Whether you work in an office, a classroom, or a study room, meetings can take up a lot of your time. Video conferencing solutions have been around for many years and have helped make meetings less of a production and more about getting things done.
SMU now offers video conference services to all students, faculty, and staff with Zoom! Instead of having to go to a special room with confusing specialty hardware; anyone with a laptop, smartphone, or tablet can start or join a meeting with anyone in the world. You can also share your computer screen for presentations and chat via text, audio, or video with your attendees.
Getting started is super easy. Just head to smu.edu/zoom and click the log in button! Once there, you can download Zoom’s software to your computer or mobile device and start meeting. If you need any pointers on how to get started, Zoom provides excellent documents and videos to help.
So next time you need to organize a business meeting, study group, or online presentation, give Zoom a try!
The Spring 2017 semester is fully upon us, and this time is always busy with activity. From finding your new classes to sorting through all of your freshly printed syllabi, it’s a time of fresh starts. Your computer may need a fresh start, too!
As the days, weeks, assignments, and lectures roll by, your computer may not be as snappy and responsive as you’re used to. Here are a few tips on how you can keep your computer in tip-top shape for the new year. Continue reading Freshen Up Your PC for a Fresh Semester
As we wrap up the term, we would like to remind faculty of a few housekeeping items with our new learning management system, Canvas. All courses will be concluded for students at the end of the term, per the registrar’s office and academic calendar. Instructors will have an additional two weeks, 14 days, of FULL access to their courses within Canvas.
Important Fall 2016 Dates for Canvas
Continue reading End of Term Course Conclusion for Canvas – Fall 2016
Over the past several years, we have become more and more reliant on Wi-Fi for our phones, tablets, and laptops. Still, many of us still don’t know what to do to get the best signal for our device. I talked with Brad Floyd, one of OIT’s senior network specialists, about some things we can do as consumers to improve our Wi-Fi experience. Continue reading Be a Wi-Fi Wizard with These Tips and Tricks
It has been several months since the University has required Duo Two-Factor Authentication to connect to secure services like my.SMU. While there are several ways to verify your identity with Duo Security, Duo has recently published an easy-to-read, one-page guide on why Duo Push with the Duo Mobile app is the best way to authenticate. Continue reading The Best Way to Authenticate with Duo
Although many SMU users appreciate the ability to receive missed call notifications and voice mail recordings and transcriptions via their email, several users have expressed a preference for checking voicemail “on the phone,” including those in public settings who enjoy the added security of listening to personal messages using a handset or mobile phone. Here is how to use both: Continue reading You Can Still Use Your Phone to Check Voicemail
The holiday season is quickly approaching! A time of travel, food, family, friends, and of course holiday shopping. If you pick up a shiny new laptop or gadget, don’t forget to install and set up all the free or discounted software, services, and solutions that OIT provides to students, faculty, and staff. Continue reading Give Thanks for Free Stuff: OIT’s Software Offerings
Most social networking sites have options for you to define your security or privacy settings. At times, they may be changed or upgraded in a way that affects how your personal information is made available on the internet. To be sure you are aware of what information is being shared and how it is important to review security setting periodically.
Continue reading Social Networking and Your Personal Information
As more applications are run from the internet, rather than installed locally on a device, each of us needs to become more cognizant of browser security settings and internet safety practices. The following are a few key tips for internet safety. Continue reading Internet Applications, Internet Safety, and You
Phishing is a method of identity theft which requests confidential information such as usernames, account numbers, passwords, etc. by masquerading as a legitimate, trusted company. This term typically refers to attempts through email. However, this same type of attack can occur in person (social engineering) or over the phone (farming).
Phishing emails have become very sophisticated. It used to be that they were so poorly written that you could just rely on really bad grammar or spelling errors to determine their legitimacy. That is no longer the case. The emails can appear to come from trusted addresses and cleverly designed with graphics, disclaimers, etc. So how can you determine if an email is legitimate?
Continue reading Do You Know How to Spot A Phish?