Changes to University Password Policy

Wouldn’t it be great if we didn’t have to use complex passwords anymore?  Often, there is no easy way to remember those passwords!

For the past eight years, students, faculty and staff at Western Illinois University have been using passwords that conform to a University Password Policy. Password policies around the world have often mandated that we use complex passwords consisting of uppercase and lowercase letters, numbers and special characters. Additionally, passwords have forced expiration dates, which requires people to change from one complex password to another on a frequent basis.

But wait… there’s good news!  The guy who invented all of those password rules almost 15 years ago now admits that he got it all wrong!

In June 2017, the National Institute of Standards and Technologies (NIST) released new Digital Identity Guidelines that turned the idea of what we considered to be a secure password on its head. The following points in this document are noteworthy:

  • Forget about composition rules! For example, passwords shouldn’t be required to contain at least 2 special characters, or have both upper- and lower-case letters.
  • No expiration dates! Passwords should not expire unless they are forgotten or potentially compromised. If you set a good password that you like, there is no need to unnecessarily change it after 120 days!
  • Passwords should be long! The longer, the better.

In a nutshell, these new NIST guidelines recommend that we think of passwords as phrases instead of complex words.  More appropriately, think of them as passphrases. Passphrases will be longer but they will be easier for you to remember.

University Technology proposed a new Password Policy based on the NIST guidelines in the fall of 2017.  It was subsequently presented at the January 2018 IT Governance Council meeting and approved by the IT Governance Council.  University Technology is now in the process of implementing these new NIST guidelines!  

There are some technical changes that we need to do behind the scenes to make these new changes work–such as properly encrypting passwords and ensuring that commonly used or compromised passwords are not allowed–but the end result will be that passwords will be easier for you to remember but harder for hackers to crack.

Be on the lookout for more information once an implementation date has been set!

What To Do About The Equifax Data Breach

Late last week, Equifax, one of the country’s major credit reporting agencies, reported that sensitive data for nearly 143 million Americans was exposed in a major data breach. The breach lasted from mid-May through July, and hackers accessed people’s names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. They also stole credit card numbers for about 209,000 people and dispute documents with personal identifying information for about 182,000 people.

What Should I Do?

  • Find out if your information was exposed. Visit and click on the “Potential Impact” tab and enter your last name and the last six digits of your Social Security number. Your Social Security number is sensitive information, so make sure you’re on a secure computer and an encrypted network connection any time you enter it. The site will tell you if you’ve been affected by this breach.
  • Read your monthly statements carefully. Review bank, credit card, and pay statements, as well as other important personal accounts (e.g., health care, social security). If a statement has mistakes, charges you don’t recognize, or doesn’t arrive when expected, contact the business.
  • Consider placing a credit freeze on your files. A credit freeze makes it harder for someone to open a new account in your name. Keep in mind that a credit freeze won’t prevent a thief from making charges to your existing accounts.
  • Review your credit report every year. You can request a free annual credit report.
  • Protect your online accounts. Create strong passwords or passphrases that are at least eight characters long and include a mix of letters, numbers, and special characters. Don’t use the same password or passphrase for multiple accounts.
  • Stay ahead of the hackers. Check the Have I been pwned website to see if your accounts were hacked in any other known attacks.

More details on this breach and steps you should take to keep yourself safe can be found at the Federal Trade Commission’s web site.

Did You Bring a Computer to Campus?

On behalf of University Technology, I want to welcome all students, faculty and staff to Western Illinois University for the Fall 2017 semester! As the University’s Chief Information Officer overseeing University Technology (uTech), I’d also like to take this opportunity to provide both new and returning students and employees some information about our computing services. If you use a computer on campus (and who doesn’t?), here are some things that you might be of interest to you.

