Research IT Services

Research IT Services

ITS provides services to the UConn research community to assist in facilitating and implements information technologies. This is accomplished by identifying systems, services, and capabilities that will have a substantive impact on the community and delivering them robustly and at scale.



Campus Address

Homer Babbidge Library
1st Floor
Storrs Campus

Mailing Address

ITS Help Center
369 Fairfield Way
Storrs, CT 06269-1266

Services & Rates

IT wiki-hpc-1475x368

High Performance Computing

The High Performance Computing (HPC) facilities at the University of Connecticut provide our researchers with the power to manipulate, analyze, and store massive amounts of data at high speed. UConn maintains centralized computational facilities in Storrs and Farmington, each optimized for different research areas. For detailed information:


Enterprise Content Management

TS offers a secure, searchable electronic content repository via KnowledgeLake and SharePoint online's Enterprise Content Management (ECM) system. Currently, UConn provides a SharePoint online content repository along with the KnowledgeLake scanning/capture/searching front-end. For each customer, UConn builds a customized solution to meet their needs while providing cost savings, improved efficiency, and recovery of office space via this paperless environment. For detailed information:


Managed Server

ITS offers a Virtual Machine (VM), known as the managed server, for faculty and staff. Managed servers run on ITS supported hardware and are available in Microsoft Windows and Red Hat Enterprise Linux (RHEL) platforms. ITS will assist with the installation, configuration, maintenance, and management of the service.


Vulnerability assessment

The Information Security Office provides Nessus Vulnerability Scanner to individuals responsible for the security of University-owned devices for assessment of computers, computer systems, networks, or applications for weaknesses. Weakness can be defined as:

  • Vulnerabilities that allow a remote hacker to control or access sensitive data on a system
  • Misconfiguration (e.g. open mail relay, missing patches, etc.)
  • Default passwords, a few common passwords, and blank/absent passwords on some system accounts
  • Denials of service against the TCP/IP stack by using mangled packets
  • Preparation for PCI DSS audits

For detailed information:



UITS offers a variety of applications.  For detailed information: