This includes individual file storage options such as OneDrive which is part of Office The University cannot provide you with financial support to enhance your broadband package. We have put together advice on getting the best out of existing internet connectivity. Some internet service providers ISPs have promised they will remove usage limits during the current crisis. If you're working off a Windows device, please ensure your machine has Windows 10 operating system installed.
Further anti-viral products are not required for Windows Devices not upgraded to Windows 10 present a security risk if processing Queen Mary data and should not be used. Apple Macs have a built-in anti-virus solution XProtect.
Colleagues using a Linux distribution with up to date security patches are less prone to attack or viruses, although there are supplementary free solutions which can be installed for that operating system. If you're currently using a Queen Mary managed laptop, this will automatically connect into the Queen Mary environment through the VPN secure tunnel built into the device. This facility is called "Direct Access".
For those without a managed laptop, VDI works on most operating systems and devices including iPads, Chromebooks and Android tablets. VDI allows a user to emulate their University desktop on their own device.
Most people will not need VDI as the majority of Queen Mary applications can be accessed over the internet. Please add requests to the shared spreadsheet by Wed, 12 noon. Please email Its-vdi-laptop qmul. So far, we have accommodated all VDI requests and have set them up by the end of the week. Adding users in this staggered way allows ITS to monitor system capacity against usage, ensuring that all business-critical activities can be carried out.
VDI requires 2 factor authentication , i. If colleagues do not have a smart phone, ITS can post them a token to access a code. Please contact the Service desk if you need a token. Our policy remains that the University will supply one primary device per staff member, replacing when they are "no longer fit for purpose" see below.
We are also subsidising the costs of other manufacturers and models. All other devices e. Use the icons on the upper-right corner to view them in a list. This will depend on the type of assignment set by your teacher. If Turnitin is enabled then a report will be generated and if you want to amend your work based on the report, then you can do so whilst it is still uploaded as a draft. Once you have submitted your work, you will no longer be able to edit it unless your school allows submission points to be reopened make sure to check this with your course leader.
Therefore, if you intend to change your work based on a Turnitin report, then upload your assignment with plenty of time to spare, and only upload it as a draft. Please ensure you submit your assignment before the deadline, irrespective of waiting for a Turnitin score. Different from the first option, you will not be able to make any changes to the submission. They are very flexible but can also cause more confusion. While the standard Linux file ACL commands such as getfacl and setfacl may work, they can still give a limited view of what is really going on.
If you really want to see what the permissions are you should use mmgetacl and mmsetacl. Additionally, if cluster jobs fail due to permission issues, an understanding of the issues covered here will help you to troubleshoot why this occurred, and how to resolve the issue yourself, or escalating to us if administrative privileges are required.
Share this. Note: We do not allow personally identifiable data to be stored on the cluster. If your data is personal please ensure it is stored correctly in line with the Data Protection policy.
Software install location e. Software licensing information i. Is there a license file? Is license server access required? How many seats is the software licensed for? This may take more than 15 business days. NOTE: IT Services are obliged to evaluate the software to ascertain that it doesn't violate any of our security policies.
0コメント