Good to Know!University Techology

  • If you need technical assistance connecting to Wi-Fi, resetting your passwords, accessing your email, logging in to STARS, etc., please contact the uTech Support Center! The Support Center offers phone & online chat support, self-help documentation, and walk-in assistance in Stipes 126 to assist you with all of your technology needs. Of course, there is no charge for this service for WIU students, faculty, and staff.
  • We encourage you to take advantage of discounted software and hardware that is available for personal use. All students and employees can get Office 365 for free, special online deals are available on both Dell and Apple products, and other software and hardware discounts are available at JourneyEd.
  • Please follow uTech on social media for timely access to technology news/updates! We’re active on both Facebook and Twitter. We’ll keep you informed about service interruptions, new services, etc.
  • Also, please don’t download or share copyrighted video or music. This is illegal and it is not tolerated at Western Illinois University. We use a four-step graduated and automated response system that detects this activity on our networks and warns infringers. You can find more information about this on our website.

Get to Know Us, Too!

If you are new to the University, you may not be familiar with uTech. We are a division of Academic Affairs, and we provide the University’s computer resources used by students, faculty, and staff on the Macomb and Quad Cities campuses. These information technology services include:

To find out more about our mission, vision, major projects, committees, and service areas, please see our “About” web page. University Technology’s main home page can also be found at

Changes During This Past Summer

We’ve been busy over the summer! Here are a couple of the notable technology changes that I’d like to share with you:

  1. The University’s Wi-Fi was updated on May 29 in order to help eliminate confusion, improve connectivity & security, and simplify the process for connecting. This was a major and challenging project and we are continuing to refine and improve our wireless services.
  2. WIU’s Board of Trustees approved the 2017-2022 IT Strategic Plan on June 9. This updated plan identifies strategies and goals that will guide the adoption of technologies pertaining to teaching, learning, research, and business processes at Western Illinois University over the next five years.

Please Get Involved with IT Governance!

The University’s IT Governance process helps ensure the University’s effective and efficient use of information technology (IT) as well as its human and financial resources by engaging the entire University community as full partners in developing technology-related priorities and policies. There are several ways in which you can get involved!

  • All WIU students, faculty, and staff members are encouraged to submit technology-related ideas and suggestions to Western’s IT Governance Proposal System (GPS) using an online submission form. If you have an idea on how we can do things better, please submit it!
  • The IT Governance Executive Committee continually seeks students, faculty and staff who would like to serve on IT Governance alliances (working committees) that help drive IT decision making. The Faculty Senate appoints faculty representatives to alliances; the President and vice presidents appoint representatives from their respective areas; and the Student Government Association appoints student representatives. If you would like to serve on an alliance, reach out to your respective governance group and ask that group to consider you for appointment.
  • The IT Governance Oversight Committee meets every two weeks to manage and improve the University’s IT Governance processes. The committee wants you to participate – it is open to all students, faculty and staff and there are no requirements for participation. If you are interested, join us! Email for the meeting schedule and location.
  • To find out when and where the IT Oversight Committee and the Alliances are meeting, see the calendar at If you have questions or interest in becoming involved, please contact me!

There is a lot more to the services that uTech provides, so I encourage you to visit our website or reach out to me if you have any questions. Feel free to email me, call me, or drop by my office anytime.

Once again, welcome to Western Illinois University!

Steve Frazier, CIO
Western Illinois University

Malpass Library 184
1 University Circle
Macomb, IL 61455

(309) 298-4500 |

2017-2022 Information Technology Strategic Plan

The 2017-2022 Information Technology Strategic Plan was accepted by Western Illinois University’s Board of Trustees on June 9, 2017. It identifies strategies and goals intended to guide the adoption of technologies pertaining to teaching, learning, research, and business processes at Western Illinois University. To the extent possible, it provides broad, overarching directions without attempting to identify specific technology solutions. In addition, the plan states University Technology’s “Guiding Principles” and Values.

