start
Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
- Security
- The communication partner can then decrypt the files with the help of his private key.
- Google Gmail (Android)
- of the Jade University Setting Up an E-Mail Account To set up a new e-mail account on your android device … Depending on the producer, you have to click: Cloud and Accounts, then Accounts or Accounts and Synchronisation … In the next step, complete by typing in the missing detailed information, then click on Next: Username
- End of Contract
- End of Contract As already described in the Life Cycle, at the end of your employment with the Jade … The user account will then be permanently deleted after a further deadline. … Punctual before the end of the contract, you should back up your data accordingly and delete it on the … most cases two basic usage scenarios will be distinguished: Use is only licensed on university-owned devices … Use for business purposes is also permitted on private devices for staff members of the university (see
- Document management
- For further information on the introduction and use, please contact Dezernat 3 - Innerer Service und … In this case, you access the PC client via a virtual desktop at Jade University. … activated File type: Searchable PDF, OCR OCR-language: German Resolution: 300dpi Color/black: Auto detect
- Wallet
- All areas of payment for the CampusCard will be developped and equipped in the following order: Library … Dues Cafeteria Canteen Multifunctional Devices Vending Machines Recharging the Wallet The wallet
- WebApps
- The University Computing Center has installed the following web apps: tasks Files Deck Calendar
- PC-Technology
- PC must be in official use and procured through the HRZ with a positive opinion.This applies to all devices … in the device recommendation for official procurement.
- Security
- The communication partner can then decrypt the e-mail using his private key.
- Certificates
- necessary, integration of the certification authorities into the operating system / the software used is described … The application process is described in the subsection user certificates. … The application process is described in the subsection group certificates. … The application process is described in the subsection server certificates.