Answers

Displaying 101 - 120 of 474 answers
Tags: argo

GaussView is a graphical user interface (GUI) that helps you prepare input for submission to Gaussian and permits you to graphically examine the output. GaussView allows you to rapidly sketch in large molecules and then rotate, translate, and zoom in on the molecules using mouse operations. It makes it easy to set up many types of Gaussian calculations, and lets you examine the results of Gaussian calculations.

Service: Listserv

Listserv passwords are independent of any other password. A listserv password is associated with a specific email address. To set a new listserv password click on the Change Password button on any listserv login page:

Tags: argo

X11 forwarding allows users who have an account on a Unix server to open a connection to the X11 interface remotely from another computer. The communication between the systems is encrypted. In order to log in to Argo, you must use an SSH client, such as PuTTY, or the ssh command. 

X11 forwarding with the ssh command

To use X11 forwarding when using the ssh command, include the -X operand. For example:

Configure Personal Capture the first time you run the application. Please note that Captures are sometimes referred to as Echos or Recordings in the software interface.

Quick links for Mac OS X and Windows:

Mac OS X Windows 7

If you haven't already, first activate your people.uic.edu site. Use the following settings to connect to your account with an SSH client: 

Tags: uicalendar
Service: UICalendar

Global Agendas -- Sharing Your UICal Calendar with Anyone. Global Agenda viewing is an option of UICal on the Web that allows you to send a URL to anyone you want -- they do not have to have to have a UICal account and they may not have anything to do with UIC at all -- that will allow them read-only access to a view of the times that you are busy.

People viewing your Global Agenda Web page will be able to read the text of agenda items that you mark items with the access level of Public. Non-Public items will just appear as "Busy".

Service: Security

Password managers can help you remember and secure all of your passwords.

Tags: backup, adsm
Service: Backups

You can set up rules in the backup client preferences menus to include or exclude certain types of files or certain locations on your computer.

To install ADDA software on your Mac you will need to mount the MacApps volume. To use the software, you will also need to have the KeyClient running. Important note: If you are off-campus, you must be connected using the VPN client to use ADDA software.

If you haven't already, activate your site. Use the following settings to connect to people.uic.edu using SFTP. Below you will find instructions for Windows and Mac SFTP clients.

Tags: rt

If there is an existing RT instance in use by your department or campus unit, contact your unit's REACH member about creating a queue for your needs. However, if you need a new instance, send a request to systems@uic.edu with the following: 

Activate your site, if you haven't already done so. No additional software is needed to map your people.uic.edu account as a network share, but if you are connecting from an off-campus location you will need to connect to the UIC Virtual Private Network (VPN) first. 

Windows

To map your account start by right-clicking on your Desktop. Select New then Shortcut. In the dialog, type in \\people.uic.edu\NetID (use your own UIC NetID) in the location field. Click Next.

Service: Backups

After you create the scheduler, you should check to make sure it will automatically start when you reboot your computer. Because the scheduler runs as a service, you have to start the Services Administrative Tool to do this.

Tags: argo

LIMDEP is an econometrics package designed principally to estimate models with limited and qualitative dependent variables. It provides a wide variety of procedures for this purpose, and can report basic descriptive statistics, run standard linear models, and estimate nonlinear models and systems of equations. It also provides tools for writing and optimizing user-defined functions. Written by William Greene, author of Econometric Analysis, it is also the first package to incorporate recent developments in econometrics as standard routines.

Service: Backups

Restoring Files

This page explains how to restore files with Tivoli Storage Manager (TSM) for Windows. ADSM TSM Network Backup for Windows: Installation explains how to install the TSM backup client and set up the backup client to make regular backups.

If you're having trouble with being able to access your restored files or folders on your new PC, even on an administrator account, you may need to take ownership of the file.

Service: Exchange

By default, the free/busy information on a user's Exchange calendar is shared with all other Exchange users. When you share your free/busy information, other users can see when you have appointments or meetings scheduled on your calendar. This can make it easier for others to schedule meetings, since they can see times that will not work because other events are scheduled.

Service: Exchange

If you are experiencing a lot of failed sent mail due to malformed addresses in your auto-complete or address book follow these instructions on how to clear your list and cache.

  1. In Outlook 2010 and 2013, click the File menu and select Options.
  2. In the Outlook Options window click the Mail tab.
  3. Scroll down to Send messages. Uncheck the Use Auto-Complete List to suggest names when typing in the To, Cc, and Bcc lines box.

Optional Step: To clear out the auto-complete list, simply click the Empty Auto-Complete List button.

Service: Encryption

PGP Desktop Encryption has integrated email functions, but the UIC license doesn't include them. However, the PGP Viewer is part of the UIC PGP Desktop Encryption installation. PGP Viewer decrypts, verifies, and displays encrypted or signed files. So if you save an encrypted or signed email message to a file, you can decrypt or verify the saved file with PGP Viewer.

Tags: argo

Queues are locations for jobs, are composed of compute nodes, and have rules regarding who may use them and for how long. Jobs are submitted to queues (via the qsub command) and the system decides which node or nodes assigned to the queue runs the job. Queues are aptly named; some jobs queue execute immediately (running) while others wait to execute (queued) until the requested resource(s) in the queue become available. 

There are five queues: three only for jobs submitted by students and two only for the jobs submitted by staff/faculty.

Tags: pgp, encryption
Service: Encryption

Before you can use PGP in your correspondence with someone else, you'll have to exchange public keys with them. Here's how.

Pages

Browse by tag