Schedule

Tuesday, July 18

-
  • Intermediate

    After building a robust technology stack that includes a data lake and uses AWS to capture learning data from Canvas and campus partners, our university is now developing a custom platform for academic advisors to access and visualize student information. This project supports our ability to promote student success by identifying at-risk students earlier than has ever been possible. This presentation outlines our technical architecture, campus partnerships, and ongoing efforts to apply Canvas Data and other learning—

  • Beginner

    UC IT leaders have joined with EDUCAUSE to commit to greater equity and inclusion in shaping the next generation of technology professionals and leaders. This conversation between UC’s Systemwide CIO and Vice Provost for Diversity and Engagement will help IT professionals understand why diverse and inclusive workplace environments are essential for more effective and creative teams of IT professionals. Participants will learn about real-life scenarios and the resources available to help create diverse and inclusive environments.  Participants will have opportunities—

  • Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We are undergoing a campus-wide initiative to develop new digital learning experience delivery modes and business model. We seek to deploy offerings across multiple platforms to allow for a portfolio of online offerings, from Free to Freemium to Paid. This ecosystem approach is desirable in order to facilitate multiple architectures best suited for particular programs and offerings.

    To achieve this goal, we have—

  • Intermediate

    Fostering digital Inclusion and Accessibility is an ethical and legal responsibility of all IT professionals. To assist with this goal, the Office of the President funded Siteimprove as an accessibility scanning tool and training resource across UC. While introducing this tool at our campus UCSF, we began leading a culture change and developed some recipes for accessibility success.

    A good set of recipes help when planning a large event. We started with an appetizer for an initial warm—

  • Beginner

    According to a recent survey conducted by a leading security firm, 76% of respondents experienced phishing attacks.  The threat from phishing attacks is real and causes data breaches, financial loss, and system compromises like ransomware.  This presentation will cover real-life phishing attacks observed at UC and the various motives of the phishers.  Attendees will see first-hand the methods used by attackers to lure potential victims into clicking links or responding with information that ultimately benefits the attackers. —

-
  • Beginner

    It has been a full year since this speaker presented on her documented harassment and retaliation experiences in IT and across multiple investigative entities at UC. This presentation focuses on addressing these questions: 

    1. How have IT and the University responded to date and are these responses meaningful?
    2. Is IT a measurably safer and more inclusive place for women now than before the articles (see below)?
    3. Have campus investigative offices modified their policies and processes?   
    4. Is zero tolerance—
  • Beginner

    For the Adobe Fellows program, faculty from a range of departments who teach courses in American Cultures—a universal undergraduate requirement with an emphasis on the ethnic diversity of sociopolitical and historical narratives within the United States—develop assignments in which students create projects using the Adobe CC suite of programs, including videos, podcasts, infographics, and Spark webpage presentations.

    The Adobe Fellows program was conceived to:

    • Enrich student learning by promoting innovative methods for engaging with and representing local—

  • Beginner

    Our IT workforce has increasingly diversified, in demographics as well as thought.  Therefore it is critical to adapt, ensuring that we create and foster inclusive environments, structured to maximize opportunities to share knowledge and collaborate.  Roles that were never previously categorized as IT, many of which live in Analytics departments or on Informatics teams, are now directly contributing more than ever to the larger IT strategy.  In order to allow these new players to breakdown silos and—

  • Securing Information, Assets and Systems
    SSMS - Room 1301/1302

    Beginner

    Do you approach change by hitting your users over the head with the same communications strategy or do you hit the nail on the head with targeted communication and outreach efforts? Let’s face it change is painful and inconvenient, especially when you’re competing with the distractions of a busy community. Beginning spring 2018 IT Security rolled out a set of initiatives to improve data, network, and system protection. We knew from experience that internal change was often—

  • Intermediate

    Faculty are increasingly using Canvas to enhance their face-to-face classes and this has led to a growing interest in online and hybrid courses, which is only further encouraged by our university’s Digital Learning Initiative. However, our department doesn’t have the resources to work directly with every interested faculty member. We needed to find a scalable solution that would allow for interested faculty to develop quality online and hybrid courses and digital course components without having to work—

  • Beginner

    Mentoring, either as a mentor or as a mentee, is all about ideas: learning about new ways of approaching problems and being open to new ideas and ways of thinking. Mentoring programs are one of the best ways to build sustainable IT workforce. 

