My Recently Visited Services
Hosting and administration of databases, physical and virtual.
Support for all types of end-point devices, including laptops, desktops, mobile devices, and related peripherals that are not in the printing service. These devices might be personally or institutionally owned and might be part of a shared pool or a computer lab. Includes support for the associated operating system, hardware, and systems that provide enterprise management of computing devices.
Security assessment, education, and awareness of campus security requirements, policies, and guidelines. Includes contract reviews and risk assessments.
Support of room and facility systems, including event management, mapping, building security, safety and risk management.
Administration and management of financial services, procurement, travel, budget, vendor relations, and equipment purchasing systems.
Administration and maintenance of faculty administration, review, and promotion and tenure systems.
Distribution, installation, and troubleshooting of software and licenses via media, online methods, and license servers. Includes both cloud-based and desktop software.
Offerings relating to institutional policy or compliance guidelines and requirements. Includes support for audit processes.
Admissions, enrollment, registration, orientation, financial aid, student accounts and collections, advising, and career services systems.
Offerings that respond to, remediate, and seek to prevent security incidents and vulnerabilities.
This Service Offering consists of multiple applications used by faculty advisors and department staff across UM for multiple purposes - to facilitate appointments, view student information; record advising interactions; maintain advisor/student assignments; manage academic reviews, LSA degree audits, NCAA eligibility evaluations, cross-campus communication of releases/declarations/exceptions, Sweetland Directed Self Placement records and more. Applications to support curriculum approval and the LSA Course Guide are included.
Purchasing consultation, hardware procurement, device refresh, leasing, and technology recycling.
Offerings that provide a secure computing environment for end users. Includes network security, system security, application security, and threat monitoring and management.
Computing and storage resources that support research that uses specialized or highly intensive computation, storage, bandwidth, or graphics. Includes advanced or specialized applications, such as plotting, visualization, modeling, rendering, animation, graphics programming, and image manipulation.
Identity and access management, including accounts, authentication, access, and role-based provisioning.
Project portfolio management and related project management services.
Support of the data life cycle, including data creation; discovery and collection; analysis and visualization; storage, backup, and transfer; and research data policy compliance.
Broadcasting, live streaming, video recording and media production. This area includes audiovisual-related event support.
Business continuity consulting and planning, as well as disaster recovery planning, including disaster recovery exercises and execution.
Recording and tracking lab experiments, equipment, and specimens.
Monitoring of IT services, including the underpinning technologies.
The architecture, installation, and operation of infrastructure items required to offer network connectivity, such as network cabling, routers, and firewalls. Includes connecting devices (including Internet of Things devices) to the network, network access management, securing access to networks, and appropriate authentication (e.g., network registration systems, VPN, and NAC).
Includes design and maintenance of the capabilities, tools, and service points needed to deliver IT services or provide end-user support. Includes software/infrastructure in support of service desks, call centers, and online support delivery. Might include concierge support or special event service delivery.