Transcript: The full transcript for this video is available on YouTube in the description area. View the video and transcript on YouTube.
In the first video, instructions for changing the date of the archive to an earlier version can be found at approximately the 1:30 mark in the transcript.How to Find and Restore Your Data from…
Important: Please take a moment to review the current spreadsheet in the Password Reset Project Teams channel. We've learned that it was sorted in a case-sensitive manner, causing userids that start…
Use Multiple BrowsersMicrosoft 365 relies on cookie settings to know whether it needs to request a login or not. Browsers store and access their own cookies; Safari does not use Edge's cookies and…
Follow the instructions for your preferred browser to prevent data loss.EdgeSigning in to Microsoft Edge will allow you to sync favorites, history, passwords, extensions and settings using your…
Spotlights DMARC Remix - several beats before a major Domain-based Message Authentication, Reporting, and Conformance (DMARC) deadline, web developer Irina Naydich delivered a trophy-worthy…
About the Project Following consensus reached by CIT Directors and internal stakeholders, CIT and Custom Development created the first release of the Resource Registry to establish a baseline…
Create a Mailing ListWhen creating a mailing list, you'll have the option to make the list data private. If you do not select Make data in this list private, your embedded data can be accessed…
SpotlightsTechnical Debt Reduction: Authentication Methods - Retiring three long-term authentication methods without any major disruptions to the campus was celebrated as quietly as the work had been…
Spotlights Can You Hear Me Now?To overhaul an aging telephone system without sacrificing the Statler Hotel's renowned guest services, the SC Johnson College of Business IT team collaborated with…
Cornell’s Statler Hotel faced a critical challenge: replace an aging phone system without disrupting the personalized service that defines its AAA four-diamond reputation. The solution required more…
CITSG-supported faculty and staff can submit a request using our online form. Non-CITSG customers, please contact your local IT Support.Docks Dell Pro DockCost~ $150Maximum Power…
Cornell made a configuration change to Lyris E-lists in February 2026 to enforce DMARC security policy. E-lists that include non-“@cornell.edu” members and to which members post by email were…
Publishing ScheduleShift as needed for holidays; January 1 and July 2 were both Thursdays in 2026. Publishing on January 22 and July 23, the fourth Thursdays, still left four weeks before the next…
Add a TopicTopics are added on a landing page of a service (or just a landing page if there's no attached service). Find them listed under Service Categories & Topics when you edit the page. You…
Use CrashPlan to transfer files from an old device to the new one, move the backup, and update backup settings.Transcript: The full transcript for this video is available on YouTube in the…
Cornell advises against including any restricted or sensitive data or information that might be inappropriate for sharing with AI model training in meetings or webinars that include use of Zoom…
This page contains a list of recommended training options for Microsoft Power BI, as well as Microsoft Fabric.Microsoft Power BI Training (free, online)Official Power BI training courses offered by…
CharterPurposeThis charter provides organizational structure to security and privacy incident response, consistent with requirements promulgated by various federal, state and contractual requirements…
TDX Application Administrators can limit who can — or cannot — use a specific Type in a TeamDynamix Ticketing application or Project by associating groups with that Type. Open the ticket…