Search 39 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Firewall

subnets. Standard user networks are EmployeeNet, VandalNet, and Limited Security Usert Network (SUN)/ Standard server networks are Server Basic, Printer, and Legacy Server. In addition, there is a

Technology Equipment Surplus

Take away old, broken or outdated technology for you. Note: All technology that stores data (computers, printers, credit card machines, FAX machines, etc.) must go through the department's IT support to properly prepare and dispose of the equipment. ... Note: All technology that stores data (computers, printers, credit card machines, FAX machines, etc.) must go through the department's IT support to properly prepare and dispose of the equipment

Overview of OIT Procurement Process

performs any user-specific configurations, such as adding printers and/or applications. The item is then delivered and set up for you (as needed depending on hardware requested) by your TSP.  OIT

Surplus Request

, printers, credit card machines, FAX machines, etc.)? Yes / No Does the item have a Red or Yellow Tag? Yes / No Lab equipment and items exposed to Hazardous Materials: All Laboratory

Solid Waste and Recycling Request

computers, monitors, keyboards, mice, printers, VCRs, cords, scanners, wood and construction debris, lab equipment, etc

Student Lab Printing

add-printer ... New Printing Service As of 8/12/2024, Student Printing has been migrated to a new printing system, PaperCut. Fore more information regarding this system and instructions on how to use it please

Broken Hardware, RMA, & Warranty Requests

Support for hardware not working properly including desktop computers, laptops, mice, keyboards, printers, etc. ... Need assistance dealing with your computer hardware? Click the Request Help button and fill out the form.  Please include a description of how it is not working for you. If possible, screen shots of

Internet Self-Defense Dojo

Your friend Victoria Vandal wants to get a new phone because she thinks this one guy (Brad?) she met at Boise Fry Company hacked her phone. She shudders to take pictures, and doesn't want to comment

University IT Policies FAQ - APM 30.16

processes or stores University data. Essentially, the definition includes computers (desktop and laptops), tablets, university purchased cell phones, printers, FAX machines and other hardware that processes