Answers

Displaying 121 - 140 of 481 answers
Service: Backups

Restoring Files

This page explains how to restore files with Tivoli Storage Manager (TSM) for Windows. ADSM TSM Network Backup for Windows: Installation explains how to install the TSM backup client and set up the backup client to make regular backups.

If you're having trouble with being able to access your restored files or folders on your new PC, even on an administrator account, you may need to take ownership of the file.

Before downloading or using the Personal Capture Software you must request access by filling out the lecture capture request form. Click on the link below to request access.

System Requirements

This Echo360 support page contains the most up to date system requirements for both Mac and Windows.

Tags: webmail

Setting up an email list enables you to email several people at once by simply entering a nickname in the 'To:' field of the email. The email list nickname replaces having to repeatedly type out many email addresses and is particularly useful when you send emails to the same group of people again and again. To set up the list, do the following:

Tags: rt

If there is an existing RT instance in use by your department or campus unit, contact your unit's REACH member about creating a queue for your needs. However, if you need a new instance, send a request to systems@uic.edu with the following: 

Service: Backups

After you create the scheduler, you should check to make sure it will automatically start when you reboot your computer. Because the scheduler runs as a service, you have to start the Services Administrative Tool to do this.

Install Shibboleth service provider software

Red Hat Enterprise Linux, CentOS, and SUSE Linux

Tags: argo

The ScaLAPACK (Scalable LAPACK) is a linear algebra library for parallel computers. Routines are available to solve the linear system A*x=b, or to find the matrix eigensystem, for a variety of matrix types.

Example command

pgf77 source_file.f -Mscalapack

The -Mscalapack optiuon causes the following libraries, all of which are installed in /usr/common/pgi/linux86/5.2/lib, to be linked in to your executable:

Service: Encryption

PGP Desktop Encryption has integrated email functions, but the UIC license doesn't include them. However, the PGP Viewer is part of the UIC PGP Desktop Encryption installation. PGP Viewer decrypts, verifies, and displays encrypted or signed files. So if you save an encrypted or signed email message to a file, you can decrypt or verify the saved file with PGP Viewer.

Tags: esri, software

UIC students, faculty, and staff can sign up for free ESRI GIS Software Courses Online. Because of UIC's campus-wide site license with ESRI, one of the principal producers of geographic information systems (GIS) software, as of August 15, 2001 UIC students, faculty, and staff can sign up for a number of software courses at ESRI's Virtual Campus FREE. Virtual Campus courses require that you have access to the internet and specific ESRI software, available in certain UIC labs, to complete course exercises.

Tags: security
Service: Security

A firewall is a network protection tool that guards against and reports intrusions on your computer from the outside, or unauthorized communications from the inside which runs whenever your computer is on.

ACCC offers UIC faculty, staff, and students Zone Labs Integrity Desktop personal firewall for Windows. Zone Labs Integrity Desktop is Zone Lab's popular and effective Zone Alarm firewall software with additional privacy and protection features.

Thunderbird 3 and Eudora OSE (Penelope Eudora)

The ACCC supports Mozilla's Firefox browser and asks that everyone use it whenever they can instead of Internet Explorer, so it only seems reasonable that we include instructions on how to set up the Thunderbird email client to use mail.uic.edu. Thunderbird is the email client that goes with Firefox. It's easy to use and quite reasonable. A lot like Firefox, in that way. If you're in search of a new email program, check Thunderbird out. It's nice. (And it does RSS.)

Tags: argo

Queues are locations for jobs, are composed of compute nodes, and have rules regarding who may use them and for how long. Jobs are submitted to queues (via the qsub command) and the system decides which node or nodes assigned to the queue runs the job. Queues are aptly named; some jobs queue execute immediately (running) while others wait to execute (queued) until the requested resource(s) in the queue become available. 

There are five queues: three only for jobs submitted by students and two only for the jobs submitted by staff/faculty.

Any file you wish to upload should have a three or four letter file extension (such as .txt or .html) which designates its type and is a commonly used extension name recognized by web browsers. Be sure to give your files sensible names - use only alphanumeric characters and don't use spaces. For example: If you wish to upload a Microsoft Word document, it must be named similarly to myfile.doc, .doc being the file extension for Word. (see the table below for commonly used file extensions.)

This guide was written for OS X Mavericks (10.9), but the steps outlined here are similar enough on other versions of OS X. It is recommended to upgrade to 10.9 or 10.10 if your Mac supports it. This can be done via the Mac App Store.

1. Prestage object for the Mac in AD.

2. Login to the Mac as an administrator.

A University P-Card cannot be used as payment in the WebStore.

According to OBFS Guidelines for P-card use

Check your balance and printing history for the current semester in the following ways:

Students registered for classes at UIC are automatically enrolled into your site based upon the call numbers you specify in your site request. The batch enrollment process is run from two weeks before the semester begins until the Add/Drop deadline. The batch enrollment will add students into your course site, but you will have to un-enroll any students that drop themselves.

To manually enroll the students, follow the steps given below:

If you plan to make heavy use of the collaborative features of your OneDrive for Business library, you should enable the versioning feature. Versioning allows you to:

An Active Directory (AD) account will be locked out if there are too many incorrect password attempts, either by the account owner or by a third-party attempting a brute-force password hack.

Should this happen to you, contact an ACCC consultant at any of the campus labs or the ACCC Service Desk for assistance in having the account unlocked. 

Contact the appropriate unit to arrange lecture capture:

Pages

Browse by tag