My Recently Visited Services

Request software right from your computer.


Provides ASC-managed on-site network storage intended for research data.


If you are traveling to a country that is restrictive regarding what technology you can bring in, you will need to be issued a certified travel loaner laptop.


Request a discussion about Unity's capabilities and use, or about buying an exclusive compute node.


Assess needs, discussed approved vendors, testing in the AI Playground.


Request an account to access ASC resources.


A/V and computer support within classrooms and conference rooms owned by the College of Arts & Sciences.


Submit a software program for assessment of accessibility under the Americans with Disabilities Act.


Usage of UES, calendar sharing, group calendars, and room calendars.


Extended Reality (XR) Field Trips aim to integrate immersive experiences by utilizing Virtual Reality (VR), Augmented Reality (AR), and other emerging technologies into curricula in a way that will provide an enhanced educational experience for students and instructors alike.


Service of existing Filemaker databases.


Administrative access to devices or services.


Request access to an existing shared drive or creation of a new shared drive.


Don't see what you need? Submit a request and we'll get it to the right place.


Request an account to use Unity.


Troubleshooting and repair of ASC-owned IT assets.


Fix issues and answer questions about the ASC Standard Theme Website built on the Content Management System (CMS), Drupal.


Custom applications designed to support the administrative needs of the College of Arts & Sciences.


Training signup for ASC Standard Theme Websites built on the Content Management System (CMS), Drupal.


VPN

Virtual Private Network (VPN) creates a secure, encrypted connection, which can be thought of as a tunnel, between your computer and resources within your network security perimeter.


Help find or develop research data storage solutions.


RDP

Remote Desktop Protocol (RDP) allows a user to take control of a remote computer or virtual machine over a secure network connection.