Prior to its acceptance, the draft was vetted by the University Technology staff, shared for comment with various governance groups including UTAG, the Council for Instructional Technology (CIT, which has representation from both campuses), the Faculty Senate, the Student Government Associations on both campuses, and the Deans and Directors that report directly to the Provost. The University community as a whole was then encouraged to review and provide feedback on the draft during December 2016 and January 2017. Then, in late January, the draft was submitted to Dr. Neumann, Interim Provost and Vice President of Academic Affairs. Subsequently, it was reviewed and approved by the President and his Leadership Team.

Questions regarding the plan may be directed to Stephen Frazier, CIO, at SL- or (309) 298-4500.

IT Strategic Plan Documents & Resources

Other Resources

Were You a Victim of the Recent “Google Docs” Worm?


Stephen Frazier has shared a document on Google Docs with you! Or has he…?

On May 3, a particularly tricky worm spread like wildfire throughout the Internet by means of phishing emails that claimed to be from Google. These email messages fraudulently claimed that someone, possibly known to the recipients, shared a Google Doc with them. Classic phishing attacks typically involve sending emails in order to trick people into revealing personal information such as usernames and passwords and/or credit card numbers.

Unbeknownst to users who clicked on the link in the phishing email and granted access to their Gmail data, a malicious virus then had access to all of their email messages and contacts. The phishing message was then automatically forwarded to their contacts! Several detailed breakdowns are available online regarding how this attack worked, why it was so successful, and what giveaways should have alerted people to the scam.

A Google spokesperson told Business Insider that 0.1% of Gmail users were affected. That may seem like a small percentage… but Gmail is host to at least 1 billion active users! Thus, nearly 1 million people may have been affected by the virus within a few hours before it was shut down. From a criminal perspective, it was a rapid and rousing success!

Western Illinois University uses G Suite (formerly known as Google Apps for Education) for its email/calendaring solution, which made this attack rather successful. University Technology estimates that over 900 WIU users fell for this phishing email. The phishing message was so cleverly disguised that it even gave pause to many of us in University Technology – the email came from a known contact, the message had a convincing appearance, and our institution recently adopted Google Docs.

Within an hour of first noticing the email, University Technology had notified faculty, staff and students of the issue and provided instructions on protecting affected accounts. Our Support Center and infrastructure teams started contacting individuals affected and severed the connection between users’ data and the underlying malware.

Despite its success, many within the University community recognized this scam and reported it to Google. We congratulate these individuals, as they, along with other people around the globe, brought this phishing scam to a quick halt. Everyone has a duty to learn to recognize and respond to phishing scams – those that fail to do so risk handing over their personal data or the University’s data to hackers, thieves and other nefarious actors.

Please remember that you can change your WIU ECom password at any time – you do not need to wait until your password expires. If you ever question whether your account may have been compromised or you simply want to change your password to be something more secure, you can do so by logging in to Guava and clicking the “Password” icon.

Enterprise Resource Planning at WIU

WIU may well be the last university in Illinois that still develops and maintains its own business systems running on a mainframe. For dozens of years, applications tailored and customized specifically to WIU’s business needs have been developed by Administrative Information Management Systems (AIMS), primarily in the COBOL programming language. These applications and databases are running on our mainframe located in the data center on the Macomb campus.


John Pontifex, Information Technology Manager in University Technology, stands next to WIU’s IBM 2818 Model M05 mainframe in the Morgan Hall datacenter.

While this has provided WIU with certain advantages, such as being able to get award letters out to students sooner than most other schools, it lacks many of the features found in newer systems (including intuitive user interfaces, the ability for end users to get the data they need and are authorized to access without submitting a programming request, dashboards, etc.). We cannot compete with many of the vendors’ newer applications that are backed by huge programming teams (numbering in the hundreds or even thousands). Many new staff who join Western from other institutions have come to expect the features found in these newer systems.

In January 2015, WIU contracted with the BerryDunn consulting firm to review our ERP (Enterprise Resource Planning or business systems) to review our electronic business processes, most of which are running on the mainframe (MVS) system. Throughout the Spring 2015 semester, their consultants visited the Macomb campus, surveyed WIU employees and dug into the details of our technological processes. They were specifically asked to evaluate our mainframe system, applications, and business processes and to provide us options as we move into the future. They were not, however, to make any specific recommendations regarding a particular system or vendor. Their final report was delivered to us in July 2015.

