Search 1201 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Working with themes in NUsites

Northwestern University branding, you can use the Northwestern (Global) theme. This theme aligns with the branding guidelines set by the Northwestern University department of Global Marketing and

OnBase Unity Client Installation

The OnBase Unity Client is used for student hiring and HR document management. ... The OnBase Unity Client is used primarily by supervisors of student workers for the student hiring workflow. Library HR staff use Unity for the student hiring workflow and for ingest, storage and

Saving a complete copy of an email message

phishing or spam message and would like to report it, use the instructions below to save a complete copy of the message that includes both the full header and the message itself. Once you have the copy

Understanding the GL074 Financial Summary Report in Cognos Analytics

Use the GL074 Financial Summary to see chart strings filtered by Management Level, Project Purpose, and/or Manager/Reviewer. This report resembles the GL070, with the addition of management levels

SESP Technology Project Management

SESP Technology team project management related requests and task. ... Members of the SESP Technology team may select this service category for all tickets used to track SESP Technology team projects and tasks.   Available to SESP Technology team members   Cost N/A   How to Request Service Click the "Request Service" button to the right.

Modern Authentication FAQ

clients? Northwestern IT recommends and supports Outlook Web App for Linux users. Should you prefer a client solution, it is the responsibility of schools and departments to select and support a usable

TDX Interacting With Email

TeamDynamix is through email, which can be a convenient and effective way to manage service requests, when used properly. In this article, we will discuss the ways one can interact with TeamDynamix via

Managing your profile visibility in Our Northwestern

category has specific fields that can be managed. You may choose to set visibility of information to only yourself, to your connected friends within the site, or to registered users. Setting visibility to

Video Production Studio (Mudd)

, equations, and sketches, all while engaging with the camera and viewers. The Libraries’ offer quarterly workshops on using the Video Production Studio. See the Libraries’ events page for upcoming

Eduroam CAT Installer for MacOS

If you are experiencing issues connecting to eduroam please use the following installer to automatically configure your device to connect to eduroam.   Forget or delete any listed eduroam

Enter Receipt via Add/Update Receipts in NUFinancials (Training Guide)

orders of $5,000 or more. Please enter receipts as soon as possible after receiving the product or service. Can you use Add/Update Receipts to enter receipts for any non-catalog purchase order? Yes

NUworkspace: Mapping a RDSS Drive

://northwestern.apporto.com”, and log in to the system using your credentials.  Click the App Store    icon in the Navigation panel.  The ‘App Store’ screen displays. You can select any of your research

Quest Quick Start Guide

video tutorial Navigating Quest via Shell. Once you've logged into Quest, you will begin in your Home directory: /home/<NetID>. The home directory has 80GB of storage and is backed up nightly. Backups

Microsoft Planner

Microsoft Planner, is a project management platform within the Microsoft 365 applications and add-ins that enables users to create and manage plans and tasks on various ad-hoc projects. ... Microsoft Planner, is a project management platform within the Microsoft 365 applications and add-ins that enables users to create and manage plans and tasks on various ad-hoc projects. The tasks are

Vulnerability Assessment

Northwestern IT's Information Security Office maintains and operates a Vulnerability Assessment Program to assist schools and departments in the auditing, identification, and remediation of security vulnerabilities in its own network infrastructure, related devices, and web services. ... workstations, servers, devices, and the overall security of the network infrastructure Coordination, collaboration, and general technical consulting before, during, and after the assessment. Follow-up