As part of ongoing efforts to fight “Zoom-bombing” and promote safe and secure online meeting spaces, on 27 September 2020 Zoom will require that all meetings have a Passcode or a Waiting Room enabled for all accounts. Zoom users are in control of meeting security selections, and Zoom has designed the options with security and […]
Update your contact information now!
Degree Audit Documentation for Students The University of Mississippi 10/2019 Degree Audit Support: 662-915-5222 E-Mail: firstname.lastname@example.org Degree audit is an advising tool – you will need to check with your Dean’s Office to confirm your audit results and remaining degree requirements Degree Audit is an advising tool for viewing a student’s progress towards fulfillment of […]
One of the biggest challenges in helping students who are at risk of academic failure is identifying them early enough in the term to make a difference. While there are many data points that can be used to predict a student’s success or failure, the most valuable is the insight offered by a caring instructor who has first-hand experience with the student. Find out how you can help with Academic Alerts.
Last November, the Office of Information Technology (IT) and University Communications requested feedback from the campus community on UM Today, a software framework for collecting, organizing and sharing announcements primarily among University of Mississippi (UM) students, faculty, and staff. We were pleased with both the number of responses (almost 900) and the quality of insights […]
Notifications from cell phones can be distracting. Whenever attempting to unwind for the evening, loud notifications from devices can become bothersome. To remedy problems with the device providing loud notification sounds, “Do Not Disturb” can be set up so that most sound and vibrations can be stopped for a period of time. To enable “Do […]
Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity— personalized scams. Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks. Below we show you how these scams work and walk you through a common example. The more you know about these scams, the easier it is for you to spot and stop them.