Search63 Results

This article will provide a resolution to the issue, PowerPoint presentation projecting black lines during the presentation. This article will provide other considerations and possible solutions when dealing with PowerPoint presentation aspect ratios.
This article will provide standards for conference room equipment standards. The target audience is for any faculty or staff member responsible for consulting with Educational Technology Services to plan the equipment needed for the conference room in their department or college.
Support for traditional telephone services is performed by Telecommunications. Requests for repair or installation of traditional telephone services can be requested directly from Telecommunications.
Support for normal office phones will be provided by OIT. Support for special phone lines will be provided by Telecommunications
This article will provide general information about Active Employee/ Student Search function in Banner.
Information about acquiring and using a MS 365 Copilot license for faculty and staff.
This article describes how to connect to the ISU-OPEN wireless network for students, faculty, and staff.
ISU provides some technology services to retirees, but important changes take place at the retirement date which may require action.
This article will provide a resolution to your university account being locked.
If a customer does not have a cell phone to use for multi-factor authentication, a One Time Authentication Token may be used. This article explains what to look for in purchasing a token, and how to get it set up after purchase.
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.
The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.
This article describes frequently asked question about Endpoint Encryption Software. The target audience students, faculty and staff .
This article provides instructions on how to separate email conversations into messages in the Outlook Web App for staff, faculty, and students