Server Room

IT Infrastructure & Operations

What We Do

Our team provides IT Infrastructure design, integration, configuration, testing, modification, operations and maintenance. We offer the BSD a comprehensive and secure computing infrastructure, server virtualization, data storage and backup, and expert technical support. 

Our Infrastructure is housed in the 6045 and 1155 Data Centers on the University of Chicago campus. Our IT resources have evolved over the years to meet the growing needs of our user community. We strive to provide cutting edge IT solutions and services in a secure and HIPAA complaint environment, ensuring that our users are adequately supported and have seamless access to the computational resources they need.

With centralized, automated, encrypted backup and restore

  • 507TB of storage for departmental and administrative data
  • Secured and HIPAA-compliant
  • SMB/CIFS Access
  • Backed up nightly with 30 days retention
  • No Transfer Fees
  • $225/TB per year, billed quarterly

Request Secure Departmental/Administrative Data Storage

Provisioning application, web, and database servers

The infrastructure team supports Microsoft Windows and Red Hat Enterprise Linux (RHEL) Servers in different configurations. 

  • OS options: Windows, Red Hat Linux
  • DBMS options: MySQL, PostgreSQL, MS SQL
  • Web server options: Apache, NGINX, Oracle, IIS
  • Backed up nightly with 30 days retention
  • Pricing is based on CPU, memory and storage options

Request Server Virtualization

Our storage management solution for moving data that is no longer actively used but still needs to be retained for future reference or compliance purposes from primary storage systems to cheaper storage (tape and Azure Blob storage).

Data archival service is currently an add-on service for existing CRI lab share users. 

We provide expert advice, guidance, and support to BSD researchers regarding their information technology needs. Request IT Solutions Consulting

We define the requirements of our IT infrastructure based on the organization's needs and objectives. We assess current infrastructure capabilities, identifying gaps, and designing solutions that meet business requirements.

We procure hardware, software, and other resources, and configure them according to design specifications. This includes setting up servers, networks, storage systems, and other components, as well as installing and configuring enterprise software applications and services.

We manage changes to the IT infrastructure to ensure stability and minimize disruptions. Our change management processes govern the evaluation, approval, and implementation of changes to infrastructure components, such as software updates, hardware upgrades, and configuration modifications. 

We monitor the performance and health of various infrastructure components to ensure optimal operation. This involves using monitoring tools to track metrics such as CPU usage, memory utilization, network bandwidth, and storage capacity. Our performance management process also includes identifying and resolving issues that may impact system performance or availability.

Our IT infrastructure management involves forecasting future capacity requirements based on business growth and technological trends. Capacity planning ensures that our infrastructure can accommodate increasing demands without performance degradation or significant downtime. Optimization efforts focus on maximizing resource utilization, improving efficiency, and reducing costs through techniques such as virtualization, consolidation, and automation.

Securing our IT infrastructure is a critical aspect of our infrastructure management. This includes implementing security measures such as firewalls, access controls, leveraging the Information Security Office’s intrusion detection/prevention systems, antivirus software and encryption, to protect against cyber threats and data breaches. Our security management process also involves regular security audits, vulnerability assessments, and compliance with industry regulations and standards. Request Security Management

We plan and implement strategies to mitigate the impact of disasters or unexpected events on business operations. This involves creating backup and recovery procedures, implementing redundancy and failover mechanisms, and establishing business continuity plans to minimize downtime and data loss in the event of a disaster.

Working with PHI? Our systems are compliant with HIPAA requirements. We work with the BSD Information Security Office to achieve the highest possible level of data security, complying with organizational, state, and federal guidelines.

We provide assistance to users or customers who encounter issues with our computing systems, software applications, hardware devices, or IT services. Request End User Support