Event AV and Technical Support

Short description

Discovery Commons can provide consultation, computer technical support, AV support, and networking connectivity assistance for your event or meeting.

Encrypted USB Drives

Short description

All USB drives used to store work-related and confidential files must be encrypted. High-quality hardware-encrypted USB drives are available at very low cost from the Faculty’s MedStore.

Virtual Server Hosting

Short description

For Faculty of Medicine clients who need a server on which to host a website or web application, the University’s Information and Technology Services (ITS) group provides access to the same secure infrastructure used by Discovery Commons to host the sites and systems we manage.

eLearning Module Hosting

Short description

Hosting of eLearning modules (such as those produced in Articulate Storyline) on our dedicated server.

Data Backup for Servers (UTORecover)

Short description

Professionally-managed backup solution provided by Information Technology Services (ITS). Other than the requirement that the client system be on the University’s network, there are virtually no restrictions on the type of hardware, operating system or total amount of data to be backed up.

Web Application Development and Hosting

Short description

Discovery Commons works with our clients to design and develop academic and administrative applications to meet a wide variety of business objectives.

Computing Technology Support – On Demand

Short description

Provide users and department with on-demand support for computers and devices which are the property of Faculty of Medicine, and basic connectivity and network troubleshooting.

Computing Technology Support – Annual

Short description

This service involves the provision of scheduled computing technology (hardware and software) support for the entire department / program during a defined period of time (minimum 1-year period).

Web Application Vulnerability Scanning

Short description

Discovery Commons performs proactive online vulnerability scanning on websites and web applications that contain confidential and (in particular) protected data (such as personal information, or PI), to ensure that all known vulnerabilities have been addressed, and that all reasonable security controls are in place.

Back to Top