Content (1038)
IT Statements of Need are now easier to submit and, if you have access, to view and search.
When hosting a Zoom meeting, Cornell faculty and staff can choose between local or cloud recording options. Zoom cloud recordings will automatically transfer to Cornell's Video on Demand service, archived for each user under the My Media library.
Outlook on the Web (outlook.cornell.edu) has keyboard shortcut keys that are turned on by default. If you'd prefer to work your inbox from the keyboard instead of having to use a mouse, you can see the options by typing ? while in the Outlook on the Web main view. If you don't think you'll…
In response to reports of audio quality issues in Zoom meetings, investigation has turned up a range of causes, rather than a single issue within the service. The vendor has suggested that it's possible some of the reported issues may be related to running older versions of Zoom. If you encounter…
During tax time, there are many tax-related scams to watch out for. According to the Federal Trade Commission, tax-related identity theft is the most common form of identity theft reported in the U.S. As criminals continue to use stolen identities (Social Security numbers and personal data) to…
What kind of website you need depends a lot on what you're trying to accomplish. The good news is that there are many options to choose from when it comes to web hosting. The downside is that there is such a wealth of choices that picking the one that's the very best fit can sometimes be difficult…
This holiday season, watch out for email spam with subjects like:Holiday e-cardHoliday sales/discounts/dealsTravel notificationsCriminals will continue to spam people throughout the holidays with the hopes that the email subject line will trick someone.Our Cornell email addresses are listed in the…
Cornell's IT Security Office works to help you keep your university identity and information safe. Because online risks don't end when your work day does, we'd like to supply some suggestions for how you can protect your personal identity and information, too.Credit Freeze
TSM generates an error log file containing any errors generated by the Tivoli Storage Manager application and services.By default, you'll find the scheduler log in the following location:C:\Program Files\Tivoli\TSM\baclient\dsmerror.log
For nearly all remote assistance sessions, you will be in direct contact with your technical support provider (TSP) either by phone or through the chat window. This means you are always free to ask questions or get clarification before permitting a particular action.
Here is a partial list of the…
Remote Support works with
Windows 10 or 11
macOS 10.14 or newer
iOS 12 or newer
Many versions of Linux (Ubuntu, Red Hat, Fedora, and Suse)
Centrally-provided enterprise cloud services are listed below. Be sure you use these enterprise cloud services instead of consumer versions. Using enterprise versions means:
Who is Able to Use BeyondTrust Remote Support?
Cornell's BeyondTrust Remote Support license limits use to people in designated IT support roles at the university. It is not available for end users or technicians to use to gain remote access into their office computers.
What are cloud services?Cloud services are easy to recognize. They...
If the service you are trying to access is one you have never used before, verify that you were given the correct access information and that your access privileges have been set up.
If the service is one you usually use, it may be experiencing a temporary problem.
If you type in the same password as always, but you get an "incorrect password" message no matter how carefully you check and retype it, your password may have been stolen. The person who stole it may have changed your password to block you from access to your own email and other services.…
A common problem: Check the "Caps Lock" indicator on your keyboard before typing your password; if the "Caps Lock" key has been pressed, your password might not be recognized. Uppercase and lowercase letters need to be typed exactly the same way every time you use the password.
Retype your…
Only the individual for whom the NetID is issued may use it according to University Policy 5.8, Authentication to Information Technology Resources. The policy outlines rules each community member must observe to avoid unauthorized use of the NetID:
See Google's Out of office or vacation reply help page.
How are Gmail and Google Workspace (formerly G Suite) different?
Google Workspace includes Gmail and several other tools. While you can continue to use your own Gmail account if you like, it will be completely separate from your Google Workspace account.
Your own personal Gmail account…