Search152 Results

Services or Offerings?
A/V Design and Installation Services provides design, installation, user interface creation and programming services for any department on campus seeking professional audiovisual integration. All systems are designed per user needs and can range in complexity from simple classroom projector rooms to broadcast-quality, distance-learning videoconferencing recording studios.

The access request system is the role-based security request system that users utilize to gain access to enterprise applications. Role requests are initiated by Department Security Administrators. For more information, please visit http://identity.it.ufl.edu/process/overview/.

UFIT provides the only authorized access to development AI resources for UF. AI resources through public cloud vendors are managed to ensure security and audit requirements are met to protect UF data. The Cloud Enablement team works with constituents to design, build, test and maintain AI services.

UFIT provides the only authorized access to AWS resources for UF. Cloud resources are contained within an account that ensures security and audit requirements are met to protect UF data. The Cloud Enablement team works with constituents to design, build, test and maintain services within AWS.

iThenticate is an online anti-plagiarism service available for UF researchers which scans documents word by word, cross-checking them with a database of more than 34 billion archived Web pages, 92 million published works, and 36 million scholarly articles. Many government organizations use iThenticate to review funding proposals and documents, including the NIH, NSF, and the EPA.

Turnitin is a suite of online tools designed to enhance the Assignment submission process.

The Application Management System is utilized to manage the undergraduate and graduate application processes. The MyAdmissions Applicant Status page is designed to provide all applicants with the status of their application, view what documents have been received and are outstanding, and provide uploading functionality. Internally, the Slate system allows the Admissions Office, colleges, and departments to receive, review, and release application decisions. The system will also support prospective applicant management.

The goal of the Information System/Data Flow Diagram is to capture the main components of an Information System, how data moves within the system, user-interaction points, and the Authorization Boundary. Think of this diagram as conceptual rather than technical, multiple systems can be abstracted together, and there's no need to detail every network connection. The Authorization Boundary describes the limits of the Information System which pieces are currently being assessed. Information Systems often depend on other Information Systems, but those other Information Systems will be assessed independently, and their risk factored into the current Information System.

The university requires a secure and reliable method of identifying members of its community for access to electronic data resources. This requires collecting and maintaining identifying attributes, ensuring that electronic identities match the appropriate persons, and mechanisms to authenticate and authorize use of those identities. College and department staff known as Primary Identity Coordinators and Identity Coordinators are responsible for creating and maintaining accurate contact and demographic information on individuals affiliated with the University of Florida. Identity Administrators have the similar ability as coordinators but may be in contact with more restricted information that is not disclosed or changed often. Departmental Security Administrator's (DSA) are responsible for granting and removing roles and permissions for access to administrative computer applications for people in their department, college or division.

This service allocates permissions and access to specific applications and application features. Requests for access are processed through departmental staff, approved by application support staff, and then implemented within the specific technology requirement. ARS Roles, UFAD Groups, and IdM Directory Registry Affiliations and other attributes comprise the data used with these access policies.

Backups - Data copies stored in an administratively independent system to enable restoration from a catastrophic failure of the primary system.
Archive - Data which is intended to be stored for "a long time", seldom read, seldom re-written.


BeyondTrust Remote Support provides departments with a secure, on-demand remote support solution that is easy to use, supports most major device types (e.g. Windows, Mac, Linux, iOS, Android), and can be utilized by a technician to provide assistance to both UF and personally owned endpoints both on and off campus.

Blue Light phones provide direct communication with the University Police Department and are used to report crime, fire, medical emergencies, or to request a police escort.

Building Network - Wired offers installation and maintenance services for wired networking systems within buildings. This service includes setting up Ethernet cables, network switches, and other necessary hardware to ensure a stable and high-speed internet connection throughout the building. Our team of experienced technicians can design, install, and troubleshoot wired networks to meet the specific needs of businesses or residential buildings.