Announcements

General

Informational

Multimedia Services would like to inform the Rensselaer community that the Webex Education Connector used to connect Webex and Blackboard will be automatically migrated to Webex LTI Legacy on Sunday, June 2, 2024.

Informational

Multimedia Services would like to inform the Rensselaer community that the MyMediasite multimedia video system now has a new video editor with increased functionality that is immediately available to everyone with access to MyMediaite for recorded and uploaded videos. 

Informational

Want to save time on your daily tasks while working in Microsoft Office or Windows? 

There are many keyboard shortcuts that can assist you in a productive manner! 

So, instead of using your mouse, try some of these time-saving shortcuts below!

Informational

Dot CIO is pleased to announce a new service, OnStream IPTV streaming.

Informational

Did you know that Box has a collaboration tool called Box Canvas that empowers teams to be visually creative using whiteboards, to brainstorm, diagram and collaborate with anyone in real time.

Informational

DotCIO, in collaboration with Human Resources, is launching a cyber hygiene training course which covers basic aspects of cybersecurity and also includes instructions on how to report IT security incidents at Rensselaer.

Informational

Join us for our three-day quantum computing event, April 3-5, 2024, featuring workshops, poster sessions, technical sessions, a live episode of The New Quantum Era podcast, a keynote by award-winning journalist David Pogue, and a ribbon-cutting celebration marking the historic…

Informational

Multimedia Services is pleased to announce that Mediasite Capture is now available to staff and faculty through MyMediasite.
 

Informational

Now that we have 100gb of quota in Exchange Online, if you have archived email, we encourage you to import them to your live email. 

What are the advantages?

Informational

Cyber attackers have been very sophisticated and consistent in sending phishing emails attempting to gain access to our networks and information. These attempts can range from very spammy looking emails, to very targeted and spear phishing in nature.

Back to top