    The WHPC Mentoring Program is a mostly online, robust mentoring program connecting women from around the world with mentorship and support that will help them to achieve their full potential as HPC professionals. This program provides—

  • Beginner

    Have you ever been involved in a conversation or interaction where someone says or does something that demonstrates a lack of respect or inclusion based on a personal attribute such as gender, race, ethnicity, age, etc. and everyone freezes, no one knows what to say or do?    This session will present some anonymous real life examples and allow participants to practice techniques and responses to non-inclusive behavior as a recipient or supporter/ally. Our presentation will arm participants with ready responses in common—

  • Beginner

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    EDUCAUSE recently asked higher ed CIOs to sign a statement that recognizes the value of diversity, equity, and inclusion in the workplace. A number of UC location CIOs signed, pledging to take concrete actions both in their own organizations and as part of the larger higher ed community to foster diverse and inclusive environments. Come hear from several of our own—

-
  • Beginner

    There is currently a lack of a shared definition among campus academic and administrative departments that provide teaching and learning services of what it means to be a ‘student’ at our UC campus.  Departments regularly adopt data feeds for directory and other campus services as the definition of a student; this leads to some students getting denied critical student services. The Student Definition initiative aims to create a standardized framework for campus, so that each department can—

  • Beginner

    Creating and delivering videos for the online masses is a daunting task. It often requires copious amounts of time, well-designed spaces, and expensive tools to implement and streamline their use in growing flipped classroom landscape. However, those who embrace flipped learning need to think like architects, not high-budget video producers. While it’s tempting to become enamored by the technology or space we wish we had, now more than ever, it has become clear that creating effective instructional—

  • Beginner

    Over the past decade an increasing number of students with hearing impairments have been identified on our campus who need real-time captioning of their classes. There are too few captioning providers in our local area to meet that need. We developed a system which provides captioning staff at remote locations an audio feed from the media system of any of our classrooms and allows them to share the text that they type with students in those rooms—

-
  • Beginner

    Think about your cube-mate or office-mate.  Do you know what motivates them to get up and come to work?  Do you know what keeps them up at night? What do they dream about changing on your campus and in your city?  

    Relationships drive us.  Stories power those relationships.  Engagement at work will thrive and grow when people know each other - not just their names, but their passions, hopes, and fears.  Learn how to have a—

-

-
  • Beginner

    How can user experience (UX)  techniques be applied to instructional technology services? We’ll describe a case study where we researched and analyzed the experience of instructors teaching large classes (i.e. those that impact the greatest number of students) to build a Journey Map, which in turn helped us identify opportunities to improve our suite of digital learning services. 

  • Securing Information, Assets and Systems
    Girvetz Hall - Room 2123

    Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    We'll share our experience with a top-right quadrant SIEM, including benefits, pitfalls, operation and support.

    • How to learn to use the SIEM
    • Best use of vendor resources
    • What we expected & what we got
    • Leveraging for a small team
    • Metrics vs Measurements/Actionable Numbers
    • Runbook-style procedures
    • Extending to the cloud
    • Useful dashboards/reports
    • What we would do differently

     

  • Intermediate

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    The Student Activity Hub (SAH) combines information about all graduate and undergraduate students into a single repository. Academic analysts, advisors, and faculty can access the curated data through supported reporting and visualization tools: Tableau and Cognos. 

