email or phone
UNC-Chapel Hill offers the ability for students, staff, and faculty to create and host their own personalized websites at
http://tarheels.live.
This is a
self-service web publishing platform that allows anyone with a main campus Onyen account to create a website at no cost. WordPress is the platform that main campus has selected, it allows sites to be created quickly, has advanced content management, and allows for customization of the look and feel.
Wordpress is best for publicly accessible webpages.
If you are a faculty member who needs to share a lot of documents with your students, your Canvas course website is best location for that.
Getting Started
More information on how to
get started with campus-hosted WordPress websites is available if needed. Review the TarHeels.live
Terms of Service before getting started.
Need more assistance with editing a WordPress site? Tutorials are available at
WordPress.org. The Undergraduate Library also has guidance for
editing a TarHeels.live website.
Information Security is essential to prevent those with malicious intent from accessing data. Practices may include: Changing your online account passwords, avoiding unsolicited emails, locking or logging off your PC as you walk away, all of these things help prevent data loss from anyone who might wish to compromise accounts.
INSTRUCTIONS
Do not store any personally identifiable information on your computer
Do not store any personally identifiable information (such as Social Security Number, date of birth, Driver’s License Number, credit card information and home addresses) on your computer or removable media (such as disks, tapes, USB drives)
Create Complex Passwords
- at least 8 characters
- at least one letter
- at least one digit
- at least one special character, such as !, #, $, %, ^, etc. Do not use @, /, <, or ?
- cannot contain all or part of your username or be one of your previous five passwords
Regularly Change Passwords
- Change on a Monday so you have all week to remember
- Change all passwords at the same time
- Use different passwords for each account
- Do not write down passwords
- Do not share passwords
- Shred papers and destroy CD/DVDs that contain confidential information (use cross-cut shredder)
- Delete or move information off-line that is no longer needed
- Old computers should have data completely erased before being discarded.
Password protect computers and use password protected screen savers
All computers should have login passwords
- Lock your computer when you leave your office (on a PC, press Ctrl+Alt+Delete and select “Lock Computer” on a Mac)
- Set your computer to automatically lock after 15 minutes of Inactivity
- Set automatic updates for your computer
- Your computer should be set with Windows/Mac OS automatic updates option enabled
- Operating system firewalls should be enabled
Anti-virus and anti-spyware software
- Anti-virus and anti-spyware software on your computer should be configured to update definitions at least once per day
- Computers should be scanned daily for new viruses/spyware missed by active protection
- Viruses/spyware are commonly distributed by websites, screen savers, game software, and other “free” programs
Review our information regarding spyware and viruses or
anti-virus software for more information.
Do not click links in unsolicited e-mails
Links in unsolicited emails can appear safe but can actually link to websites with malicious content. If you don’t recognize the sender or are not expecting the email the best action is to not click on any links at all. If you must click on a link:
- Type the URL address in the browser
- Follow a link from a trusted web page
- Use a previous bookmark
Report phishing or spam emails to Kenan-Flagler IT
Outlook has a Report button which allows you to identify phishing or spam emails, use this instead of emailing the Service Desk unless you happen to have acted upon one:
- In Outlook
- Windows – Report button appears on right side of ribbon.
- macOS – Report button appears in the middle of the ribbon.
- Outlook Webmail – Report button appears on the left side of the ribbon.
- When reporting use “Phishing” or “Junk” options.
Tips for securing laptops & other mobile devices
- Store all passwords, account names, access codes, login instructions, and authentication tools separately from laptops (not in the pockets of the carrying case)
- Lock up laptops when not attended (cable lock during the day, in a locked drawer or cabinet when you leave for the day)
- Keep laptops out of sight when temporarily stored in a car, hotel room, or home
- When traveling always keep laptop in your possession
- Record make/model & serial number of your device
- If a device is stolen or missing contact the IT Service Desk immediately