Search 265 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Selecting between the Service Request System and the Resource Management Portal when managing research computing and storage services

Storage and Research Computing, but does not allow updates other than to the lists of users allowed to access a given resource. Use the following table to choose the appropriate tool for your desired

Adding virtual environments to Jupyter Notebook

Summary This article details the steps for adding your Anaconda Python virtual environments to Jupyter Notebook, so that they show up as alternative notebook choices within Jupyter's dropdown menu

Linking Google accounts to WHE

Summary As of September 2016 you can link your U-M Google account to your LSA Web Hosting cPanel account. This allows you to login to your cPanel admin page with the standard U-M https

Editing captions for lecture recordings

." Once in the viewer, click the Transcript Editor in the upper right corner of the screen. When clicking a line of text, the recording will start playing an excerpt of the video to allow for quick

Requesting Lecture Recording if the form is not available

Summary Instructions for requesting Lecture Recording if you are not able to access the online form.  If you are having issues with your University of Michigan profile not allowing access to

Getting started on econstat servers

econstat6.econ.lsa.umich.edu Bring Your Own Storage The econstat pool allows users up to 40 gigabytes of local storage. Exceptions can be considered on a case-by-case basis, depending on available

SSH host key verification failed

Issue You receive an SSH remote host identification has changed message and host key verification failed when trying to connect through SSH to a computer you successfully connected to in the past

Viruses and malware

your computer allows cyber criminals to achieve their ends more conveniently in many cases, spyware is commonly configured in this way. 3. Interruptions from pop-ups and spam Unexplained pop-ups

Email spoofing and impersonation scams

when viewed on a mobile device since most phone-based email programs don't allow users to hover over links or to see the full email headers. Recognizing an email impersonation scam From

LSA-TS-FacultyLifeCycleSupport

gsi-allocations ... The LSA Faculty Life Cycle is intended to be the single site which incorporates historical data and administrative processes supporting our tenure track faculty, capturing milestones from recruitment