    In the initial phase, the SAH is designed to make institutional and operational reporting easier by providing access to 15 years’ worth of student data—

  • Intermediate

    When UCLA HumTech converted a homegrown application to a serverless app, we had to rethink how we approached data security. While UCLA has a number of solutions to protect student data, most of these solutions assume that there's a server to run on. A serverless app requires rethinking how we accessed Shibboleth, queried the student record system, and protected resources.

    This talk will present our experience securing a serverless application. It is for developers, system administrators, and—

  • Intermediate

    This workshop will demonstrate how to use free open-source tools to set up a safe environment to explore a deliberately insecure web application to train yourself or other web-application developers on web-application security.

  • Intermediate

    There is currently an effort to increase the ranks of trans and gender-nonconforming workers in the technology industry nationwide. In the UC we are expanding and diversifying our culture through Transgender Health Benefits, Nondiscrimination Policies, and the inclusion of all-gender restrooms. The UC also acknowledges that we have much to do to create a safer and inclusive campus climate for trans and gender-nonconforming people. In this talk we will learn about the history of trans people in—

  • Beginner

    How do you effectively support a network of over 1,500 concurrent courses, whose online pages are collectively accessed over 2 million times each week? In supporting a customized, self-hosted learning management system, data and data visualizations are a foundational element of our decision-making. Take a look inside our tool kit and find out how we use different resources to help us monitor the pulse of our learning management system. Google Analytics, Splunk, Tableau, and other custom reporting and data visualization tools—

Wednesday, July 19

-
  • Beginner

    Do you or your team enter into agreements for IT services, software, hardware or professional services? Does your Unit use Cloud solutions to solve your business problems?  If the answer is yes to any of those questions, then this panel session is for you.

    Earlier in this year, a systemwide workgroup rebuilt Appendix DS in order to make it simpler and easier to use, and to be Supplier friendly.

    In this session, our panel will discuss when—

  • Beginner

    I will go over how our team started incorporating accessibility, how we addressed the issues we faced, and where we're at/heading. The focus is more on the practicality of implementing accessibility standards, since there's a lot of information about why to be accessible and what it means to be accessible, but not always how to make sure that you're implementing standards correctly.

    Time/interest permitting, I can also go over WCAG 2.0 and 2.1 specifics and go a—

  • Beginner

    Data Science and Computer Science courses with large enrollments face grading challenges due to the size and nature of their assignments. In our university’s Introductory Data Science class, every student submission is broken up into auto-graded code sections and manually graded response sections to be separately graded, then merged to produce a final grade. In response, our university’s Department of Data Science has developed a grading solution pipeline to productionize this process, in addition to auto-grading software and—

  • Beginner

    UC has a systemwide contract for the Siteimprove web accessibility review tools, which are available to everyone at UC. Learn how you can use them to make sure your websites are accessible to people with disabilities. The tools regularly scan your public websites to check for and show you how to fix any accessibility issues with the web pages and PDF documents. The Siteimprove tools also support standards for quality assurance (spelling, broken links), SEO, and p—

  • Beginner

    Classroom Response Systems (CRS, aka “Clickers”) have been, for many years, used in courses across UC campuses for engagement and assessment purposes, to the degree that some instructors consider them indispensable. With advances in CRS technology that provide new features, as well as enable students to participate using their own devices (phones, tablets, laptops), many UC campuses have been investigating a variety of new systems; some campuses have formally adopted a new system, while others are at—

-
  • Beginner

    Over the past two years, with input and vision from researchers building high-performance systems such as the Pacific Research Platform (PRP), we have built out a hybrid cloud/on-premises environment for student Data Science and Machine Learning, supporting both coursework and student-focused independent study research.  The system is now used by 1300 students per quarter across multiple departments and disciplines, from Engineering, to Cognitive Science, to Visual Arts.   We will share technical and non-technical lessons learned in the—
  • Beginner

    At the request of the presenter, this session was not recorded. - UCTech 2019 Planning Committee

