Support Articles

July 24, 2018 - 1:57 pm
Information Technology has deployed the eduroam network to select outdoor locations on campus. Work will continue to install access points in places where students, faculty, and staff congregate outdoors. The following map shows the current coverage area in purple. The areas in yellow will be coming soon.  
July 24, 2018 - 1:57 pm
UNI Alumni are eligible to have a Google Alumni email account after graduation. To sign up, follow the steps below: You will receive an email with signup instructions, directing you to sign up through emailrequest.uni.edu Use your CatID to sign in. After signing in, your eligibility will be shown. Eligible Alumni If you're eligible for a new account, you can sign up and log in: Click on the Request an Alumni account link: Select a new email address in the @alumni.uni.edu domain: Type in a password for your account (at least 15 characters long). Tip: Write this down to help...
July 24, 2018 - 1:57 pm
Anti-virus and anti-spyware software, more easily defined as anti-malware software, are probably the most important pieces of software any Windows system can have.  While Macs, Linux, and other systems are vulnerable to virus and spyware attacks as well, the design of their systems and their lower market share has made them less desirable to malicious software developers. PLEASE NOTE: This article is intended for personally-owned machines only.  UNI systems should have their anti-virus and anti-spyware software managed by the appropriate support staff. Why do they want to Attack my System...
July 24, 2018 - 1:57 pm
Q: I have other calendars (rooms, resources, etc.) that I need to create, how can I do this? Departmental resources will be maintained by the department and are not maintained centrally.  The resources (meeting rooms, etc.) are setup as a separate calendar (i.e. the room calendar) and when you invite the (room) to the meeting you have to invite the rather long calendar ID found by looking at the resource's settings to the right of "Calendar Address:".  Critical components are that you need to only give edit rights to only those individuals actually maintaining the calendar settings plus...
July 24, 2018 - 1:57 pm
  Exporting Google group members: Login to your UNI email account at www.uni.edu/email Click on the "Groups" link at the top of the page. On the "My Groups" page, click on the group to be managed. Click on the "Manage" button at the top right next to the gear icon Click the "Export Members" button
March 12, 2018 - 10:46 am
Text Fields Text fields (single row, not the multi-row Text Areas) should generally always be set to be inline, so the label is next to the Text Box, not above it. It shortens the length of the form and in most cases improves the layout.  Using Proper Fields When creating fields in a form, be sure you're using the proper Field Type for each one. In the case below, a Text Field type was used for an email field. Email fields should always use the Email Type. That allows the developer to also set a reply email field to the person submitting the form.  Date and/or Time are other field...
March 12, 2018 - 10:45 am
The information below are the best practices we try to adhere to when creating web pages. Some of them are to provide a better experience with mobile devices or for users with a screen reader. Others are for general user experience and readability.  Content Layout and Presentation Limit use of divs and inline styles in the body of a page to keep the look and feel consistent. Use the Remove Format tool in the WYSIWYG editor to remove inline styles from a page that has a lot.  Don't use tables for layout, tables should only be used for presenting data that needs to be in a table...
February 28, 2018 - 10:13 am
Cat ID Passphrase Complexity Requirements A passphrase must be at least 15 characters long (maximum is 30) and may contain both uppercase and lowercase letters, numbers, symbols, and spaces. While there are no specific requirements for different types of characters to be used, a combination of characters is recommended, such as "my 3rd car was a T-bird" or “I love my passphrase”.  Other important details include:  Passphrases cannot begin or end with a blank space Passphrases can contain US English characters Passphrases cannot contain more than three (3) repeated characters (...
February 28, 2018 - 9:21 am
Students, Staff and Faculty Individual Account Students, Staff and Faculty may request access to the University Web Hosting service by filling out the following electronic form. https://www.uni.edu/its/forms/web-space-account-request-form Class Requests Sometimes Faculty teach classes in which they require students have a Web Account. If you are a Faculty member that would like to make such a request, please fill out the following electronic form. https://www.uni.edu/its/forms/request-web-accounts-your-class
February 28, 2018 - 8:59 am
Before selling or discarding an old computer, or throwing away a disk or CD, you naturally make sure that you've copied all of the files you need. You've probably also attempted to delete your personal files so that other people aren't able to access them. However, unless you have taken the proper steps to make sure the hard drive, disk, or CD is erased, people may still be able to resurrect those files. Where do deleted files go? When you delete a file, depending on your operating system and your settings, it may be transferred to your trash or recycle bin. This "holding area" essentially...

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub