Recently Modified Articles

Universal Capture Personal allows faculty to record synchronous or asynchronous class lectures on their computer, from their office, home, or any location.
Learn the different ways videos can be recorded or uploaded to Echo360. View the classroom grid on what equipment is installed in each room, including what type of Echo360 Appliance if applicable.
Big Blue Button (BBB) premium concludes on 12/31/2021. This article will walk you through how to download your recorded conferences created with BBB and upload to our supported tools Echo360 and Stream.
The following table lists common third party websites SVSU users may interact with from time to time; identifying their "preferred" browser.
Overview of supported tools for teaching and a comparison table of synchronous and asynchronous software.
Teams Meetings integration was introduced to SVSU Canvas on 8/17/21.  This is a new process that makes creating and accessing Teams meetings easier while remaining in the Canvas interface. Create Teams meetings and invite all enrolled students to the meeting. Set Teams meeting options to change students from presenter to attendee role
Echo360 allows you to record in the classroom and on your computer. Learn different ways to record, how you can engage your students, watch training videos, and view support articles.
Software and resources for faculty, staff, and students to teach and collaborate online.
SVSU standard computer & laptop ordering information, including add-ons/extras and printers.
Instructions for adding a print queue / printer to a Mac computer.
Add Users to Shared Office 365 Email
This Information Technology Related Purchases policy is a supplement to the Purchasing and Check Requisition policies included in the Operations Manual and the Procurement Card policy.   The following documents purchasing/payment rules related to information technology related purchases.
There are certain scenarios where various departments require unique technology and equipment that may be outside the scope of Information Technology Services (ITS) responsibility or ability to support and may not meet security compliance/standards. This document is to outline the policy requirements for those scenarios where compliance cannot be maintained (i.e. research equipment with special/unique devices attached for data acquisition and/or analysis).
When a user is granted access to email via the Technology Access (TA) routines, an associated Adobe license is activated (applies to employees and registered students). There are two Adobe Product groups to manage Named User License access: SVSU Employee – All Adobe Apps and Spark Premium. All eligible users with a valid Named User License are provided online storage via the Spark Premium license (2GB).
This document will outline the process to be followed for tracking the lifecycle of IT assets. IT assets include end-user devices, classroom technology, servers, networking devices, software and applications.
The Grant Equipment Disposal guidelines are provided to help ensure that ITS follows the Federal Regulations that must be followed when disposing of equipment purchased with federal funds.
From time to time ITS may have surplus computer equipment that is obsolete to the University, but may have value to others. This policy ensures that the equipment is disposed with the best interests of the taxpayers in mind.
All students rostered in a Canvas course have access to Echo360 content. Students do not have a separate log in outside of their SVSU network password. Students can access Echo360 in a variety of ways in Canvas.
Monitor active participants and use the classroom tools and poll your students.
View/download instructions on using an Echo360 appliance for scheduled/Live Stream recordings.
A collection of questions and answers about Echo360 and how it works.
Information about installing Apple Mac OS updates.
Student/Attendee Guide to Joining a MS Teams Meeting that Originated in Canvas
How to determine a Phishing or Spam email
Spam is any unwanted email. It is not necessarily malicious.
Phishing is malicious. It goes beyond spam and tries to either infect the computer with malware or steal login credentials.