In December 2015, we again engaged them to help us evaluate the different models available for ERP systems (Software as a Service, Commercial Off the Shelf, and Community Source). They contacted and facilitated dialogues with other institutions who have converted their ERP systems and identified WIU’s next steps in selecting a different ERP or to enhance our current one. Subsequently, EAB (formerly known as the Educational Advisory Board) conducted research and produced reports for us on cloud-based ERP selection and implementation.

Since then, the steering committee of WIU’s Enterprise Task Force (ETF), which includes two of our vice presidents, made the decision to pursue cloud-based Software as a Service (often referred to as SaaS) models. An ERP cloud-based solution, subscription-based, is a suite of applications running on a vendor’s servers that we would access through the Internet instead of servers in our data center. One of the advantages of this solution is that the vendor is responsible for developing and maintaining all applications… and updating them to meet new state and federal requirements, which is becoming more difficult for WIU given that the pool of available programmers who are proficient in COBOL is shrinking, reductions in WIU staff, and retirements.

A cloud-based solution will require us to embrace a different mindset. Departments will no longer be able to request new custom applications that AIMS would then prioritize and develop. While WIU could request the vendor to develop new applications, those would only be available if the vendor develops and releases them–which would be based on the needs and priorities of their entire user base.

The ETF is now in the process of reviewing some cloud-based products by means of on-site, high-level demonstrations of their Human Capital Management/Human Resources, Financial & Student Information modules. To that end, we have invited some vendors to campus solely for the purpose of learning more about cloud-based systems. It is important to note that WIU has not issued a RFP and it is likely that we are three to five years away from actually making a switch to a new system. During that future implementation phase, we will need to maintain our current ERP while focusing on getting the greatest use of the functionality available in the new system. The conversion will take considerable effort on everyone’s part (both AIMS and end-users). From what we’ve seen thus far, however, the work will be well worth it!

Changes Coming to WIU’s Wi-Fi on May 26

On the evening of May 26, 2017, University Technology (uTech) will be making changes to the University’s wireless networks. After May 26, all users of WIU’s wireless networks must configure their wireless devices to properly reconnect to Wi-Fi on the Macomb and Quad Cities campuses.

How Will I Connect My Laptop, Tablet, or Smartphone?

After May 26, you must connect to the WIU-SETUP network, open a browser, and follow the on-screen instructions to properly register your device(s). After the registration process is complete, your device will automatically connect to the new WIU-SECURE wireless network.

How Will I Connect Multimedia, Gaming, and Specialty Devices?

  • In residential areas of campus (residence halls and graduate/family housing), you can connect your smart TV, Xbox & Playstation consoles, Roku players and other devices that don’t support the WPA2-Enterprise protocol by logging in to from another computer and selecting the option to register a device using a pre-shared key. You will need your device’s MAC address, often times found within the settings or on the back/bottom of the device. After registering, you will be provided login details on how to connect to the WIU-DEVICE wireless network.
  • In nonresidential areas of campus, employees who have multimedia or specialty wireless devices that don’t support the WPA2-Enterprise protocol will need to contact their department/college technical representative or the uTech Support Center for authorization to connect these devices to wireless.

Why Is the Wireless Network Being Changed?

Currently, there are six wireless networks available on campus. uTech is reducing this number by half in order to help eliminate confusion, improve connectivity & security, and simplify the process for connecting.

  • Now through May 26: The available wireless networks will remain WIU-SECURE, WIU-GUEST, WIU-PUBLIC, WIU-SETUP, WIU-DEVICE, and WIU.
  • After May 26: The only available wireless networks will be WIU-SETUP, WIU-SECURE, and WIU-DEVICE. All users of WIU’s wireless networks will need to follow the appropriate directions above to configure their device for wireless access.

