Search 39 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
Firewall
subnets. Standard user networks are EmployeeNet, VandalNet, and Limited Security Usert Network (SUN)/ Standard server networks are Server Basic, Printer, and Legacy Server. In addition, there is a
Technology Equipment Surplus
Take away old, broken or outdated technology for you.
Note: All technology that stores data (computers, printers, credit card machines, FAX machines, etc.) must go through the department's IT support to properly prepare and dispose of the equipment. ... Note: All technology that stores data (computers, printers, credit card machines, FAX machines, etc.) must go through the department's IT support to properly prepare and dispose of the equipment
Overview of OIT Procurement Process
performs any user-specific configurations, such as adding printers and/or applications. The item is then delivered and set up for you (as needed depending on hardware requested) by your TSP.
OIT
Surplus Request
, printers, credit card machines, FAX machines, etc.)? Yes / No
Does the item have a Red or Yellow Tag? Yes / No
Lab equipment and items exposed to Hazardous Materials:
All Laboratory
Solid Waste and Recycling Request
computers, monitors, keyboards, mice, printers, VCRs, cords, scanners, wood and construction debris, lab equipment, etc
Student Lab Printing
add-printer ... New Printing Service
As of 8/12/2024, Student Printing has been migrated to a new printing system, PaperCut. Fore more information regarding this system and instructions on how to use it please
Broken Hardware, RMA, & Warranty Requests
Support for hardware not working properly including desktop computers, laptops, mice, keyboards, printers, etc. ... Need assistance dealing with your computer hardware? Click the Request Help button and fill out the form. Please include a description of how it is not working for you. If possible, screen shots of
Internet Self-Defense Dojo
Your friend Victoria Vandal wants to get a new phone because she thinks this one guy (Brad?) she met at Boise Fry Company hacked her phone. She shudders to take pictures, and doesn't want to comment
University IT Policies FAQ - APM 30.16
processes or stores University data. Essentially, the definition includes computers (desktop and laptops), tablets, university purchased cell phones, printers, FAX machines and other hardware that processes