Skip to main content

IT Professionals

When you’re organizing a Zoom session, it’s important to take steps to prevent unwanted attendees and unwanted behavior (“ zoombombing ”). Options include setting passwords, limiting who can enter your meeting, restricting what attendees can do in the meeting, and not publishing meeting links...Read more

Zoombombing is when an unwanted attendee—possibly from outside the university—disrupts an online meeting. It’s been on the rise as web meetings become essential to keep higher education going. The university has taken steps to reduce the likelihood and impact of disruption in Zoom.Read more

Two-Step Login secures your personal information and protects your access to Cornell systems, even when you aren't on campus. If you are now working remotely, but still have a Cornell University phone number as your primary authentication device, logging in will be more convenient if you switch...Read more

User Experience

If you are using your work computer on your home network, you may find that Code42 is using too much of your network's resources (slow performance, near-constant backup activity, etc.).

Solution

Please contact your local department or unit's IT support folks. Each...Read more

Pages