start
Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
- Pools
- Pools The provision of virtual desktops always takes place in so-called pools. The provision of virtual desktop pools is based on organisational and technical characteristics. Depending on the status (staff member or student) and organisational unit (department/administration/central institution), one or more virtual desktop pools are offered.
- Encryption
- Encryption Description The connection to the Collaboration Cloud Storage environment always happens in an encrypted form, regardless of the chosen access path. This means that nobody between your end device and the CCS server environment can have an insight into your saved data or used passwords. However, the
- Authentication
- Authentication The following authentication methods are available in IT systems: Local authentication IT systems with the local authentication (LA) method manage the credentials locally on the system. On this type of IT system, a combination of user name & password must therefore be generated and maintained, users & users thus
- Network
- Network In this section you will find information on the following network services offered: * SDA: Digital Network Architecture * DNS: Domain Name System * Zeitdienst: Time Service
- FAQ
- FAQ This page shows some remarks and answers to frequently asked questions. Notification "The Microsoft Exchange admin has...“ Question: I received the pictured notification in Microsoft Outlook and after that, the connection to my inbox was interrupted. What am I supposed to do?
- Clients
- Clients To use a virtual desktop you need * a program for your PC / an app for your smartphone - a so-called software client or * a device that is able to access a virtual desktop - a so-called hardware client. Hardware-clients * thin and zero clients (e.g.
- Document management
- Document management At the Jade University of Applied Sciences, document management is carried out with the help of the product “d.3” from the company d.velop. The university computer centre is responsible for the technical operation of the system. The institutions using the system are responsible for the content.
- Group certificates
- Group certificates Prerequisites To create a group certificate, the following requirements must be met: * The shared mailbox must already exist and the e-mail address must be known. * A person with primary responsibility must be named for the shared mailbox.
- Virusprotection
- Virusprotection Any device connected to the Jade University network must have appropriate virus protection and must be updated regularly. Since June 2023, we have been using the product “Sophos Endpoint Protection” as virus protection at Jade University.
- Client integration
- Client integration For the secure and trouble-free operation of all devices on the Jade University network, it is necessary that the parameters described below are used in the devices. ---------- PC Systems For PC systems, the full device name and membership must be entered.