Author Archive: Julie Tausend

Where to Find Office Word Tutorials

Need to brush up on the Microsoft Office Suite? Want to learn more about Word, Excel, and PowerPoint?

Check out these great resources:

Microsoft’s website offers tutorial guides at

Also, YouTube users generate video tutorials on how to use common applications. You can search for key words in YouTube to see what tutorials are available. An example of a good keyword search is “Formatting Tables in Word“, which results in thousands of videos for you to peruse.

These tutorials walk you through common tasks with graphics and videos to guide you along your way.

In Doubt? Throw it Out!

virusWe all get emails from time to time in which we’re unsure if the content is safe to open. If you’re ever in doubt about the authenticity of an email, throw it out.

If in doubt, throw it out!


Opening a malicious email can cause problems to your computer, loss of data, and corruption of files. Opening a malicious attachment could also do a number of undesirable things such as installing a key logger to record your keystrokes, installing a virus, or even providing an intruder with remote access to your computer.

Not only is malicious email risky to your machine, but it causes problems to other computers connected to the same Internet connection. It’s not worth the risk to open emails that you are uncertain from where it originated.

Concerned about deleting something important? Typically, a sender will follow-up with you if they do not receive a response from you.

For more information, visit Pepperdine University’s Information Security page.

4 Ways To Keep Your Smartphone’s Battery Healthy

This article was originally published at

Alyssa Bereznak wrote about how to keep your Smartphone’s Battery Healthy and Juiced Up:

Smartphones are magical, loyal little companions, there to give you your bank account balance, directions to the movies, and a recommendation for a killer Chinese restaurant all in a few swipes.

But, with a little neglect, they can die on you in the worst moments. Avoid this nightmare scenario and treat your little friend right, with these quick tips to maintaining your battery’s health.

Less is More

Back when nickel-based batteries were a thing, people were encouraged to “train” their batteries by completely draining them and then completely recharging them. (The Yoda-esque idea being that they wouldn’t properly function without knowing their full potential.) Forget what you’ve heard.

Pretty much every modern smartphone contains a lithium-ion battery, which are entirely different beasts.

In general, you should keep your smartphone’s battery charged above 50 percent. If you want to take it one step further, you should try to do one full drain a month, for calibration purposes. But any more of this and you’ll be shortening your battery’s lifespan.

Overnight phone-chargers take note! Technically you should not be charging your phone for extended spans of time. Though most chargers are designed to curb charging once your phone is all full, you should avoid juicing it to 100 percent and then leaving it connected to a charger. Overall, short starts and fits of juice are much better than constant zero to 100 charging. If you’re totally neurotic, the real sweet spot oscillates between 80 and 40 percent at all times.

Zero Is Bad

Lithium-ion batteries sometimes get volatile at zero percent. Like good little robots, however, they are usually equipped with self-destruct circuits that will kill your battery in order to prevent an explosion or something. This obviously doesn’t happen every day, but better to be safe than sorry.

Chill Out

Your smartphone is not invincible. Do not leave it on your car’s dashboard in 90 degree weather. Do not set it next to you as you sunbathe. Do not bring it to your Bikram yoga class. It doesn’t matter if your phone is off, the heat will fry your battery.

That’s because your phone is most comfortable at about 32-degrees Fahrenheit (and even then, it will lose a small percentage of its maximum capacity per year). Once you get to up to more tropical temperatures, you risk losing anything from 20 to 35 percent per year. Not like you should forgo a trip to Hawaii just to preserve precious battery life, but just be mindful about where you leave it.

Plug ‘Er In

Though wireless charging devices are convenient and chic, most inductive wireless chargers tend to waste energy by generating heat. Remember what we said about heat? (HEAT = BAD) The best method to charge a smartphone is by directly hooking it into a wall (as opposed to connecting it to your computer). It charges faster and safer that way.

Remove Personal Info

Need to remove Personal Information (aka Metadata) from your Word documents before sharing with others? It’s easy to find and remove hidden data and personal information

You can use the Document Inspector to find and remove hidden data and personal information in Word documents.

  1. Open the Word document that you want to inspect for hidden data and personal information.
  2. Click the File tab, click Save As, and then type a name in the File name box to save a copy of your original document.

 Important   It is a good idea to use the Document Inspector on a copy of your original document, because it is not always possible to restore the data that the Document Inspector removes.

  1. In the copy of your original document, click the File tab, and then click Info:


  1. Under Prepare for Sharing, click Check for Issues, and then click Inspect Document:


  1. In the Document Inspector dialog box, select the check boxes to choose the types of hidden content that you want to be inspected. For more information about the individual Inspectors, see Information the Document Inspector finds and removes
  2. metadata3Click Inspect.
  3. Review the results of the inspection in the Document Inspector dialog box.
  4. Click Remove All next to the inspection results for the types of hidden content that you want to remove from your document.


