Tritorr is used to import and workflow purchase card transactions. It is managed by the Finance department and distributes an emailed statement to relevant card holders for reconciliation and coding.
ResourceLink is the College’s core HR/Payroll system and is the main College repository of staff information. The system underpins all HR operations and is used to inform staff- based decisions and ...
Cognos Planning is the allied reporting tool for ResourceLink and MyHR. The system allows for the production of complex reports that are used to inform both operational and strategic operations. This ...
After competitive tendering under EC Procurement Regulations, the London Universities Purchasing Consortium (LUPC), of which QMUL is a member, has awarded contracts for the supply of desktop computers ...
Oracle Business Intelligence Discoverer is a tool-set for ad hoc querying, reporting, data analysis, and Web-publishing for the Oracle Database environment. Oracle Corporation markets it as a business ...
This is the information required for configuring IT Services-supported email clients to access your QMUL Office 365 account using IMAP. You will need to know your ...
IT Services have recently consolidated GraphPad Prism licenses into one manageable group to reduce the price for each user. When purchased individually, licenses can cost the full price of $202 per ...
Welcome to the security advisories page which we have nicknamed "Smoke Signals". Smoke signals are one of the oldest forms of communication and it is a more visual form of communication used over ...
This privacy notice explains what personal data of users of Office 365 at Queen Mary University of London (QMUL) will be provided to whom and for which purposes. It is in addition to QMUL’s Data ...
Kinetics (Kx) is an application used for external and student residential bookings, conferencing, external and internal catering bookings, external event management and marketing activities. How to ...
AutoRun is a feature used to play CDs or USBs as you insert them to your device without further intervention. This feature is used by malicious actors to infect malware into user devices. The malware ...
Phishing is an attempt to obtain sensitive or personal information such as usernames, passwords and credit card details by disguising itself as a trustworthy entity in an electronic communication.