Support Articles

July 24, 2018 - 1:57 pm
  Before you begin, browse to Google Groups for uni.edu to see a list of the groups you a member of.  To do this, log into your UNI Gmail account, you can click on the apps grid icon at the top, then on "Groups". If the URL in the address bar does not specify uni.edu, you are at Google's public group directory which is not maintained by UNI.  Click on http://groups.google.com/a/uni.edu to be sure you are at UNI's Google Groups page. Videos   Remove members from a group   Add members to a group To remove members from a group that you manage: On the "my groups" page, click on the group...
July 24, 2018 - 1:57 pm
For updated documentation, visit: https://servicehub.uni.edu/docs/display/SH/Configure+Remote+Desktop+Connection+in+Windows
July 24, 2018 - 1:57 pm
  The following table provides a brief description of the available lists: (see below for procedures and how to obtain permission to send) Description List Name Institutional Officials  President, provost, vice presidents and library and college deans HRS-Inst-Off  Academic Administrators  Academic department heads, associate/assistant deans, associate/assistant provost, and directors or administrators who supervise bargaining unit faculty HRS-Acad-Admin  Tenure/Tenure Track Faculty  Probationary or tenured faculty...
July 24, 2018 - 1:57 pm
Panopto is a lecture capture software that allows you to create, save, search and share rich media presentations instantly with your students. The software can be installed on Apple or Windows machines. All you need is a microphone and a computer to get started. For more information about Panopto and how you could use it for your classes, please contact via Service Hub or call 273-5555 and ask for more details. View sample videos recorded at UNI. Apply for a Panopto Account Faculty/staff: If using Panopto with eLearning there is no need to apply for an account. Please see "Link your...
July 24, 2018 - 1:57 pm
When traveling in China, you may find that access to Google's GMail service is blocked at the country's "Great Firewall."  This can often be circumvented by use of a third-party VPN service that you've purchased prior to your trip. However, please keep in mind that electronic eavesdropping is considered to be widely prevalent in China, and the computers of foreign travelers are often compromised in an attempt to gain access to research and corporate data.  In short, if you can live without your e-mail for the duration of your stay, that's the safest thing to do.  If you can't, consider taking...
July 24, 2018 - 1:57 pm
Submitted Role Requests   In this example we have logged in as user gp259235; Glen Parks. In the Submitted Role Request section we are looking at role request he submitted, either for himself or any other employee he requested roles for.  In this example Glen has 6 active requests. By left clicking on any column headings you can sort by ascending or descending order.     Glen can check the status of the roles he requested here. The status list is below:   Role Request Status List SRS-SUBMITTED                                 Request submitted in SRS (this will not be seen if...
July 24, 2018 - 1:57 pm
UNI Security Request System This document is intended to introduce you to the Security Request System (SRS) and explain why it was built, how it works, how to get help in using it and the initial steps for going live.  If you have questions on the system, please contact the IT Service Desk (x3-5555 or servicedesk@uni.edu) and they will either answer your question or get you in touch with someone that can. Why do we need a system to manage security requests? The Security Request System (SRS) was identified as a need here at UNI after the implementation of the e-Business system.  Paper forms...
July 24, 2018 - 1:57 pm
The University of Northern Iowa is committed to protecting the data entrusted to its care.  An easy and relatively transparent way to aid in achieving this goal is the encryption of hard drives used on university-owned computers.  Whole Disk Encryption (WDE) works by converting the data stored on the drive in such a way that it is undecipherable without the decryption key, thereby protecting the data from theft if the computer is stolen or operated by an unauthorized person.  When an authorized user starts the computer and logs in, their passphrase permits the computer to decrypt the contents...
July 24, 2018 - 1:57 pm
Private web browsing is a privacy feature in some web browsers to disable browsing history and the web cache. It can be used as an alternative to needing to clear your browser history. Firefox Click the menu button in the top right corner with three lines and then click New Private Window. Chrome At the top right, click the three vertical dots (More) and then New Incognito Window. You can also use a keyboard shortcut to open an Incognito window:     Windows, Linux, or Chrome OS: Press Ctrl + Shift + n.     Mac: Press ⌘ + Shift + n. Safari Choose File > New Private Window Edge...
July 24, 2018 - 1:57 pm
To log into Oracle E-Business, follow the instructions below: Open a web browser in a private browsing mode. If you already have a private browser open, close it and create a new session. Visit ebiz.uni.edu. Note: You will need to type this address into your browser, not browse to it through myUNIverse. Sign in with your CatID username: You'll be greeted by the Secure TextPad. Enter your passphrase in the field below password and choose Enter: If this is the first time you're signing in, follow the instructions on configuring your phone to sign into Duo. Otherwise, you will receive...

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub