“Walk so silently that the bottoms of your feet become ears,” instructed Pauline Oliveros, in her Sonic Meditations from 1970. As well as pushing at disciplinary, social, and institutional boundaries, ...
The Ezra and Cecile Zilkha Gallery is dedicated to presenting groundbreaking solo and group exhibitions and installations that explore contemporary issues, often through an interdisciplinary lens.
Wesleyan students, faculty, and staff can RSVP on WesNest. Ad Hoc Bach is a collective of Wesleyan University students, faculty, staff, alumni, and local community members. They present the next ...
Wesleyan students, faculty, and staff can RSVP on WesNest. Pianist Noah Baerman, Private Lessons Instructor and Director of the Wesleyan Jazz Ensemble, and his trio featuring bassist Henry Lugo and ...
Black Voices and Visionaries in Cinema is a seminar that bridges decades of filmmakers who have explored the fundamental predicaments of the Black experience in the United States and around the world.
All IoT devices must be configured to automatically install patches and firmware updates within 90 days of release. Acknowledging that IoT devices often lose support faster than workstations and ...
8 characters in length with at least 1 number and at least 1 alpha or special character 14 characters in length User passwords for accounts that do not use multi ...
Approved ITRs for storing, processing, or transmitting payment card information All online ITRs used for storing, processing, or transmitting payment card information should outsource all payment ...
This standard covers all workstations, whether laptops or desktops, that are supported by the university. This covers all workstations purchased with university funds regardless of which funds are ...
To ensure that university data is appropriately encrypted to prevent access by unauthorized individuals.
This standard covers all servers, whether physical or virtual, that are used by the university. This covers servers administered by university staff and faculty as well as servers administered by ...
This Vulnerability Management Policy outlines the process for scanning Information Technology Resources (ITRs), as defined in the Appendix, for vulnerabilities across the university network and the ...