Support Articles

July 24, 2018 - 1:57 pm
Anti-virus and anti-spyware software, more easily defined as anti-malware software, are probably the most important pieces of software any Windows system can have.  While Macs, Linux, and other systems are vulnerable to virus and spyware attacks as well, the design of their systems and their lower market share has made them less desirable to malicious software developers. PLEASE NOTE: This article is intended for personally-owned machines only.  UNI systems should have their anti-virus and anti-spyware software managed by the appropriate support staff. Why do they want to Attack my System...
July 24, 2018 - 1:57 pm
Q: I have other calendars (rooms, resources, etc.) that I need to create, how can I do this? Departmental resources will be maintained by the department and are not maintained centrally.  The resources (meeting rooms, etc.) are setup as a separate calendar (i.e. the room calendar) and when you invite the (room) to the meeting you have to invite the rather long calendar ID found by looking at the resource's settings to the right of "Calendar Address:".  Critical components are that you need to only give edit rights to only those individuals actually maintaining the calendar settings plus...
July 24, 2018 - 1:57 pm
  Exporting Google group members: Login to your UNI email account at www.uni.edu/email Click on the "Groups" link at the top of the page. On the "My Groups" page, click on the group to be managed. Click on the "Manage" button at the top right next to the gear icon Click the "Export Members" button
July 24, 2018 - 1:57 pm
Google Apps for Education Core Services Include: Google Email (Gmail) - [ http://google.uni.edu/email  or http://email.uni.edu ] 30 GB of storage is available for Gmail, Drive (see below), and Google+ photos combined.  Gmail is securely powered by the web, so you can be productive from your desk, on the road, at home, and on your mobile phone. Google Calendar - [ http://google.uni.edu/calendar ] With Google Calendar, you can schedule meetings and events with your friends and classmates. Google Drive - [ http://google.uni.edu/drive ] With Google Drive, you can easily collaborate on...
July 24, 2018 - 1:57 pm
CatID Passphrase Complexity Requirements A passphrase must be at least 15 characters long (maximum is 30) and may contain both uppercase and lowercase letters, numbers, symbols, and spaces. While there are no specific requirements for different types of characters to be used, a combination of characters is recommended, such as "my 3rd car was a T-bird" or “I love my passphrase”.  Other important details include:  • Passphrases cannot begin or end with a blank space • Passphrases can contain US English characters • Passphrases cannot contain more than three (3) repeated characters (e.g., “...
July 24, 2018 - 1:57 pm
  The following table provides a brief description of the available lists: (see below for procedures and how to obtain permission to send) Description List Name Institutional Officials  President, provost, vice presidents and library and college deans HRS-Inst-Off  Academic Administrators  Academic department heads, associate/assistant deans, associate/assistant provost, and directors or administrators who supervise bargaining unit faculty HRS-Acad-Admin  Tenure/Tenure Track Faculty  Probationary or tenured faculty...
July 24, 2018 - 1:57 pm
Panopto is a lecture capture software that allows you to create, save, search and share rich media presentations instantly with your students. The software can be installed on Apple or Windows machines. All you need is a microphone and a computer to get started. For more information about Panopto and how you could use it for your classes, please contact via Service Hub or call 273-5555 and ask for more details. View sample videos recorded at UNI. Apply for a Panopto Account Faculty/staff: If using Panopto with eLearning there is no need to apply for an account. Please see "Link your...
July 24, 2018 - 1:57 pm
When traveling in China, you may find that access to Google's GMail service is blocked at the country's "Great Firewall."  This can often be circumvented by use of a third-party VPN service that you've purchased prior to your trip. However, please keep in mind that electronic eavesdropping is considered to be widely prevalent in China, and the computers of foreign travelers are often compromised in an attempt to gain access to research and corporate data.  In short, if you can live without your e-mail for the duration of your stay, that's the safest thing to do.  If you can't, consider taking...
July 24, 2018 - 1:57 pm
  My Roles     The User Roles area contains all your current roles. The highlighted roles are the one generated automatically. By left clicking on any of the column headings you can also sort by ascending or descending order.   In this case the three E-Business roles are automatically generated. The two Web Custom roles were requested and added.     The search option under the User Roles can be used as a filter.     If you select the Web Custom selection in the system pulldown tab and hit search, the following will come up. This can be used to filter out what you don’t wish...
July 24, 2018 - 1:57 pm
Search Roles Search Roles is a function that allows you to get information on different roles.   In the system pulldown box select a system and left click the "search role" button.     You left click the radio button to the left of the role under the select column and can then select to view the role or request the role by left clicking the corresponding button.     When you click the "View Role" button the following information on the role will appear.     To return to the Search Role page just left click the "back to role search" button.        If you have...

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub