Emma at NC State By gbfergus What is Emma? Emma, part of the Campaign Monitor brand, is a cloud based software service that specializes in facilitating... a
Two-Factor Authentication (2FA) at NC State-2020 By Lauren Etheridge Ways to Authenticate, at a Glance Technology Google 2-Step Duo Voice Call Yes, this feature is supported No, this... a
Enterprise Applications Committee By vlittle Purpose / Mission The Enterprise Applications Committee (EAC) provides guidance for major applications and tools that affect key university business... a
Strategic Information Technology Committee By stan Purpose / Mission The Strategic IT Committee (SITC) provides university wide IT vision, considering and recommending IT needs and requirements... a
Research, Scholarship & Creativity IT Committee By vlittle Purpose / Mission The mission of the Research, Scholarship & Creativity IT Committee (RSCITC) is to support and enable the... a
Knowledge By Jen Riehle McFarland Knowledge Classes Getting Smart with ServiceNow Knowledge Aug 11; 1-2pm Watch on YouTube Knowledge Creation Articles Please note that some... a
ServiceNow By Jen Riehle McFarland ServiceNow is an IT Service Management platform used to organize and streamline a number of IT processes and services for... a
Educational Technology Committee By vlittle Purpose / Mission The Educational Technology Committee (ETC) considers and makes recommendations regarding academic IT needs and requirements that align... a
HPC Decision Wizard By Brian DeConinck Not Authenticated This content is protected by its owner. Please log in with your Unity ID to access. a
2FA Graph Demo By Miles Elliott Not Authenticated This content is protected by its owner. Please log in with your Unity ID to access. a
Identity & Web Services By hmn The Identity and Web Services (IWS) team is a member of the Middleware Services group in Shared Services. Our... a
Email Infrastructure: Configuring WordPress By jlmaners Get started: Request/Register a generic account via https://webregistry.ncsu.edu. If you have an existing generic account that you would like to... a
Email Infrastructure Help By Brian DeConinck Not Authenticated This content is protected by its owner. Please log in with your Unity ID to access. a
System Access Removal Procedure By Brian DeConinck Not Authenticated This content is protected by its owner. Please log in with your Unity ID to access. a
IT Security Bulletins By Kristin Taklich Not Authenticated This content is protected by its owner. Please log in with your Unity ID to access. a
Recommended Antivirus Solutions By cawalker Microsoft Endpoint Protection License Overview Microsoft Endpoint Protection is licensed under the university’s CAL EES with Software Assurance, so all... a