MyID Password Reset Errors

The Password Reset- Error Messages includes screenshots of various error messages that may be seen in MyID when attempting to reset a password.

Note that the website provides some additional resources, including a link to verify/update your MyID profile, a link which can be used to change a known password, and a short training video.

1. The user’s profile information is blank.


2. The user doesn’t recognize the email or phone number that the PIN was sent to.

3. The system doesn’t recognize the user.

Note: All of these messages direct you to go to:

This URL will:

  • Link to our new Password Reset Request Form.
  • Generate a help desk ticket for Anytime Support.
  • Anytime Support (the Password Reset Group), will help people update their profiles.

Forgot Your Password? MyID Reset

The MyID PIN Reset outlines the process for resetting a forgotten password via MyID:

1. Go to:

2. Click Option 2: Click “Forgot Password”
myid13. Enter your NetworkID.
4. Type the letters displayed in the picture.
5. Select the check box (to allow PIN text message)
6. Click “Request PIN” myid2

7. You will receive a confirmation message, click “Close”
myid38. Retrieve the PIN from your alternate email or mobile phone. Enter it here and click “Validate”
myid49. Enter your new password twice and click “Reset Password”
*Please Note: If your password does not meet our complexity requirements, you will see a red X next to the issues that need to be fixed.myid5
10. Password reset was successful. Please close your browser.
myid6Password Tip: Don’t Get Locked Out!
Update passwords you stored on your mobile devices, too!

Emergency Communication System

Pepperdine University uses an Emergency Communications System to alert community members in case of an emergency. Pepperdine’s Emergency Communications Systems sends important information via:

  • Email (from
  • Phone (automated message)
  • Text Message

The message included in the alert provides details and instructions on how to respond in case of an emergency.

Login to WaveNet and verify your contact information.

You can also view information at During an emergency, information on the site will be updated regularly to keep students, faculty, staff, and family members informed with accurate and current information.

Clickers In Classrooms

The audience response system or “Clickers”, TurningPoint, is now available in each of the School of Law classrooms. Professors using the classroom PC do not need to bring a Clicker Receiver to class. Professors simply need to open their PowerPoint presentation on the classroom PC via TurningPoint.

Students need to tune their Clickers to the correct channel for the classroom, as noted on a sign in each classroom:

channel list

Used for informal Q&A, attendance and assessment purposes, professors can easily integrate multiple choice or True/False questions directly into their PowerPoint slides using the TurningPoint software.  Students then submit their “anonymous” responses on their own personal clickers, which look like small remote controls. Depending on the settings, the results of the question are then displayed on the slide. No one will know whether you got the question right or wrong so you don’t have to be afraid to respond! You also can see whether you are in sync with the rest of your classmates.

For additional resources view:

Protecting Yourself from Cyber Criminials

Dr. Kim Cary, Pepperdine University’s Chief Information Security Officer writes:

sheepCybercriminals are now trying to use your password to change direct deposit information at Universities. If they trick you into giving away your password, in addition to getting your account locked out and receiving tons of non-delivery notices from the spam they sent with your account, you may now find that your WaveNet account has been accessed. This is happening at other Universities, and I’m writing to you to try to prevent it from happening here.

You Hold the Power Against Cyber criminals!

You are your own last line of defense. To protect yourself and the University from these cybercriminals, visit our website and learn to use two simple skills to avoid being inconvenienced or robbed.

How can you avoid being phished?

1. Check Before Acting On Unexpected Email Requests

Whenever you receive an unexpected email request, especially one that is urgent or enticing, use common sense to evaluate the message:

  • If it seems suspicious – just delete it!
  • If it seems likely to be real – contact the sender to confirm it!

Remember: Let your common sense guide you as to whether the message seems suspicious or real when you receive an unexpected email request, then act accordingly.

2. Check Before Entering Your Password

Whenever you need to enter your password, don’t enter your password, unless the website has the following:

  • Encryption – the web address must show https or the lock icon
  • Matching Domain – the web address should match the organization

Remember: Do these two quick checks every time before you enter a password, just like you always quickly check your mirrors before changing lanes on the road.

Pepperdine Spam Filter Effectiveness:

Did you know that just in the past 5 weeks, Pepperdine’s spam filter blocked an average of 1,007,843 spam a week? The daily average per address is 81 spam blocked, deleted or quarantined. However, spam volume has tripled since April 2012 and some of these dangerous scam messages will make it through our highly effective filter.