Search 86 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Computer Hardware Recycling (E-Waste)

Information Technology Services provides Computer Hardware Recycling for University Owned equipment when it reaches the end of its useful life. Hardware must be brought to the Technology Hub for recycling. ... recycling guidelines or are reconditioned by the recycler. All users are responsible for REMOVING PERSONAL DATA BEFORE computers are delivered to the Technology Hub. Once an item has been identified

2FA - Setting up the Step Two App (Mac Computers Only)

Overview Step Two is an application that installs on your Mac OS device and produces a 6-digit code for you to use in Two-Factor Authentication (2FA).  Setting Up the Step Two App Visit

Loaner Laptop Programs Available At Binghamton University

ITS Repair Loaner Laptop Program The ITS Help Desk can provide a loaner laptop while a student, staff or faculty member's personal or University owned computer is being repaired by the

University Desktop & Mobile Device Support

computer ... Service Description Information Technology Services provides hardware & software support for University owned computers and devices, including warranty support for Dell and Apple hardware

Hardware Lifecycle Services

Information Technology Services provides quotes, installation, and recycling for University owned computer hardware. ... computer ... Service Description Information Technology Services provides support for the full life cycle of University owned computer hardware, including quotes for Dell and Apple hardware and electronics

ResCon Assistance


Asset Management

Information Technology Services maintains an inventory of computers installed at the University. ... Service Description Information Technology Services maintains an inventory of computers installed at the University. The inventory includes the primary user/owner, computer name, computer

Using Google Drive App in the Binghamton Public Computing Labs (Windows)

The Google Drive App is on the public computers in the Binghamton Public Computer Labs and Classrooms.  This leverages the storage for Binghamton University students on Google.  The Drive app maps

Endpoint Protection

ITS provides and manages endpoint protection software to protect University-owned computer systems from viruses and malware. ... computer systems through in-house and third-party contracted endpoint protection software. These protections extend to individual computer systems supplied to employees along with departmental servers

ITS Energy Saving and Sustainable Best Practices

University's Office of Sustainability. Energy Saving for Computers and Printers Purchase Energy Star computers, printers, and equipment. Turn off computers, monitors, and printers when you leave

Endpoint Remediation

Antivirus, antimalware, and device compromise prevention and remediation services for University-owned computer systems. ... University-owned computer systems through in-house and third-party contracted endpoint protection software. These services extend to individual computer systems supplied to employees along with

Connecting smart TVs, game consoles, smart speakers, streaming media devices, etc. to the network

 eduroam to connect. Clients can log into MyDevices using their Binghamton University Computer Account (BU) user id and password. To register a device click on the Add Button. Next enter

Zoom Web Conferencing

Web conferencing allows individuals to participate in meetings online by using a computer or mobile device to connect to the meeting. ... computer, tablet, or phone. Zoom is integrated with Brightspace for online/remote instruction and collaboration.  Audience Faculty Staff Students Location(s) Web based

Brightspace: How to Bulk Enroll Users into your Course

In your course in Brightspace: 1. Click Classlist 2. Click Add Participants 3. Click “Import users from a file on your computer”.      Use Excel and then be sure to save

Endpoint Detection

Centralized and local systems and software idenfity threats and potentially malicious actions or software on University-owned computer systems. ... University-owned computers to identify, investigate, and alert IT staff and computer users if/when a potentially malicious action occurs, or when indicators of a malicious activity or compromise present