My Recently Visited Services
Hosting and administration of databases, physical and virtual.
Security assessment, education, and awareness of campus security requirements, policies, and guidelines. Includes contract reviews and risk assessments.
Content management systems, portals, web hosting, web analytics, user experience design, and URL management. Also includes website and mobile application development.
Business intelligence platforms, data warehouses, dashboards, analytics tools, transactional reporting, operational data stores, and data governance when offered as a service.
Strategy, planning, architecture, and operation of physical and virtual data centers, including on-premises, remote, and cloud-based data centers.
Ensuring that physical classrooms, specialized learning environments, and virtual learning environments (e.g., immersive learning, augmented reality) are suitably equipped and functional to meet the needs of the education experience.
Project portfolio management and related project management services.
This Service Offering consists of multiple applications used by faculty advisors and department staff across UM for multiple purposes - to facilitate appointments, view student information; record advising interactions; maintain advisor/student assignments; manage academic reviews, LSA degree audits, NCAA eligibility evaluations, cross-campus communication of releases/declarations/exceptions, Sweetland Directed Self Placement records and more. Applications to support curriculum approval and the LSA Course Guide are included.
Software package management, research software development, research software optimization or troubleshooting, workflow engineering, containers and cloud computing, securing access to software, and software associated with physical specimens.
Provisioning, hosting, and administration of physical and virtual servers and related storage. Includes the maintenance and provisioning of core storage capabilities such as server storage and database backups.
Monitoring of IT services, including the underpinning technologies.
Support for all types of end-point devices, including laptops, desktops, mobile devices, and related peripherals that are not in the printing service. These devices might be personally or institutionally owned and might be part of a shared pool or a computer lab. Includes support for the associated operating system, hardware, and systems that provide enterprise management of computing devices.
Distribution, installation, and troubleshooting of software and licenses via media, online methods, and license servers. Includes both cloud-based and desktop software.
Broadcasting, live streaming, video recording and media production. This area includes audiovisual-related event support.
Technology associated with printers and copiers, such as copy, scan, fax, and print. Includes supporting technologies such as copy centers, print quota systems, 3D printing, and other replicating technologies.
Support of room and facility systems, including event management, mapping, building security, safety and risk management.
Offerings relating to institutional policy or compliance guidelines and requirements. Includes support for audit processes.
Recording and tracking lab experiments, equipment, and specimens.
Identity and access management, including accounts, authentication, access, and role-based provisioning.
Telephony, including voice/VoIP, teleconferencing, and web conferencing hosted either in cloud or on-premises.
Administration and management of systems that provide access to local and remote information in support of teaching, learning, and research. Includes acquisitions, catalog, circulation, a public user interface, discovery tools, and infrastructure services specific to library systems.
The architecture, installation, and operation of infrastructure items required to offer network connectivity, such as network cabling, routers, and firewalls. Includes connecting devices (including Internet of Things devices) to the network, network access management, securing access to networks, and appropriate authentication (e.g., network registration systems, VPN, and NAC).
Offerings that provide a secure computing environment for end users. Includes network security, system security, application security, and threat monitoring and management.
Business continuity consulting and planning, as well as disaster recovery planning, including disaster recovery exercises and execution.