• Software available for students, faculty and staff

    Updated: 2024-10-15 20:01:55
    K-State provides free and for-purchase software products to students, faculty and staff. The goal is to make resources available to the K-State community to provide the necessary tools to reach academic, research and work goals. Microsoft 365 is a popular resource at K-State. This free office collaboration suite includes tools such as email, calendar, applications […]

  • Manhattan campus computer labs

    Updated: 2024-10-15 20:01:55
    Do you need to use a computer? There are many options available at the computing labs across K-State’s Manhattan campus: Cardwell Hall Math/Physics Library — Room 105 College of Business Admin. — Rooms: 1052, 1053, 3112, 3114 and 3121 Hale Library — Located on the first, second, third and fourth floors K-State Student Union — First […]

  • Use Microsoft Word’s styles feature to help keep the formatting of your documents consistent

    Updated: 2024-10-15 20:01:55
    Word Styles are a predefined combination of fonts, sizes, colors, and spacing that you can apply to your text with one click. Instead of manually formatting each section of your document, you apply a style to headings, subheadings, body text, and more. This standardizes your formatting and creates a cohesive look. The following are some […]

  • K-State utilizing geolocation for cybersecurity

    Updated: 2024-10-15 20:01:55
    The internet is an incredible tool for learning and sharing information, but it also poses a cybersecurity threat. To prevent hackers from stealing your personal information, K-State uses geolocation to protect accounts from being compromised by using IP information. If any suspicious activity is detected, the user will receive an email notification with recommendations on […]

  • Reltio's Data Plane Transformation with Spanner on Google Cloud

    Updated: 2024-10-15 16:00:00
    Spanner Reltio's Data Plane Transformation with Spanner on Google Cloud October 16, 2024 Anshuman Kanwar EVP , Reltio Nitin Sagar Sr . Product Manager , Google Cloud Google Cloud Summit Series Discover the latest in AI , Security , Workspace , App Dev , . more Register In today's data-driven landscape , data unification plays a pivotal role in ensuring data consistency and accuracy across an organization . Reltio , a leading provider of AI-powered data unification and management solutions , recently undertook a significant step in modernizing its data infrastructure by migrating from self-managed Cassandra to Spanner on Google Cloud . The outcome of this endeavor showcases amplified performance capabilities and seamless . scalability Reltio provides AI-powered data unification and

  • Boost Your Microsoft Teams Skills with These Quick Tips

    Updated: 2024-10-15 14:04:26
    Microsoft Teams is a hub for collaboration, allowing you to streamline communication, file sharing, and project management. Whether you’re new to Teams or looking to sharpen your skills, these tips can help you work more efficiently and stay organized. Organize Channels with Tabs Add tabs at the top of your team channels for quick access […]

  • BigQuery tables for Apache Iceberg: optimized storage for the open lakehouse

    Updated: 2024-10-11 18:00:00
    Data Analytics BigQuery tables for Apache Iceberg : optimized storage for the open lakehouse October 12, 2024 Anoop Johnson Principal Engineer Dylan Myers Group Product Manager Google Cloud Summit Series Discover the latest in AI , Security , Workspace , App Dev , . more Register For several years , BigQuery native tables have supported enterprise-level data management capabilities such as ACID transactions , streaming ingestion , and automatic storage optimizations . Many BigQuery customers store data in data lakes using open-source file formats such as Apache Parquet and table formats such as Apache Iceberg . In 2022, we launched BigLake tables to allow customers to maintain a single copy of data and benefit from the security and performance offered by BigQuery . However , BigLake tables

  • Tips for protecting your devices and personal information

    Updated: 2024-10-11 16:24:21
    You use devices like laptops, smartphones, tablets and watches to store sensitive information like your credit card. Protecting and securing that information is important to safeguarding your identity and data. Here are a few things you can easily do to protect your devices. Install antivirus software Antivirus software is your first line of defense. It […]

  • All devices connecting to the K-State network must have antivirus installed

    Updated: 2024-10-11 14:49:06
    Kansas State University is committed to maintaining the highest level of cybersecurity for our community. To strengthen our defenses, all devices connecting to K-State’s network must have antivirus software installed and kept updated. CrowdStrike is the antivirus solution for university-owned devices. It is not licensed for personal use. For antivirus protection on personally-owned devices, see […]

  • Using BigQuery Omni to reduce log ingestion and analysis costs in a multi-cloud environment

    Updated: 2024-10-10 16:00:00
    Data Analytics Using BigQuery Omni to reduce log ingestion and analysis costs in a multi-cloud environment October 11, 2024 Rodrigo Vale Data Analytics Engineer TJ Mai AppMod Customer Engineer Google Cloud Summit Series Discover the latest in AI , Security , Workspace , App Dev , . more Register In today's data-centric businesses , it†s not uncommon for companies to operate hundreds of individual applications across a variety of platforms . These applications can produce a massive volume of logs , presenting a significant challenge for log analytics . Additionally,  the broad adoption of multi-cloud solutions complicates accuracy and retrieval , as the distributed nature of the logs can inhibit the ability to extract meaningful . insights BigQuery Omni was designed to effectively solve

  • Protect Yourself from Ransomware: What You Need to Know

    Updated: 2024-10-09 14:14:52
    Ransomware is malicious software that locks your data or your entire device and demands a ransom to unlock it. Cybercriminals may promise to return your files if you pay, but there’s no guarantee they’ll follow through.  How Does It Spread?  Ransomware often comes through phishing emails, malicious websites, or infected downloads. You might think you’re […]

  • HRIS, KSIS and DARS maintenance scheduled for Oct. 13

    Updated: 2024-10-07 15:23:04
    HRIS, KSIS and DARS will undergo maintenance from 12 a.m. to 4 a.m. on Sunday, Oct. 13. This maintenance will keep the systems secure and up to date. Thank you for your patience as we work to maintain our IT systems.

  • How to identify CEO fraud

    Updated: 2024-10-02 13:48:55
    CEO fraud is when cybercriminals attempt to impersonate senior executives to deceive employees into transferring funds or sensitive information. These fraudsters target specific employees with personalized emails, usually asking their victims to complete a business activity such as paying a bill. They learn as much as possible about their targets and organization to make the […]

Current Feed Items | Previous Months Items

Sep 2024 | Aug 2024 | Jul 2024 | Jun 2024 | May 2024 | Apr 2024