UC IT Blog
3 FOLLOWERS
The University of California Information Technology blog informs and connects those working in the technology field at the university, along with those working closely with university technologies. About an equal portion of readers are new to the UC tech community vs long-term members of the university. Explore more through their blog about resources, jobs, latest news, events, and more.
UC IT Blog
3d ago
Process Palooza, hosted by UC San Diego, is a high-energy collaborative experience showcasing the power of continuous improvement. Come join the two-day program, August 21-22, 2024, at UC San Diego. Registration for Process Palooza 2024 is filling up fast, so please register soon to secure your spot.
Process Palooza [Registration now open, follow the event podcast]
Wednesday, August 21 – Thursday, August 22, 2024
Host: UC San Diego
Training opportunities and costs
UC San Diego affiliates: $0
University of California (UC) and Cal State (CSU) affiliates: $150
Add-on Training Opportunities (limi ..read more
UC IT Blog
3d ago
By Shannon Prior, UC San Diego. TritonGPT is a testament to innovation at UC San Diego, developed by a dedicated team of student engineers. This suite of AI Assistants is not just another technological advancement; it’s specifically tailored to meet the unique needs of the university community. TritonGPT excels in handling university-specific queries, creating customized content, and summarizing extensive documents, all while ensuring a high degree of relevance and precision. The tool is powered by Meta Llama 3, a dialogue-optimized, open-source large language model, and operates securely from ..read more
UC IT Blog
1w ago
Save the date for the 15th Cyber Security Summit, which will be held at UC Irvine on October 9, 2024. Registration opens in July.
The summit brings together people from across the university and beyond to discuss and learn about cybersecurity and cyber risk management. Now is a good time to save the date and obtain your travel approvals.
Place and date
UC Irvine, October 9, 2024
Who’ll be there
IT security and compliance professionals from UC, plus peers from California State University and California community colleges.
Why you should attend
To learn ..read more
UC IT Blog
1w ago
Join UC Irvine and UC Berkeley as 2023 Winners and Finalists
The 2024 Gartner Eye on Innovation Awards for the Education Sector are open through May 31. Get recognized for your groundbreaking innovations. Join the hundreds of educational institutions that have showcased their innovative uses of technology to drive best-in-class initiatives over the past three years. Submissions are open in four education categories until May 31st: (1) Enhancing Teaching and Learning Quality; (2) Enhancing Student Experience and Security; (3) Enhancing IT People, Processes and Skills, and (4) Innovating in K-12 ..read more
UC IT Blog
1w ago
UC Santa Barbara is leading a $20 million research institute for next-level AI-powered cybersecurity. This groundbreaking project, Agent-based Cyber Threat Intelligence and Operation (ACTION), is an effort to bring continuous learning and reasoning of AI to security threats.
The project is backed by a $20 million grant from the National Science Foundation over five years.
Leading the Way to the Future
Heading this multidisciplinary initiative is Professor Giovanni Vigna, a computer science professor and cybersecurity expert at UC Santa Barbara. Collaborating on this ambitious project are UC Sa ..read more
UC IT Blog
3w ago
Whether you are starting your journey or want to keep up with digital accessibility trends, the UC GAAD Webinar, May 16, 2024, from 10:00-11:30 a.m. PT, will help you put together the accessibility puzzle.
Register Now
Enjoy a short panel on what some of our leaders are doing on their campus. Then, during lightning talks, UC staff members will share some practical skills, discuss the importance of digital accessibility, and answer your questions. This year’s event will also feature a demonstration of how everyone can have a fun-filled life when technology is accessible. Best of all ..read more
UC IT Blog
3w ago
In this interview, Kristina Dvorak, a recent graduate from UC Santa Cruz, provides insights into her successful job search process and her career at Cisco. She shares perspectives on what she values in her manager and her employer, who support her career growth by providing “stretch projects” to help her develop the skills she will need to reach new career objectives. The results have already been outstanding. Dvorak recently announced a promotion, which you can learn more by finding her profile on LinkedIn.
Graduating in 2022 with degrees in Business Management Economics and Psychology, Dvora ..read more
UC IT Blog
1M ago
In this interview, Kristina Dvorak, a recent graduate from UC Santa Cruz, provides a comprehensive overview of her career at Cisco. Graduating in 2022 with degrees in Business Management Economics and Psychology, Dvorak initially joined Cisco as a marketing specialist intern, where she gained experience in market analysis and research. Now, as a marketing program manager at Cisco, Dvorak oversees the implementation of marketing strategies nationwide, focusing on outbound plays. She appreciates the supportive culture at Cisco, which allows her to explore her interests beyond her designated role ..read more
UC IT Blog
1M ago
The UC Tech Conference was founded in 1982 with the first UC-wide tech community conference, held at UC Santa Cruz. Since then, the conference has grown in popularity to include over 1000 viewers (about 400 in-person and 700 online). Each year, a different campus hosts the conference. The conference consists of an opening keynote, presentations, a gala awards ceremony dinner event, meet-ups, a trade floor and drawing, among many other elements. Each location has the opportunity to welcome the community and share their culture with colleagues.
The UC Tech Ambassadors have been an important trad ..read more
UC IT Blog
1M ago
By Wendy Rager and Judi Baker. Most of us are familiar with phishing – a type of social engineering scam where a bad actor sends fraudulent communication that appears to come from a legitimate source. The goal of the attack is to trick the recipient into revealing sensitive information (such as credit card numbers or passwords).
Phishing is at the root of many of the most devastating cyberattacks and have cost companies and entities millions and millions of dollars in damage. According to the 2022 IBM Cost of a Data Breach Report, phishing and stolen or compromised credentials were respo ..read more