File sharing gives others access to digital media and is a key mechanism for collaboration. In the past, this was limited to sending, receiving, or accessing information in files, but modern systems also support co-authorship, versioning, and concurrent editing. Continue reading
The Office of the Vice President for Information Technology and Chief Information Officer oversees the operation of UConn’s Information Technology Services (ITS). As the provider of central technology and computing services, ITS is responsible for deploying, managing, and maintaining IT systems, services, and capabilities in support of research, teaching, learning, and outreach. The Vice President and CIO provides leadership and strategic direction that guide fulfillment of this mission.
- Simple Service Descriptions for University Central Information Technology (IT) OrganizationsBackground This document illustrates a simple framework detailing high level service descriptions and the three primary roles a central IT organization must fulfill to ensure institutional impact: identifying general services for the university community, delivering effective building block services to distributed IT professionals, and acting as an organizational mentor in facilitating technology adoption. Understanding the relationship between services and […]Posted on March 24, 2014
- SafeConnect DiscontinuedITS has discontinued SafeConnect, the university network access control system. The SafeConnect environment has provided a number of operating and management benefits to the university. It has, however, also generated a significant number of support problems for the community. ITS recently deployed a new version of the environment. It did not adequately address the long-standing […]Posted on April 4, 2014
- InCommon Certificate ServiceITS has procured an InCommon Certificate Service for the University. This service allows us to generate, for all UConn Domains, an unlimited number of certificates (e.g., SSL, extended validation, client, and code signing) that are validated by a trusted Certificate Authority. Technical staff across the institution aggressively responded to the recent Heartbleed exploit and updated […]Posted on April 11, 2014