Information, Technology & Consulting


Interface is an ongoing series of features about information technology at Dartmouth, the people of ITS, and how we work with the college's many information systems. Learn what it's like to be a freshman barred from having a cell phone on a first-year trip. Peek inside the framework of Dartmouth's many, many sites. See how our past experiences inform what we do here.

Monday, May 16, 2016 - 2:36pm

You may not realize it, but you are a phishing target at school, at work, and at home. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, look for the following indicators to prevent passwords, personal data, or private information from being stolen.

Beware sketchy messages. Phishy messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks.

Avoid opening links and attachments. Even if you know the sender...

Read more.
Monday, April 18, 2016 - 2:16pm
The Haven

On April “Food” Day 2016, ITS Employees donated 256 pounds of groceries to The Haven, a non-profit, private organization that serves people struggling with poverty by providing food, shelter, education, clothing and support.

In March, Vice President for Information Technology Ellen Waite-Franzen told ITS staff:

“We do a food drive for the Haven food pantry at our Holiday party in December and we have a wonderful turnout. As you also probably know, food pantries get more attention during the holidays than during the rest of the year...

Read more.
Monday, April 18, 2016 - 12:21pm
David Avery

The Systems Administrator Retires from Dartmouth after more than 30 years of service.


By Elizabeth Kelsey

David Avery joined ITS—then, Computing Services—in 1985 as the system administrator for an IBM 4381, a mainframe computer that supported research computing. The 4381 weighed over one ton, and with its cabinets side-by-side, would have stretched 40 feet long. Priced at 1.2 million dollars, the machine had 8 gigabytes of disk and 16 MB of RAM. By comparison, an iPod 4 has more RAM and storage.

In its day, though, the 4381 provided cutting-edge...

Read more.
Tuesday, April 12, 2016 - 4:23pm
travel signs

Planning a spring break vacation? People are frequently more vulnerable when traveling because a break from their regular routine or encounters with unfamiliar situations often result in less cautious behavior. If this sounds like you, or someone you know, these five tips will help you protect yourself and guard your privacy.

Track that device! Install a device finder or manager on your mobile device in case it's lost or stolen. Make sure it has remote wipe capabilities and also protects against malware.

Avoid social media...

Read more.
Tuesday, April 12, 2016 - 10:29am


How often have you used BlueJeans? When did you start using it?

On average I’m using it a couple of times a week. I started using it a couple of months back when I was looking for a dedicated conferencing solution that was a bit simpler than WebEx to use. My primary need was a space where I could easily add collaborators with minimal plugins or other pre-work before our video meetings.

Why did you use the service? What type of conference calls did you make? 

Most often I use Bluejeans for anything for which I would...

Read more.
Tuesday, April 12, 2016 - 10:19am
bill 1

When associate director of ISTS Bill Nisen was looking for a way to share ideas with off-campus connections, he contacted Video Service Specialist Jim Goodrich, account manager for Dartmouth’s BlueJeans video conferencing service.

“People want tools that are easy to use,” Goodrich says. “BlueJeans is one of the more robust and reliable desktop conferencing tools I’ve used, yet it’s so simple.”

Since he received a BlueJeans account, Nisen has used the service at least once a week to connect with...

Read more.
Tuesday, March 1, 2016 - 1:37pm
phone 2

Mobile devices have become one of the primary ways we communicate and interact with each other. The power of a computer is now at our fingertips, allowing us to bank, shop, view medical history, attend to work remotely, and communicate virtually anywhere. With all these convenient features come added risks, but here are some tips to protect your devices and your personal information:

Password-protect your devices. Give yourself more time to protect your data and remote wipe your device if it's lost or stolen by enabling passwords, PINs, fingerprint scans, or other...

Read more.
Tuesday, February 16, 2016 - 4:35pm

By Elizabeth Kelsey

Warren Belding, Manager of IT Desktop Client Services, has worked at Dartmouth for so long, he outlasted his first job: the equipment he was hired to run is defunct, and the building in which he first worked no longer stands. But through the years, Warren’s skills evolved with changing technology, enabling him to support the computers of faculty, students, and staff with the software and hardware they need. For over 43 years at the institution, Warren has played a role in countless reports, projects, and designs.



Read more.
Wednesday, January 6, 2016 - 4:00pm
cyber security cartoon image

When you're online you leave a trail of "digital exhaust" in the form of cookies, GPS data, social network posts, and email exchanges, among others. It is critical to learn how to protect yourself and guard your privacy. Your identity and even your bank account could be at risk!

Use long and complex passwords or passphrases.

These are often the first line of defense in protecting an online account. The length and complexity of your passwords can...

Read more.
Thursday, November 5, 2015 - 12:15pm
all staff meeting

Every term, 166 members of ITS gather for an all-staff meeting, where Vice President for Information Technology, Chief Information Officer Ellen Waite-Franzen introduces new staff, plans for the future, and presents awards. This term, starting with the Collaboration Award, Interface will highlight ITS award winners, who embody ITS values and advance Dartmouth’s mission through their work. 

Winners of the Collaboration Award worked together to form multi-unit partnerships to achieve shared goals, solve problems, and create new services.

Security, Network,...

Read more.


Information, Technology & Consulting