Software, applications and new tools are available for free or at a discounted rate for the university community. Learn more about BioRender and high performance computing tools.
Microsoft Copilot is an AI tool that can help you save time and improve productivity and is now approved for use through our university licensing. With its AI-powered capabilities and commercial data protection, Copilot is a secure and reliable tool that can assist with a variety of tasks including answering complex questions and generating images with DALL-E 3. Check it out!
Updates coming soon to the EMS Room Scheduling System (EMS). Videoconference and webinar services will soon be available to request as part of the room reservation process.
The Division of Professions and Occupations has identified a statewide scam that is targeting licensed professionals. Learn more on how to protect yourself from this scam.
To successfully make a software or hardware purchase, you will want to plan ahead to ensure you have a seamless compliance review and a successful purchase through Marketplace. Here is the process for an application security review.
The world and the university are transitioning to Windows 11 in the next 18 months. Microsoft has designated October 14, 2025 as the last day of support for Windows 10. Learn more about the universitywide transition to prepare for this change.
Microsoft Copilot is an AI tool that can help you save time and improve productivity and is now approved for use through our university licensing. Copilot combines the generative AI capabilities of Bing Chat with commercial data protection. This means user and business data is protected and will not leak outside of our organization, prompts and responses are not saved, no one at Microsoft can view chats, and data is not used to train the underlying large language model (LLM).
The university has seen an increase in smishing and phishing attempts. Reporting suspicious emails and text messages is easier than ever from both your computer and your phone. To report a suspicious email to be reviewed by one of our security experts, follow these directions on our website.
Cybercriminals have many ways of infiltrating our systems, and while that makes us uneasy, there are ways to recognize and prevent attacks from happening. This article includes tips on how you can prevent and recognize when a malicious actor has obtained access or information from your systems.