Search 86 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
Computer Hardware Recycling (E-Waste)
Information Technology Services provides Computer Hardware Recycling for University Owned equipment when it reaches the end of its useful life. Hardware must be brought to the Technology Hub for recycling. ... recycling guidelines or are reconditioned by the recycler.
All users are responsible for REMOVING PERSONAL DATA BEFORE computers are delivered to the Technology Hub.
Once an item has been identified
2FA - Setting up the Step Two App (Mac Computers Only)
Overview
Step Two is an application that installs on your Mac OS device and produces a 6-digit code for you to use in Two-Factor Authentication (2FA).
Setting Up the Step Two App
Visit
Loaner Laptop Programs Available At Binghamton University
ITS Repair Loaner Laptop Program
The ITS Help Desk can provide a loaner laptop while a student, staff or faculty member's personal or University owned computer is being repaired by the
University Desktop & Mobile Device Support
computer ... Service Description
Information Technology Services provides hardware & software support for University owned computers and devices, including warranty support for Dell and Apple hardware
Hardware Lifecycle Services
Information Technology Services provides quotes, installation, and recycling for University owned computer hardware. ... computer ... Service Description
Information Technology Services provides support for the full life cycle of University owned computer hardware, including quotes for Dell and Apple hardware and electronics
Asset Management
Information Technology Services maintains an inventory of computers installed at the University. ... Service Description
Information Technology Services maintains an inventory of computers installed at the University. The inventory includes the primary user/owner, computer name, computer
Using Google Drive App in the Binghamton Public Computing Labs (Windows)
The Google Drive App is on the public computers in the Binghamton Public Computer Labs and Classrooms. This leverages the storage for Binghamton University students on Google. The Drive app maps
Endpoint Protection
ITS provides and manages endpoint protection software to protect University-owned computer systems from viruses and malware. ... computer systems through in-house and third-party contracted endpoint protection software. These protections extend to individual computer systems supplied to employees along with departmental servers
ITS Energy Saving and Sustainable Best Practices
University's Office of Sustainability.
Energy Saving for Computers and Printers
Purchase Energy Star computers, printers, and equipment.
Turn off computers, monitors, and printers when you leave
Endpoint Remediation
Antivirus, antimalware, and device compromise prevention and remediation services for University-owned computer systems. ... University-owned computer systems through in-house and third-party contracted endpoint protection software. These services extend to individual computer systems supplied to employees along with
Connecting smart TVs, game consoles, smart speakers, streaming media devices, etc. to the network
eduroam to connect.
Clients can log into MyDevices using their Binghamton University Computer Account (BU) user id and password.
To register a device click on the Add Button.
Next enter
Zoom Web Conferencing
Web conferencing allows individuals to participate in meetings online by using a computer or mobile device to connect to the meeting. ... computer, tablet, or phone. Zoom is integrated with Brightspace for online/remote instruction and collaboration.
Audience
Faculty
Staff
Students
Location(s)
Web based
Brightspace: How to Bulk Enroll Users into your Course
In your course in Brightspace:
1. Click Classlist
2. Click Add Participants
3. Click “Import users from a file on your computer”.
Use Excel and then be sure to save
Endpoint Detection
Centralized and local systems and software idenfity threats and potentially malicious actions or software on University-owned computer systems. ... University-owned computers to identify, investigate, and alert IT staff and computer users if/when a potentially malicious action occurs, or when indicators of a malicious activity or compromise present