Who Do I Contact for Assistance?

Faculty and staff in academic units are encouraged to contact their local college tech reps for questions and assistance. All others can contact the uTech Support Center at (309) 298-TECH, visit us in Stipes 126, or chat with us online at You can also find instructions and documentation for connecting to wireless networks in the uTech Support Portal knowledgebase at

Update on University Anti-Piracy Efforts

It is natural for young people to want to download music and video content. However, doing this on campus using peer-to-peer file sharing often violates copyright law and puts both themselves and the University at risk. Because there are legitimate users of peer-to-peer (P2P) file sharing, however, University Technology did not want to block P2P traffic on WIU’s networks. As a result, WIU received a large number of “DMCA takedown notices” for many years from the entertainment industry.

In order to comply with the Digital Millennium Copyright Act (DMCA) and Higher Education Opportunity Act (HEOA), Western Illinois University (like all public universities in the United States) was required to implement a process to deter and sanction unauthorized distribution of copyrighted materials on our networks. In March 2015, a WIU policy (the aptly-named DMCA and HEOA Response Policy) was approved and technology-based deterrents were subsequently deployed in April that year to help enforce it.

This coming April will mark the two year anniversary since its implementation. Although the illegal downloading and sharing of copyrighted materials continues to be an issue both on campus and around the globe, we wanted to share some data on how this technology has impacted illegal downloading of copyright materials at Western.

In December 2014, an appliance was activated on Western’s computer network that began monitoring illegal file sharing. This device issued warnings to users when such activity was detected but it took no other action. The warnings, however, served to educate users about copyright infringement, options to legally download material, and they also helped to get the word out that the new policy would soon be enforced.

After WIU’s DMCA and HEOA Response Policy was approved a few months later (April 2015), University Technology used the appliance to implement a four-step graduated response system. In general:

  • Level 1 Sanction: Upon a first offense, the user’s browser is redirected to a warning page indicating that illegal activity has been detected. The user’s Internet access is then disabled for two hours.
  • Level 2 Sanction: If a second offense occurs, the user’s web browser is again redirected to the warning page, and his/her Internet access is disabled for 48 hours.
  • Level 3 Sanction: If a third offense occurs, the user’s web browser is redirected to a warning page, and the user’s Internet access is disabled until the user personally meets with a designated University Technology staff member to discuss the ongoing copyright violations.
  • Level 4 Sanction: If a fourth offense occurs, the user’s web browser is redirected to a warning page, which states that Internet access has been blocked. Penalties for violation of academic policy may apply and, depending on his/her role at the University, the user is required to appear before Student Judicial Programs or the Office of the Provost.

It is important to note that a sanctioned user still has access to computers in the labs to complete homework assignments and to do research. Of course, these computers are also being monitored.

Prior to implementing this network device, the University received individual copyright infringement notifications via email (i.e., DMCA takedown notices) from major record labels, movie studios and other copyright holders. These were entered as tickets in University Technology’s tracking system and assigned to a Support Center or Network Team staff member to investigate and handle. This was a time-intensive process that did little to deter or educate repeat offenders. In the Fall 2014 semester alone, we received 924 of these copyright infringement notifications.


As evidenced in the chart above, when the technology-based deterrent was implemented towards the end of the Spring 2015 semester, infringement notifications received by our Support Center plummeted to 336 that semester (a 64% decrease from the previous Fall), and then down to 90 in Fall 2016 (another 73% decrease from the previous Fall). In Fall 2016, there were only four devices connected to Western’s network that made it to the Level 3 sanctions that required each user to meet with University Technology staff before their Internet access would be reinstated. There have not been any Level 4 sanctions to date.

Although our technology-based copyright infringement deterrent has only been in place for a short time, the data indicates that it is working. There are now far fewer copyright holders notifying the University about infringement. The fact that there have been very few Level 3 sanctions indicate that otherwise-would-be repeat offenders are paying attention to the warnings and choosing not continue to participate in infringement on Western’s network.

