Skip to main content

IT Connect

IT Connect

Information technology tools and resources at the UW


  • Benefits Webinar for Quarterly Faculty on May 31

    May 25, 2018

    Employee benefits written on a notepad.

    Learn how the UW determines if quarterly faculty are eligible for benefits and hear about Summer Hiatus at this special webinar on May 31 from 12:30 – 2:00 pm., hosted by Academic HR, UWHR Total Benefits. Experts will be on hand to discuss quarterly faculty benefits eligibility and how Summer Hiatus may impact that eligibility.

  • Record Memorial Day Holiday Time Off in Workday

    May 24, 2018

    Blue and red sign that reads "Memorial Day"

    Don’t forget to record Memorial Day as “Holiday Taken Time Off” in Workday. This applies to most UW employees who accrue time off and who would normally work on the day on which the holiday falls. However, Department of Intercollegiate Athletic coaches and academic personnel (faculty, residents and fellows and other academic staff) do not need to track time off for holidays in Workday. Medical Centers employees report time off for holiday hours in Kronos. To see if this applies to you, review the quick guide and full user guide for time off, and check out related information on the Time Off page of the Integrated Service Center website.

  • Deskmail, Alpine and Pine to retire Dec. 31, 2018

    May 23, 2018

    smart phone with email symbols

    The UW is modernizing its email services, which will involve retiring Deskmail, Alpine and Pine by Dec. 31, 2018. The goals are to provide modern tools, to facilitate compliance and to protect sensitive data. The two email options, UW Exchange Online and UW Gmail, will be limited to current UW community members. Retirees and UW alumni will no longer have access to these services — with some exceptions, including emeriti faculty and emerti librarians. UW-IT is offering online resources and migration tools to help with this transition.

  • Secure University data

    May 22, 2018

    Protect your UW NetID password, personal information and University data by learning three common email tactics used by cybercriminals to infiltrate systems and networks. Phishing tricks users into surrendering login credentials that can be used immediately or sold on underground websites. Spear phishing manipulates targeted individuals by appearing to come from a known or trusted sender in order to access financial account information, intellectual property and research data. And ransomware is malicious software embedded in a seemingly legitimate file attached to an email. When downloaded to a device, it can lock files, folders, computers and systems until a sum of money is paid.

    Read the full announcement

  • E-Resource: Read Seattle Times online

    May 21, 2018

    digital newspaper concept with a pair of glass and a to-go cup with a hot beverage

    Extra! Extra! Read all about it! You can now read The Seattle Times cover to cover and in color on your own device through the Access World News database, a resource provided through UW Libraries. Access World News also includes current and archived news stories from over 4,000 news sources with coverage of The Seattle Times dating back to 1895.

  • Graduating in June? Remember to migrate personal files and email

    May 18, 2018

    Students in their caps and gowns

    Before you leave the University, set up a private email account and forward any personal mail or personal files from your UW account to your private account. Keep in mind that computing services, including U Drive, UW Gmail and UW Exchange Online, expire on the 10th day of the second quarter that you are not registered as a student. After that date, graduating or departing students no longer have access to the account, and all data is deleted.

More NewsGet the IT Connect News monthly email

Need help?

Here’s how to contact us:

Phone: 206-221-5000
Online: Send us a question
In-person: Walk-in locations


Protect your UW NetID password, personal information and University data by learning three common email tactics used by cybercriminals to infiltrate systems and networks. Read more



More Tweets


More Events