Skip to Knowledge Base content

Popular Articles

Tutorial on using your Cisco 7961 IP Phone
Steps to keeping your email secure
Project proposal template, with instructions on how to fill it out.
Canvas community is the online feature request site to submit your ideas to make Canvas better.
Procedures for requesting access in PeopleSoft.
Procedure for requesting timekeeper access in Workday
Helpful Hints
Cron Shell calls Java which does 3 things once daily at 12a on the SMTP.BYUH.EDU server
1. FROM HPROD: "SELECT * FROM PS_BH_WD_DT_VW WHERE DATE1 IS NULL"
2. Downloads photos from MIS App Server and resizes each photo to 200 pixels
3. Writes all photos to .TAR BALL (=zip file)
Asynchronously at 8:30a daily INT025 runs an Inbound Studio process to pick up the zipped images from the TAR and loads the photos to the user profiles on Workday
File storage options for BYUH
Adding/Dropping users to bulletin distribution groups
3 Easy steps to set up Dropbox
Add a shared folder to your account
This Information Security Plan describes BYU-Hawaii's safeguards to protect covered data and information.
2016-2017 Risk assessment plan
This document summarizes the BYU Hawaii'’s (the “Institution’s”) comprehensive written information security program (the “Program”) mandated by the Federal Trade Commission’s Safeguards Rule and the Gramm – Leach – Bliley Act (“GLBA”).