Search 265 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
Selecting between the Service Request System and the Resource Management Portal when managing research computing and storage services
Storage and Research Computing, but does not allow updates other than to the lists of users allowed to access a given resource.
Use the following table to choose the appropriate tool for your desired
Adding virtual environments to Jupyter Notebook
Summary
This article details the steps for adding your Anaconda Python virtual environments to Jupyter Notebook, so that they show up as alternative notebook choices within Jupyter's dropdown menu
Linking Google accounts to WHE
Summary
As of September 2016 you can link your U-M Google account to your LSA Web Hosting cPanel account. This allows you to login to your cPanel admin page with the standard U-M https
Editing captions for lecture recordings
."
Once in the viewer, click the Transcript Editor in the upper right corner of the screen. When clicking a line of text, the recording will start playing an excerpt of the video to allow for quick
Requesting Lecture Recording if the form is not available
Summary
Instructions for requesting Lecture Recording if you are not able to access the online form.
If you are having issues with your University of Michigan profile not allowing access to
Getting started on econstat servers
econstat6.econ.lsa.umich.edu
Bring Your Own Storage
The econstat pool allows users up to 40 gigabytes of local storage. Exceptions can be considered on a case-by-case basis, depending on available
SSH host key verification failed
Issue
You receive an SSH remote host identification has changed message and host key verification failed when trying to connect through SSH to a computer you successfully connected to in the past
Viruses and malware
your computer allows cyber criminals to achieve their ends more conveniently in many cases, spyware is commonly configured in this way.
3. Interruptions from pop-ups and spam
Unexplained pop-ups
Email spoofing and impersonation scams
when viewed on a mobile device since most phone-based email programs don't allow users to hover over links or to see the full email headers.
Recognizing an email impersonation scam
From
LSA-TS-FacultyLifeCycleSupport
gsi-allocations ... The LSA Faculty Life Cycle is intended to be the single site which incorporates historical data and administrative processes supporting our tenure track faculty, capturing milestones from recruitment