Predicting and Planning for Future Technology

From an evolutionary standpoint, we are on the brink of profound and intriguing technological advances… some that will occur sooner than most might think. While preparing to update Western Illinois University’s IT Strategic Plan, I researched predictions for the future of technology and higher education for the years 2017 through 2050. Although this article is long (particularly for a blog post), I wanted to share where we are at and some exciting future prospects that may be in store for us.

Today, it shouldn’t surprise anyone that significant business change is nearly impossible without the use of information technology. It touches nearly every aspect of higher education. For students, it begins the moment they (and their parents) visit a university’s website and it continues well after they graduate. Higher education, therefore, grapples with a host of technology-related issues, including security, privacy, and compliance. Technologies and trends higher education embraces include data mining, predictive analytics, the Internet of Things (IoT), cloud computing, consumerization, mobile devices in the classroom… only to name a few. Also, there is an insatiable demand for more bandwidth on campuses and students expect their colleges and universities will have equal or better technology than they enjoyed at home.

Keeping up with these challenges is… well, challenging, especially in light of the great upheaval that is taking place in higher education. Across our nation, most state appropriations for public educational institutions are continuing a downward spiral, forcing admissions to be increasingly competitive and universities to look for new funding models. While colleges and universities use technology to help differentiate themselves, “there will be very little difference between public institutions and private institutions in terms of their funding, or their cost structures, or their tuition (fees),” if this funding trend continues, according to Robert Reich, who was secretary of labor under the Clinton administration and now a professor of public policy at UC Berkeley (Havergal, Times Higher Education, 27 September 2016). Many employers today consider higher education to be a checkmark rather than a differentiator when hiring. Some have concluded that higher education needs to be free in the future (just as high school education is today). Also, education is becoming less confined to a specific location and less proprietary. Thus, it seems that the only constant is change itself.

Compounding this situation is the phenomenal pace at which technology is changing. Technologies that were merely science fiction yesterday are now being patented, tested in labs, and even successfully demonstrated in the real world. For example, Quantum Teleportation, which involves separating intertwined particles that react identically when one of them is acted upon (yes, even when separated), has now been successfully tested over four miles of city fiber. This may eventually enable secure transmission of data through the Internet. Brain-to-brain communication through the Internet (one person thinks of a word and someone in another country perceives it) has been demonstrated with up to a 60% accuracy. And someday, when computer chip manufacturers switch from making silicon-based chips to ones using new materials (nanomaterials, grapheme, neuromorphic, memistrors, etc.), today’s computation speed barrier will give way to speed of light computing (perhaps a quintillion calculations per second). That will pave the way for mind-boggling virtual personal assistants that understand the context your questions and every nuance of your speech… and will instantly answer extremely complex questions in an ongoing conversational mode (without the need for you to repeat what had been said before when you change some of the parameters of you questions). Virtual and augmented reality, as well as tactile holograms that can be touched and felt, will be making their way into our everyday life in the years ahead. With these technologies, children born between the years 2025 and 2045 may be able to control web-connected objects with their minds and communicate “telepathically” with their peers. These “young wizards,” who will adopt new technologies that earlier generations resist, will be “so far beyond [our] experience that [we’ll] be to them what [our] great grandparents are to [us]: cavemen” (Tal, QuantumRun, 29 July 2015).

While the advancement of technology hurtles forward at a dizzying speed, so does the relentless barrage of attacks by threat actors, some which are funded by foreign governments. In light of one major and costly breach after another, the public understandably is questioning detection and remediation practices. Adam Levin, chairman and founder of IDT911 LLC said, “…we live in an environment where breaches have become the third certainty in life (Heller, TechTarget SearchSecurity, 23 Sep 2016).” A few years ago, nearly two-thirds of the traffic on the Internet was generated by non-humans, so it is not surprising that attacks are now branching out into new areas. For example, the IoT, which is a relatively new concept to many, recently came under a denial of service attack.

