Search 205 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Secondary or Sponsored Account Request

Used to request organizational or departmental secondary and sponsored accounts

ResCons

ResCons are Binghamton University's student technical staff located in the Residence Halls. ... where they work and attempt to resolve students' questions about device connectivity and software problems and other information technology related issues. The ITS Help Desk is the central point of

3D Printing

Deposition Modeling) uses melted and extruded plastic filament to produce an object. SLA (Stereolithography) printers use a laser to cure a liquid resin. FDM is faster and easier but produces a much less

Enhancement Request

This form is generally used for Information Technology Staff to request enhancements to our TeamDynamix ITSM and Project Management software. If you have reached this form by searching and you are not a staff member in ITS, you may be at the wrong form. ... This form is generally used for Information Technology Staff to request enhancements to our TeamDynamix ITSM and Project Management software. If you have reached this form by searching and you are not a staff member in ITS, you may be at the wrong form.

Adobe Licensing Information and Product Offerings 2024-205

adobe ... Adobe’s move to subscription-based licensing for this product ITS has had to adjust and accommodate for this new structure to meet the needs of our campus community. In July 2024, Adobe Acrobat

How to check that you have successfully enrolled in Google 2-Step Verification

instructions: https://support.google.com/accounts/answer/185839?hl=en&ref_topic=2954345 If you are not sure if you have successfully enrolled in Google 2-Step Verification, here is a way to check

Apple Mail App on iPhone or iPad does not receive new messages after 2-Step Verification enabled

Google accounts. To solve this problem, delete the Binghamton email account on the iPhone or iPad and add it again. Delete and Add Binghamton email account in iOS Mail App On your iPhone, go to

Google 2-Step Verification - First-Time Setup and Managing Devices

This article provides step-by-step instructions for enabling Google 2-Step Verification on a person's Bmail address, and managing devices later on. ... Overview This article contains Binghamton University instructions for enabling Google’s 2-Step Verification service on a Bmail address. Google 2-Step Verification is only used for logging in to

Logging Into Panopto

This article goes through the steps to log in to Panopto. ... Follow the steps below to access your Panopto account: Navigate to https://binghamton.hosted.panopto.com/Panopto/Pages/Auth/Login.aspx From the drop-down menu, choose the appropriate category

Server & Storage Management

Information Technology Services utilizes a suite of products to support virtual infrastructure needs across the campus. ... is protected. H Drive: Individual Network Storage:  Every faculty and staff member has access to 5 gig bits of individual network storage on the H drive. H drives are created by request

Physical Server Installation Request

House a departmental server in one of the ITS data centers. ... add ... Service Description Server colocation is allows a department to physically house a server within one of the ITS data center locations. ITS will then work with appropriate staff in the department

How do I find my B number?

Brain - my.binghamton.edu, click on BU Brain icon at the top of the screen. Click on the Home tab, then click on "What is my B number"?     If you would like assistance, please

Database Management

The University uses several types of database platforms to support day to day campus student and business needs. ... Service Description The University uses several types of database platforms to support day to day campus student and business needs. Information Technology Services is responsible for the

Custom Workflow Development

ITS provides Custom Workflow Development to streamline and improve business processes. ... appropriate workflow system.  A custom workflow requires one to submit a project request and follows the ITS Project Governance Policy. Audience Faculty Staff Location(s) Web

Firewall Management

Provides security protection at the network level for applications, servers, databases and networks. ... network or electronic equipment. Firewalls are used to examine network traffic and enforce policies based on instructions contained within the Firewall's Ruleset. Firewalls represent one component of