How To Get A Computer At Unmass Amherst
|
|
- Beverly Reynolds
- 3 years ago
- Views:
Transcription
1 COMPUTING & TECHNOLOGY at UMass Amherst Parents guide to technology resources
2 Important! Does your student already have a computer to bring to campus? If not, do you intend to purchase a computer before the end of the summer? 2
3 Computer Basics Check our recommended computer configurations U$ave discounts on computers & peripherals Computers must have a wifi-certified, dual-band adapter 3
4 Software & Hardware Discounts STEM students are eligible for free Windows operating systems & other Microsoft software Free Microsoft Office 365, Mathematica & other software Free distribution of Linux - Ubuntu UMass Students are not required to bring a computer 4
5 Public Computers Computer Classrooms & Library Services Windows & Macintosh computers High-end academic software Remote printing in the Learning Commons Digital Media Lab 3D Printers 5
6 Important! How many of you would like access to your student s university bill? 6
7 Privacy & Student Records Federal law limits access to student records. FERPA Privacy Waiver Students can add up to 4 designees in SPIRE PIN can be used when contacting the Office of the Bursar, Financial Aid, and Housing Services Waiver does not apply to academic records (grades) or other university information 7
8 Copyright Infringement UMass Amherst receives hundreds of violations each semester Violators may be subject to legal action, fines, and even academic sanctions Out-of-court settlements, paid by students families, can be very expensive! 8
9 How to Avoid Copyright Infringement Uninstall peer-to-peer (P2P) software, including bittorrent, popcorn time, and other illegal file sharing programs Use Amazon, Pandora, Hulu, Netflix, or other legal alternatives Take our anonymous Copyright Quiz! 9
10 Computer & Personal Protection Software & Data Security Anti-virus software Security patches Software updates Firewall File backups Physical Security Laptop security cable Lock the door Over 100 HELP phones across campus 10
11 Beware of Phishing & Identity Theft Students should not: Post their address, birth date, or class schedule on social networking sites Send sensitive information via in response to official messages Do not ask students for their NetID or password The university will never ask for account passwords or other sensitive personal information via . 11
12 How many of you will discuss Copyright Infringement Software & Data Security Phishing on the ride home with your student? 12
13 Go Wireless with eduroam! In all residence halls & many campus locations Wifi-certified, dual-band adapter required More secure, encrypted network access Automatic login once configured Wireless access at peer institutions Run the XpressConnect setup wizard from home! 13
14 Devices to Leave at Home Signals from wireless-enabled devices can interfere with the campus wireless network. Wireless printers Wireless routers/hotspots Apple Time Capsule Wireless controllers & other peripherals 14
15 UMass Amherst IT Services Moodle Online Courses Google Apps & Collaboration OWL Online Web Learning Atomic Learning Software Tutorials Go.Umass Online Web Portal i>clicker Audience Response System 15
16 Technology Support & Resources Visit our website: it.umass.edu Contact the IT User Services Help Center Chat with us live Submit an online help request Call TECH (8324) or Stop by A109 LGRC Lowrise Monday Friday 8:30 a.m. 4:45 p.m. IT Consultants are also available in the Learning Commons on the Lower Level of the W.E.B. Du Bois Library. 16
17 Student Employment Positions available for year-round work: Computer Classrooms consultants Help Center consultants All majors welcome. Application details available at: it.umass.edu/about/employment 17
18 Students Should Stay Informed youtube.com/umassamherstit blogs.umass.edu/techbytes it.umass.edu/events 18
19 Questions? it.umass.edu
ResNet Guide. Information & Learning Services. Here to support your study and research
ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,
More informationGetting Connected. Student Technology Services
Getting Connected Student Technology Services 2015-2016 Contents Welcome 3 Your Computer 4 Network Services 5 Network Assistance 6 Emergency Notification 8 Labs and Printing 9 Student Technology Store
More informationIntroduction to Technology at Immaculata University. www.immaculata.edu
Introduction to Technology at Immaculata University IU Campus Network Username: first initial + last name (e.g. John Smith = jsmith) Note: There may be a number at the end of your username if you have
More informationIntroduction to Computing @ WSU
Introduction to Computing @ WSU Table of Contents 1 - Account Information... 2 2 - Setting up Accounts for First Time Use... 3 3 - Important Systems... 4 4 - CaTS Website... 5 5 - Logging into the Campus
More informationComputer, Phone, and Network Guidelines at Lipscomb University. Mike Green, VP and CIO Lipscomb University mike.green@lipscomb.
