Office hours are 8:00 a.m. to 5:00 p.m., Monday through Friday. Offices are generally closed between 12:00 and 1:00 each day for lunch. The Office of IT Services is located second floor of Cone Bottoms Administration Building, Suite 250.

Cone Bottoms Administration Building, Suite 250c OBU Box 3794
Arkadelphia, AR 71998-0001
(870) 245-5567 – Phone
(870) 245-5566 – Fax


Moodle 3.8 Release

The Open LMS (Moodle) 3.8 production release will be applied July 9th  at 12:30 AM – 6:30 AM CDT. Service to the site will be unavailable during this time. For details on changes available in this new version, see Moodle 3.8 Release Highlights.


Online Teaching and General Support Options

Online teaching tools  –

Direct link to get started with Zoom –

For all other requests please email or call 870-245-5567.


Moodle 3.6 Release

The Open LMS (Moodle) 3.6 production release will be applied July 11th, 2019 between 12:30 and 6:30 am CDT. Service to the site will be unavailable during this time. For details on changes available in this new version, see Blackboard Open LMS 3.6 Release Notes.


Desktop Central

As the end of the school year approaches, Facilities Management and I.T. Services are gearing up for a busy summer.  One of the projects I.T. is working on this summer is to update the versions of software on our fleet of desktop and laptop computers.  To help in this endeavor, we will be employing a new remote desktop management software package called Desktop Central.  This software will be loaded on each computer automatically.  This does not affect your system performance in any way.  Below are the things that Desktop Central does and does not do:

What it does:

1.    Allows I.T. to push out updates to the software on your computer.  We have reached a point where it is critical to keep the versions of software on our computers up to date.  Malicious code that exploits security flaws in older software versions is increasing at an alarming rate.

2.    Windows 7 security patches are ending this summer and we must deploy Windows 10.  Desktop Central can remotely install Windows 10.

3.   Allows I.T. to keep a better inventory of the software we have deployed.  This is useful so we can stay in compliance with our software licensing agreements and to ensure antivirus and malware protection is installed.

4.    Has a screen sharing feature like Teamviewer, that I.T. currently uses for remote support.  *See note below on screen sharing and remote access policy.

What it does NOT do:

1.    Desktop Central in no way audits or logs any activity on your computer.

*Screen sharing and remote access policy:  Occasionally it is necessary for an I.T. employee to connect to a desktop/laptop computer on campus to help troubleshoot a problem. I.T. has a policy on when/how screen sharing and remote access tools are used.

1.    I.T. will never launch a screen sharing session without permission from the computer owner/user.

2.    All screen sharing sessions are logged to ensure a proper audit trail exists.

3.    No software updates will be made without first notifying the person that will be affected by the change. The one exception are security patches.  They are internal code changes and generally do not have a noticeable effect on a computer’s performance.  They are pushed out automatically without prior notification.


External Email Notification

Effective 2/20/2018 any email that arrives from off-campus will have the phrase [EXTERNAL EMAIL] added to the subject line.  If you see [EXTERNAL EMAIL] prepended to the subject of an email that also appears to be coming from someone within our community, you know something is wrong!

This is being done to help you spot potential email scams. It is NOT the end all.  Regardless you must assess any email you get, internal or external, for legitimacy.  There could be a situation where this does not get prepended or we could still have a compromised email account that might be used to email our campus from within our own community.  We live in a world now where you have to be suspect of everything.  Don’t trust anything without verifying first.  We have a major advantage over the people sending these scam emails.  We know each other.  Through conversations we know phrases our colleagues use, how they construct sentences, address each other, etc.  Look for those things when verifying. Don’t go strictly by the name of the sender, check the email address as well.