Search 31 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
Recommended rules for Password Creation and Password Sync
and numbers rather than special characters.
We have found that passwords that meet these standards work best.
Sync password
If your password is 16 characters or longer and you are having
Technology Solutions Rate and Funding Model
performance computing; printing services; special circuits; specialized consulting and support; storage services (beyond basic bundle); and virtual servers. The cost for these services is recovered
What do I do now that I have been assigned as Phonebook Contact for my department?
the various directory related tasks. PbContacts are automatically added to the PbContact listserv list which is used to send them announcements and other important information.
PbContacts have access
How do I grant other users access to my server backup tenant?
has no special permissions. You can grant these users additional permissions on specific objects, such as backup clients, as desired within the Commvault Command Center web interface in the area shown
How do I connect to a database on a Linux virtual server?
virtual servers are regularly polled for existence of "/phpmyadmin" and variations. Though you can limit the risk by crafting a special URL to access PhpMyAdmin, a desktop tool poses less risk and does not require as much maintenance.
How can I check my Junk/Spam Email Folder in Outlook and Gmail?
will be sent to the "Junk Email" (Outlook/Exchange) or "Spam" (Gmail) folder in your mailbox.
Email routed through our Listserv email list system that might be spam will have a ***SPAM*** tag
What information should I include when naming Azure resources?
.
In general, avoid having any special characters (- or _) as the first or last character in any name. These characters will cause most validation rules to fail.
General
Entity
Scope
Length
How do I activate my NetID as a student or external affiliate?
) special character (no spaces).
Must NOT contain four (4) sequential characters of your NetID.
Passwords shorter than sixteen (16) characters cannot contain words from the dictionary longer than three (3
How do I use Jamf?
Managing Packages
Packages in the following formats can be administered using Jamf Pro:
DMG
PKG
MPKG
Note: There are special instructions for managing macOS Installers, and Adobe
How do I use Jamf?
Managing Packages
Packages in the following formats can be administered using Jamf Pro:
DMG
PKG
MPKG
Note: There are special instructions for managing macOS Installers, and Adobe
What are the Box terms of service?
, CONSEQUENTIAL, EXEMPLARY, PUNITIVE, SPECIAL, OR INCIDENTAL DAMAGES ARISING IN CONNECTION WITH THIS AGREEMENT, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR IF SUCH POSSIBILITY WAS REASONABLY
How can I use Microsoft 365 and Microsoft Bookings to schedule and manage appointments?
requires advanced
training or special certifications. If so, only assign the staff members
who hold those credentials. If the staff member you want to assign
isn't in the list, you'll have to go to
Can I merge two courses and have all students be on one course site?
course site. While this is not something you can do directly, Technology Solutions is here to help! Simply fill out our brief request form and one of our support specialists will be happy to promptly take
Who do I contact for iClicker Support?
http://go.uic.edu/iClickerSupport
UIC is also assigned our own iClicker Client Relationship Specialist that instructors can feel free to contact regarding technical issues:
UIC's
What are Technology Solutions's self-supporting services' costs and rates?
Specialized Consulting Hourly Rate
Hourly rate for Network and Telecommunications Installations: $70
Hourly rate for Technology Solutions Specialized Consulting: $55