Computer, Phone, and Network Guidelines at Mike Green, VP and CIO mike.green@lipscomb.edu (615) 966-5667 1 Open Lab Computing Availability There are about 250 student-accessible computers across the campus
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationIf you re illegally downloading music from P2P filesharing applications like KaZaA, BitTorrent, or Limwire not only is your computer at risk for viruses, but you re at risk for school suspension, heavy
More informationAbout This Guide. Security considerations are denoted by a lock icon.
About This Guide This guide introduces students to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible. It is an overview of the
More informationCorporate Information & Computing Services. IT Services For University Staff.
Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate
More informationComputing Services and Systems Development 2015 2016 PittStart
Computing Services and Systems Development 2015 2016 PittStart CSSD @ Pitt We provide the technology tools and services that make your life at Pitt easier! Visit us at technology.pitt.edu Presentation
More informationStudents. Information Technology Support Services Fall 2015
Information Technology Support Services Fall 2015 Students On behalf of Information Technology, we would like to welcome you to USF. Our job is to make sure you receive the necessary support to complete
More informationBefore we get started
www.ndsu.edu/it Before we get started Your IT Accounts N.D. University System Identifier Typically FirstName.LastName Use to access: Campus Connection Register for classes Pay tuition and fees NDSU Electronic
More informationGet Connected! How to Configure Your Computer for MITnet. Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista
Get Connected! How to Configure Your Computer for MITnet Red Hat Enterprise Linux Mac OS X Windows XP Professional, Vista 2008 Massachusetts Institute of Technology Table of Contents Introduction...3 About
More informationCYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff
CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal
More informationCertified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
More informationThe Student Guide to Information Technology at Landmark College
The Student Guide to Information Technology at Landmark College Information technology is an integral part of every aspect of Landmark College's education program. It affects everything from the network
More informationSecurity considerations are denoted by a lock icon.
About This Guide This guide introduces you to some of the technology resources available at the University of Iowa, with the aim of making those resources easily accessible to you. It is an overview of
More informationGetting Your Multifunction Back On Your Network After A Router Or Network Change
Getting Your Multifunction Back On Your Network After A Router Or Network Change PIXMA MX340 Windows OS 1 If any of the following situations exist, you will need to Uninstall and Re-Install the MP Drivers
More informationSophos Mobile Control User guide for Android
Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
More information1-port USB 2.0 Print Server. Manual (GPSU21)
1-port USB 2.0 Print Server Manual (GPSU21) 2006 IOGEAR. All Rights Reserved. Part No. M0374 IOGEAR, the IOGEAR logo, is trademarks or registered trademarks of IOGEAR, Inc. Microsoft and Windows are registered
More informationComputer Security at Columbia College. Barak Zahavy April 2010
Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a
More informationInformation Technology Resources
Student Guide 2011-2012 office of the Chief Information Officer Information Technology Resources IT.OSU.EDU The student guide to computing, learning technologies, cable TV, Buckeye Mail, safe computing,
More informationMcGill-Toolen Catholic High School Technology Acceptable Use Policy
McGill-Toolen Catholic High School Technology Acceptable Use Policy Ben Fancher Director of Instructional Technology June 24, 2015 Ben Fancher email: fancheb@mcgill-toolen.org McGill-Toolen Catholic High
More informationCorporate Information & Computing Services. IT Services For University Staff.
Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate
More informationSophos Mobile Control User guide for Apple ios. Product version: 4
Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set
More informationStudent Affairs Information Technology Policies. January 2013
Student Affairs Information Technology Policies January 2013 Contents Applications Consultants and Non-SAIT Technical Staff Computers and Equipment Data: Local, Network, and Backups E-Mail Relationships
More informationFaculty technology Reference Guide
Faculty technology Reference Guide 2015-2016 CONTACTS CENTER FOR INSTRUCTION AND TECHNOLOGY (CIT): 422-2223 Basement of School of Education [ cit@usfca.edu ] CLASSROOM TECHNOLOGY: 422-6668 Lone Mountain
More informationAeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network
AeroLab Wireless Network Code of Conduct The AeroLab wireless network is intended for academic use only. Any use of the wireless network for BitTorrent or other Peer-to-Peer file sharing is strictly prohibited.
More informationSimon School IT FAQ Guide
Simon School IT FAQ Guide 1 What Are The Suggested Specs My Computer Should Have? The Simon School Information Technology Department can make the following suggestions: Windows XP Operating System 1) CPU
More informationMcDonough School of Business: MSBTC SLA 2014
McDonough School of Business: MSBTC SLA 2014 Contents Service Level Agreement... 4 Contacting a Technician... 4 MSBTC Hours of Operation... 5 Trouble Call Problem Priority... 5 Priority 1... 5 Priority
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
More informationSecurity Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit
Security Audit Survivor How to Remain On the Island in the Wake of the Piedmont Audit Marc D. Goldstone Vice President and Associate General Counsel Community Health Systems Gerald Jud E. DeLoss Gray Plant
More informationDIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks:
DECS Community IT Michigan State University College of Engineering DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK For all questions and requests visit www.egr.msu.edu/decs or 1325EB, e mail
More informationPeer to Peer File Sharing and Copyright Infringement Policy
Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct
More informationSophos Mobile Control User guide for Android. Product version: 4
Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up
More informationResNet Computer Consultant Job Description
ResNet Computer Consultant Job Description Description: ResNet is the Internet Service Provider within the Residence Halls and Family and Graduate Housing at Montana State University. In addition to providing
More informationGet In, Get Unpacked, Get Connected.
Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. WELCOME to your New Home and to Unlimited Free Internet Welcome to your new university accommodation and to unlimited free
More informationCertified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
More informationCentury Commons' Internet Use
Century Commons' Internet Use Please Note: Even though you are unable to access the Internet, the sites below are always available. Open up Internet Explorer and type any of these in your address bar to
More informationCommon Student Computing Environment
Getting started Computer clusters www.gla.ac.uk/services /it/forstudents University central provision University Library McMillan Reading Room Fraser Building Social Sciences College provision Stair Building
More informationCarl H. Lindner College of Business
Carl H. Lindner College of Business Information Technology Overview Autumn 2013 Shannon Funk Director of Information Technology Shannon.Funk@uc.edu LCB IT Team Shannon Funk Director of Information Technology
More informationIT user guide. Campus WiFi eduroam. September 2015. www.kent.ac.uk/itservices Information Services
IT user guide Campus WiFi eduroam September 2015 www.kent.ac.uk/itservices Information Services Before you get online Hello eduroam! You can pick up the University WiFi service eduroam in all indoor spaces
More informationEMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call
More informationReferences NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
More informationBCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
More informationLaw College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
More informationMANDATORY EMR FUNDING ELIGIBILITY SCHEDULE
MANDATORY EMR FUNDING ELIGIBILITY SCHEDULE The following terms and conditions form a part of the terms and conditions of the contract to which it is attached as a schedule. The subscriber/licensee (in
More informationWestchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents
Westchester Community College Student Technology Use Policy Version 2 / April 2015 Table of Contents Introduction... 2 Prohibited Use... 2 Electronic Communication & Computer Usage... 3 Identification
More informationNetworking in the Colleges
Networking in the Colleges A Guide For Internal & Intensive School Students Contents Appropriate Use and Your Obligations... 1 Virus Protection... 2 Minimum Computer Requirements... 2 Registering Your
More informationAgenda. The Bridge New Hire Wizard Security Groups in ezlabormanager and Workforce Now 2.0 ADP Mobile Support Center https://support.adp.
It s About Time! Agenda The Bridge New Hire Wizard Security Groups in ezlabormanager and Workforce Now 2.0 ADP Mobile Support Center https://support.adp.com The Bridge The Bridge There are currently 285
More informationCyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
More informationBasic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases
M20462 Administering Microsoft SQL Server Databases Description: This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The
More informationCyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
More informationSophos Mobile Control User guide for Apple ios
Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
More informationTechnology Quick Reference revised Fall 2014
Where do I go? www.sandburg.edu mysandburg Student Portal Click on the link in the upper right-hand corner of the Sandburg website What is it? How can I use it? Carl Sandburg College website. All general
More informationWireless Home Network Setup. Dan Wenz Chris Kiscaden
Wireless Home Network Setup Dan Wenz Chris Kiscaden Key Questions Why is wireless beneficial? What are the necessary components? What do these components do? How do I set up a wireless network? Why wireless?
More informationPlease review and make copies of the following documents for each designated staff in need of Valley Express access.
Welcome to Valley Express (VE) Valley Express is Valley Health Plan s (VHP) Authorization and Referral data system. By signing this document, the individual signifies that the County s User Responsibility
More informationIntroduction to Computing @ WSU
Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information
More informationBRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
More informationEssentials. IT services for undergraduate and. taught postgraduate students 2015/16
Essentials IT services for undergraduate and taught postgraduate students 2015/16 Getting Started Activate your computing account This guide will help you to get started with the IT services you will use
More informationOffice of Information Technology. Welcome
Welcome Main Offices in Echlin Hall M-F 8:30-4:30 Vincent Mangiacapra Associate VP/CIO 203-932-7058 / VMangiacapra@newhaven.edu Greg Bartholomew Director of Networking/Systems Operations 203-932-7059 GBartholomew@newhaven.edu
More informationBring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
More informationYale School of Art Digital Technology Office Information
Yale School of Art Digital Technology Office Information Online: http://art.yale.edu/diglab/ Email: art.help@yale.edu Phone: 203-432- 9120 Edgewood Email: sculpture.help@yale.edu The Digital Technology
More informationAirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
More informationComputing Orientation
Computing Orientation Welcome to Carnegie Mellon! Computing Orientation Online Orientation Computing Resources Websites Security Online Orientation http://www.heinz.cmu.edu Current Students -> Computing
More informationInformation Technology Services August 19, 2015 - Fall 2015
Information Technology Services August 19, 2015 - Fall 2015 IT Services Cover All of the University and Community 2 Internally Connected University & Community Teaching & Learning Research Support R&D
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationInternet and Cable Television Connection Kit. Spring 2016
Spring 2016 Internet and Cable Television Connection Kit Your guide to connecting to network and television services within Northeastern s residence halls. ITS Welcomes You! Information Technology Services
More informationSophos Mobile Control User guide for Windows Phone 8. Product version: 3.5
Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5
More informationAMBERTON UNIVERSITY e-course SYLLABUS
AMBERTON UNIVERSITY e-course SYLLABUS MGT6154.E1 PROJECT MANAGEMENT APPLICATIONS SPRING 2016 PROFESSOR INFORMATION: Name: Dr. Ron C. Darnell Phone Number: 972-279-6511 ext. 152 (Use Amberton ext. #) Email
More informationCYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff
CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff I N T R O D U C T I O N This tutorial provides some basic information and practical suggestions for protecting
More informationDiscovering Computers
Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown
More informationSecure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.
Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password
More informationColumbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD)
Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD) Contents PURPOSE AND PLAN... 3 FREQUENTLY ASKED QUESTIONS... 4 STUDENTS... 4 STAFF... 5 PARENTS... 6 POLICY REFERENCES
More informationHIGHER EDUCATION LEADERSHIP & MANAGEMENT GRADUATE CERTIFICATE STUDENT HANDBOOK
HIGHER EDUCATION LEADERSHIP & MANAGEMENT GRADUATE CERTIFICATE STUDENT HANDBOOK 2015-2016 Higher Education Program Educational Policy, Research & Administration College of Education University of Massachusetts
More informationInsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
More informationEmployee Service Level Agreement
Employee Service Level Agreement 1.0 Purpose 2.0 Term and Scope of Agreement 3.0 Scope of Service 3.1 Support Environment 3.2 Local Computer Administrative Privileges 4.0 Support Response Levels 4.1 Exceptions
More informationVersion 2 January 2015
Version 2 January 2015 IT SUPPORT HANDBOOK FOR BYO DEVICES 2015 INSTALLING SOFTWARE... 1 Microsoft Office... 1 Setting up Office preferences... 5 Setting up your College email account for the first time
More informationMSP Center Plus Features Checklist
Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,
More informationTable of Contents. 1. Specifications of your laptop:
Parent/Student Laptop Manual 2012-2013 Table of Contents 1. Specifications of your laptop: 2. Terms of Use: a. Title b. Loss or Damage c. Repossession d. Use and Maintenance Fees e. Network Use f. Internet
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
More informationHow To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
More informationRichardson ISD. BYOD Bring Your Own Device
Richardson ISD BYOD Bring Your Own Device BRING YOUR OWN DEVICE It is a goal of the Board of Trustees of the Richardson Independent School District (RISD or the District) that students are prepared for
More informationSophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011
Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up
More informationBefore you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3
Advanced IT user guide Staff laptop setup For staff laptops owned by the University Contents Before you begin 2 Initial laptop setup 2 Configure Microsoft update 3 Install University of Kent programs 3
More informationService Level Standard
Service Level Standard Personal Devices Revision History Date Version Changes 2/17/2012 1.00 Initial Draft Special Note: Service Level Standards will be reviewed and updated following the end of the spring
More informationInformation Technology Services (ITS) Update
May 9, 2012 Dear Trinity Community, Information Technology Services (ITS) Update As the flurry of the end of a busy spring semester comes to close, Information Technology Services is gearing up for many
More information1:1 LAPTOP PROGRAM FAQS
1:1 LAPTOP PROGRAM FAQS Accessories Batteries Breakage, Theft or Loss Costs Distribution File Access and Storage Internet Access Loaner Laptops Logging in Ownership Personal Use Philosophy of Program Printing
More informationWelcome to Vernier LabQuest Viewer Software v1.0 Note: LabQuest Viewer Features Set up LabQuest 2 to work with LabQuest Viewer software via Wi-Fi
Welcome to Vernier LabQuest Viewer Software v1.0 The LabQuest Viewer is computer software that is used to display and control the screen of a LabQuest using a computer. This can be done to demonstrate
More informationUseful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs
Useful Tips for Reducing the Risk of Unauthorized Access for Laser Beam Printers and Small-Office MFPs (LBP and MF series) Important: System administrators are advised to read. Overview and Use of this
More informationUse of ESF Computing and Network Resources
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
More informationAzMERIT Secure Browser Installation Manual For Technology Coordinators
AzMERIT Secure Browser Installation Manual For Technology Coordinators 2014-2015 Revised January 5, 2015 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information
More informationUW IT Help Desk - Best Email Storage SkyDrive, Office 365
Fall 2013 In this issue: Welcome Help Desk - Best IT Resource More Email Storage SkyDrive, Office Web Apps Faster Response Times Training Workshop Schedule Classroom Technology Computing Research Support
More informationTE100-P21/TEW-P21G Windows 7 Installation Instruction
Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click
More informationSophos Mobile Control user help. Product version: 6.1
Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6
More informationA guide to the systems & procedures utilized
Student Guidebook A guide to the systems & procedures utilized in your DeVry education 1 Table of Contents IT Helpdesk - Hours of Operation. 3 IT Helpdesk - Contact Information... 3 Student Accounts. 4
More informationIT Information Packet
IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology
More informationSharing Pictures, Music, and Videos on Windows Media Center Extender
Sharing Pictures, Music, and Videos on Windows Media Center Extender Applies to: Microsoft Windows XP Media Center Edition Microsoft Windows Media Center Extender Microsoft Windows Media Center Extender
More informationNew Student Checklists
New Student Checklists Before the Semester Begins Get Your Education Benefits in Check Veteran Education Benefits Visit the VONAPP (Veterans On Line Application) website to apply for your GI Bill benefits.
More informationIntel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
More information