My Recently Visited Services

Hosting and administration of databases, physical and virtual.


Broadcasting, live streaming, video recording and media production. This area includes audiovisual-related event support.


This Service Offering consists of multiple applications used by faculty advisors and department staff across UM for multiple purposes - to facilitate appointments, view student information; record advising interactions; maintain advisor/student assignments; manage academic reviews, LSA degree audits, NCAA eligibility evaluations, cross-campus communication of releases/declarations/exceptions, Sweetland Directed Self Placement records and more. Applications to support curriculum approval and the LSA Course Guide are included.


Business intelligence platforms, data warehouses, dashboards, analytics tools, transactional reporting, operational data stores, and data governance when offered as a service.


Support for all types of end-point devices, including laptops, desktops, mobile devices, and related peripherals that are not in the printing service. These devices might be personally or institutionally owned and might be part of a shared pool or a computer lab. Includes support for the associated operating system, hardware, and systems that provide enterprise management of computing devices.


Ensuring that faculty and other course creators have the knowledge and assistance they need to optimize their effectiveness in using teaching and learning technologies, including e-text development and online course development.


Support of room and facility systems, including event management, mapping, building security, safety and risk management.


Technology associated with printers and copiers, such as copy, scan, fax, and print. Includes supporting technologies such as copy centers, print quota systems, 3D printing, and other replicating technologies.


Content management systems, portals, web hosting, web analytics, user experience design, and URL management. Also includes website and mobile application development.


Purchasing consultation, hardware procurement, device refresh, leasing, and technology recycling.


Offerings that provide a secure computing environment for end users. Includes network security, system security, application security, and threat monitoring and management.


Offerings relating to institutional policy or compliance guidelines and requirements. Includes support for audit processes.


Project portfolio management and related project management services.


Offerings that respond to, remediate, and seek to prevent security incidents and vulnerabilities.


Telephony, including voice/VoIP, teleconferencing, and web conferencing hosted either in cloud or on-premises.


The architecture, installation, and operation of infrastructure items required to offer network connectivity, such as network cabling, routers, and firewalls. Includes connecting devices (including Internet of Things devices) to the network, network access management, securing access to networks, and appropriate authentication (e.g., network registration systems, VPN, and NAC).


Distribution, installation, and troubleshooting of software and licenses via media, online methods, and license servers. Includes both cloud-based and desktop software.


Electronic message, information sharing, productivity, and integrated collaboration suites used to facilitate interactions between individuals and work groups as they create, share, and exchange information. Includes services such as email, calendaring, productivity suites, file sharing, instant messaging tools, and web-based collaborative platforms used strictly for collaboration.


Includes design and maintenance of the capabilities, tools, and service points needed to deliver IT services or provide end-user support. Includes software/infrastructure in support of service desks, call centers, and online support delivery. Might include concierge support or special event service delivery.


Support of the data life cycle, including data creation; discovery and collection; analysis and visualization; storage, backup, and transfer; and research data policy compliance.


Identity and access management, including accounts, authentication, access, and role-based provisioning.


Monitoring of IT services, including the underpinning technologies.