My Recently Visited Services

Don't see what you need? Submit a request and we'll get it to the right place.


ASCTech will assist with installing software and any software issues.


Support of ASC-owned printers.


Provides ASC-managed on-site network storage intended for research data.


Request an account to access ASC resources.


Provides guidance on all aspects of scientific computing.


Get access to Google Analytics account and reports for ASC Standard Theme Website built on the Content Management System (CMS), Drupal.


Custom websites designed to meet the research needs of our distinguished researchers and faculty in the College of Arts & Sciences.


Request access to ASC's SSH jump host.


ASCTech provides consultation and IT support for design projects in classrooms and other learning environments and collaborative spaces.


Submit a software program for assessment of accessibility under the Americans with Disabilities Act.


Assistance with security incidents, such as stolen/lost computers, infected machines, etc.


Request an account to use Unity.


Admin access to devices or services.


Help find or develop research data storage solutions.


Request software right from your computer.


Request a discussion about Unity's capabilities and use, or about buying an exclusive compute node.


Extended Reality (XR) Field Trips aim to integrate immersive experiences by utilizing Virtual Reality (VR), Augmented Reality (AR), and other emerging technologies into curricula in a way that will provide an enhanced educational experience for students and instructors alike.


Request a sign or help with an existing sign


The ASC Website Hosting Service, also known as WWW or Tri-Dub, is for those users who need to create and publish HTML and PHP directly.


Project management tool used in the development cycle.


Installation and troubleshooting of wired networks.


Request access to an existing shared drive or creation of a new shared drive.


VPN

Virtual Private Network (VPN) creates a secure, encrypted connection, which can be thought of as a tunnel, between your computer and resources within your network security perimeter.