Amidst this turbulent whirlwind of change and challenges, individuals and institutions can no longer afford to just simply maintain their status quo. As Howard Tullman said, “If you’re trying to just hold steady, you are slipping backward. (Morris, Engineering News, Northwestern McCormick School of Engineering, 28 Jan 2016).” Colleges and universities must continue to invest in technologies and they must keep pace with the evolving technology to succeed in the future.

Unquestionably, WIU must plan for technological change. To build tomorrow’s computing environment on our campuses, we can’t wait for tomorrow… we need to start planning today. That’s why our 2013-2018 IT Strategic Plan is being revised. In the near future, students, faculty and staff will be invited to review the new 2017-2023 plan and to provide their input. I invite you to watch for this in the coming days and to add your suggestions and comments… so that we may think big and implement technology responsibly in the years to come!

WIU Now Using Zoom For Video-Conferencing

ZoomLogoVideo-conferencing just became easier for WIU students, faculty, and staff. Until the summer of 2016, the University’s preferred video conference software was Adobe Connect. However, when Adobe announced that its annual subscription was going to increase more than 300%, University Technology (uTech) began to explore alternatives. Zoom was identified as a cost effective, scalable, and flexible alternative. We also think you will find that it is much easier to use than Adobe Connect.

WIU students, faculty, and staff can go to to sign up for a free “Basic” account using their WIU email addresses. These free basic accounts are limited to 40-minute sessions and traditional video conference rooms (such as a Polycom room) cannot be invited to a Zoom meeting. However, Pro accounts do not have the 40-minute limit and, with an additional license, can connect to Polycoms. Pro accounts are available for purchase. To find out more about Zoom, we encourage you to visit

uTech coordinated a group purchase of Zoom licensing with the College of Education and Human Services, University Libraries, the Center for Innovation in Teaching and Research, and the office of the Vice President for Quad Cities and Planning to take advantage of volume pricing options. If you are interested in obtaining a Pro account or a Room Connector license, please contact the uTech Support Center at (309) 298-TECH or

How Zoom Works

Zoom meetings can be created very simply:

  1. One person starts or “hosts” a meeting and may invite up to 50 participants to join. The host is the only party required to have a Zoom account and he or she can choose to host the meeting from a desktop computer (Windows, Mac OS, or Linux) or mobile/tablet device (iOS, Android, or Blackberry) just by installing the free downloadable mobile app or logging into the website.
  2. Participants may choose which method they are the most comfortable with when connecting to the meeting. They can also connect with audio-only by calling a phone number included in the meeting invite.

For a typical Zoom meeting, each host and participant needs speakers, a microphone and a webcam. These devices don’t have to be expensive to provide a great experience. Basic speakers and a webcam such as the Logitech HD Pro C920 ($80) wzoom_laptopith its built in microphone will give you a great picture and audio.

Zoom is a cloud-based system so the desktop applications, mobile apps, and all the backend technology to make the system work is provided by the company. Unlike traditional video conference room systems (such as Polycom, Lifesize, or Cisco), neither hosts nor participants are tied to a specific location. Hosting or joining a meeting can happen from anywhere there is a reliable internet connection and little background noise.

With the purchase of a “Room Connector” license, Zoom hosts can invite a traditional video conference room system to a Zoom meeting as well. That capability is useful if several people want to participate in the meeting from the same location.

Zoom also boasts several other advanced features that are flexible and easy to use:

  • Hosts or participants can share whiteboards or other content and allow other attendees to annotate as the originator sees fit.
  • Entire meetings or portions of meetings can be recorded by the host and hosts can individually allow participants to record as well.
  • Public and private meeting chats facilitates communication between those who need to be involved without overwhelming those who do not.

Zoom combines its simple and well-designed interface with the ability to participate from various geographic locations and freedom to allow participants to choose the technology each are comfortable with for a great win. The quality and price of Zoom will be very difficult to match.