Skip to content ↓

Digitalk: Where IT's At

Computer security

The recent Windows Meta File vulnerability is one more example of why it's critical to keep computers protected against security and virus threats. The easiest and most effective way to do this is to set up your computer for automatic updates and patches. Windows users can subscribe to MIT's Windows Automatic Update Service (WAUS) at, and Linux users can register for Red Hat Network at On the Macintosh, Software Update is set by default to check for updates weekly.

It's also important to keep Microsoft Office 2004 up to date. The WAUS service includes these updates for Windows users. Macintosh users can select the "check for updates" command under the help menu in any open Office 2004 program.

Online MIT invitations

Hosting an event? MIT's online ordering system, ECAT, now features a customizable invitation package.

Using this simple system, MIT offices can order invitations and matching envelopes and have them delivered to their door. Two layouts accommodate both short and long text blocks. The MIT Publishing Services Bureau negotiated discounted print prices for a single-panel 5-inch-by-7-inch invitation card and matching A6 envelope: they print in two colors (MIT red and black) on your choice of white or natural white recycled paper.

Browse the MIT products or place your order online with ECAT partner Ambit Press at For more information or to request samples, contact the Publishing Services Bureau at

Statistically speaking

Do you use statistical software packages, such as Stata, SAS or SPSS? Lynda Zhang, a newly hired statistical consultant at the Harvard-MIT Data Center, is available to answer questions about these packages and provide hands-on support. She can help employees learn how to use the programs, import and manage datasets, and perform statistical analysis and graphing.

Zhang is available for one-on-one help sessions at Dewey Library. To make an appointment or to ask for tips, send e-mail to For more information on support for statistical software, visit To learn about the Harvard-MIT Data Center, visit

Access rights in TechTime

MIT's TechTime calendar system is set up so that any MIT TechTime user may view any other MIT TechTime user's agenda. You control what others can see in your agenda by setting an access level when you create a meeting, event, note or task. The pre-set access levels when others view your agenda are:

  • Normal and personal: For meetings, another user sees only the time and no other details; for events, notes and tasks, nothing is shown.
  • Confidential: Nothing is shown for the entry.
  • Public: All details are shown for the entry, and other users can copy the entry into their own agendas.

You can redefine access rights to your calendar for specified MIT TechTime users or for MIT TechTime users in general. You can also create Designate rights (also known as proxy rights) for a specified user, so that person is able to make changes to your calendar.

For more information, visit

Digitalk is compiled by Information Services and Technology.

A version of this article appeared in MIT Tech Talk on January 25, 2006 (download PDF).

Related Links

Related Topics

More MIT News