    Artificial intelligence-supported business processes are changing how we do business, how we manage risk, how we communicate, and how we organize. We have started down the path of building the foundation to enable our organization to benefit from these innovations. In our talk, we will cover:  
    - how the data and data warehouse of the future is changing  
    - how we—

-
  • Beginner

    Attendees will be able to see how they can leverage their existing systems to create opportunities for learning and development outside of the classroom that's accessible for staff, students, and anyone with the appropriate credentials (as needed). Specifically this session will cover how to start a social learning site, and a Transferable Skills Library using Drupal 8, a word analyzation tool, e-learning videos, and job descriptions. Additionally we'll review how to measure the impact of these efforts—

  • Beginner

    At the request of the presenters, this session was not recorded. - UCTech 2019 Planning Committee

    IT professionals face unbounded demand, constantly shifting technologies, and limited resources. As a result, our approaches to problem-solving require grit and perseverance and can too quickly exhaust us if we lack a framework and shared mindtools to manage our own and our teams’ expectations, not to mention those of our campus stakeholders.  In this session, two CIOs describe their theory and—

  • Intermediate

    Automated tools can do a lot to help you with website accessibility. But to really achieve accessibility, you also need to understand and incorporate key accessibility concepts into your website and web app design. Join this session to learn more advanced skills to make your websites and web apps accessible. Topics covered will include best practices for website design, how to pick platforms and frameworks, when to use ARIA, and how to use all your development tools—

-
  • Securing Information, Assets and Systems
    UCEN - Flying A Studios

    Beginner

    Concealing database credentials and rotating passwords is usually an exhaustive activity - for system administrators, database administrators, application developers, and security auditors.  Discover how your organization can save time by using AWS Secrets Manager.

    See how the AJS developers at UCOP created an AWS CloudFormation template to add a secret to the AWS Secrets Manager to both encrypt the credentials as well as rotating the password as often as required.  Watch and learn how we modified our Java—

  • Beginner

    Do you or your team members feel like IS-3 is too complex? Don’t know where to start? Does it seem hard to figure out the first step? Do you hesitate to develop a plan? Do you wish other options were allowed? These questions can limit compliance and hinder implementation – ultimately leading to increased cyber risk.

    In this session, we will discuss these questions and pain points in the implementation process and help learn how to overcome—

-
  • Beginner

    Cognitive diversity is the recognition that people differ in their perspectives and how they process information. A greater diversity of thought allows teams to tackle uncertain, complex situations with far greater success than less diverse teams. In fact, Harvard Business Review has identified cognitive diversity as a key predictor of team performance and success.

    This session will begin with a definition of cognitive diversity, with an emphasis on its value to the organization. Second, the session will—

  • Beginner

    Funding bodies, campus initiatives, and professional associations have recently placed an increasing importance on training as a way to help researchers, librarians and IT staff better engage with the expanding array of tools, research techniques, and vast amounts of data.  The objective of many of these training programs is to improve the skills of researchers, librarians and IT staff in working with data. But how do we do this effectively in a way that promotes inclusivity? The—

  • Beginner

    Like many universities, in 2017 UC <redacted>'s Internet border was largely open. The end-of-life intrusion prevention system (IPS), our only protection beyond a few router access control lists, was removed when it failed. There was very little to distinguish our campus network from the Internet. We had limited ability to implement east-west controls between campus departments, mostly through router ACLs and distributed firewalls.

    This presentation will trace the path that we took from this beginning to functional—

  • Intermediate

    Title

    Securing International Student & Scholar Success

     

    Summary

    The team at UC-Irvine has created different applications for UCI International Center. These applications have not only created a user-friendly experience for international students and eased their transitions into UCI but also made the International center processes related to SEVIS compliance paperless, efficient and cost effective. In addition, UCI has gone a step beyond and successfully implemented multiple measures such as 2-factor authentication and transparent encryption to better—

-

-