Infrastructure

Includes Network Connectivity, Servers and Data Centers, Cloud Computing, and Databases.

Services (9)

Campus Network

The UIC campus network provides a robust and secure connection to the Internet and university resources.

Cloud Computing

UIC offers centrally-managed Cloud services through both Amazon Web Services (AWS) and Microsoft Azure. University researchers, departments, and staff are encouraged to enroll in these Cloud Services in order to get the best price, the appropriate security, and to feel confident that projects are managed in an environment that is compliant with University policy.

Database Systems

Technology Solutions offers two types of relational database management systems (RDBMS): Microsoft SQL and MySQL

Network Address Management

Technology Solutions provides basic DNS and basic connectivity.

Physical Server Hosting

Technology Solutions West Campus Data Center provides a server hosting environment including UPS and Generator backup power. This Technology Solutions-controlled space is operated as a university HIPAA covered entity, departmental server resource, in order to provide secure and reliable services for university servers, computing, and data applications.

Research Data Transfers and Management

Globus is a platform designed to transfer and manage large amounts of data quickly and reliably across the web. Using this service, researchers can move, share, sync, and discover data via a convenient web interface.

Server Backups

Departmental servers contain a vast amount of valuable data critical to the university’s missions of instruction and research. The university has an interest in making sure this data is not inadvertently lost, whether by human error, equipment failure, or malware attack. The owners and administrators of these systems can request backup services.

Virtual Machines

A Virtual Machine is a guest server hosted on a VM host.

Virtual Private Network (VPN)

The Virtual Private Network service allows you to securely access resources at UIC over a non-UIC Internet connection. While connected to the VPN, the client software works with the operating system to determine when you are accessing an Internet location that the client should protect. When you are accessing such a location, the VPN client encrypts the data.