Research IT Services

Storrs
Information Technology Services

ITS provides services to the UConn research community to assist in facilitating and implements information technologies. This is accomplished by identifying systems, services, and capabilities that will have a substantive impact on the community and delivering them robustly and at scale.

Facility Homepage

Facility Phone Number: 860-486-4357

Campus Address

Homer Babbidge Library
1st Floor
Storrs Campus

Mailing Address

ITS Help Center
369 Fairfield Way
Storrs, CT 06269-1266

Resources

High Performance Computing

The High Performance Computing (HPC) facilities at the University of Connecticut provide our researchers with the power to manipulate, analyze, and store massive amounts of data at high speed. UConn maintains centralized computational facilities in Storrs and Farmington, each optimized for different research areas. For detailed information: https://hpc.uconn.edu/

computer motherboard

Enterprise Content Management

TS offers a secure, searchable electronic content repository via KnowledgeLake and SharePoint online’s Enterprise Content Management (ECM) system. Currently, UConn provides a SharePoint online content repository along with the KnowledgeLake scanning/capture/searching front-end. For each customer, UConn builds a customized solution to meet their needs while providing cost savings, improved efficiency, and recovery of office space via this paperless environment. For detailed information: https://services.its.uconn.edu/service/content-management/

image of a laptop

Managed Server

ITS offers a Virtual Machine (VM), known as the managed server, for faculty and staff. Managed servers run on ITS supported hardware and are available in Microsoft Windows and Red Hat Enterprise Linux (RHEL) platforms. ITS will assist with the installation, configuration, maintenance, and management of the service.

Person taking notes in front of a computer

Vulnerability assessment

The Information Security Office provides Nessus Vulnerability Scanner to individuals responsible for the security of University-owned devices for assessment of computers, computer systems, networks, or applications for weaknesses. Weakness can be defined as:

  • Vulnerabilities that allow a remote hacker to control or access sensitive data on a system
  • Misconfiguration (e.g. open mail relay, missing patches, etc.)
  • Default passwords, a few common passwords, and blank/absent passwords on some system accounts
  • Denials of service against the TCP/IP stack by using mangled packets
  • Preparation for PCI DSS audits

For detailed information: https://services.its.uconn.edu/service/vulnerability-assessment/

Person using a computer

Applications

UITS offers a variety of applications.  For detailed information: https://services.its.uconn.edu/?category=applications

Person using a laptop