Server and Desktop Virtualization

The DSS team operates virtual servers that can be configured to meet the needs of disparate groups or research teams upon request, and supports Remote Desktop protocols for individual network users.  All virtual/remote computing offerings operate entirely behind multiple, secure firewalls.

Solutions (Skills):

  • Full Desktop virtualization Windows and Linux (VDI desktop replacement solution))
  • Able to virtualize a range of applications per user specifications
  • Extensive computation resources available to normal users supporting needs far above the capacity of desktop computers and small clusters
  • High performance computing cluster for needs beyond our regular computation rersources
  • Advanced Hypervisor solutions available to users: MS Hypervisor & Docker
  • Long term archive cold storage solution
  • Secure external collaboration via GLOBUS and GoAnyWhere Managed File Transfer

Hosted Software and Hardware Resources

Resources available to Network Recharge subscribers are:
Access to the following software packages (all software is hosted on our servers):

  • FoxIt PDF Editor & Adobe Acrobat Professional
  • ArcGIS
  • Endnote
  • Google Chrome
  • Microsoft Office Professional
  • Microsoft Visio
  • Mozilla Firefox
  • MySQL
  • MongoDB
  • ElasticSearch
  • NVivo
  • Power BI - Data Visualization
  • GLOBUS
  • PASS
  • PostgreSQL
  • R (32-bit and 64-bit)
  • SAS
  • SPSS
  • SQL Server database
  • Stat Transfer
  • Stata MP
  • Tableau (full desktop)
  • Visual Studio Enterprise
  • 7zip, WinZip
  • Dedicated Linux VM
  • Go AnyWhere Managed File Transfer (MFT)

Individual Storage Space (hosted on our servers) up to 100 GB/user.

Shared Storage space for files that are shared among teams, up to 100GB/team; we manage permissions and access for you.

Backups:  All servers are backed up at least once per day, and copies of backups are retained for three months. SQL server databases are backed up four times daily. Critical databases are backed up hourly.

Cybersecurity:  All of the work that users perform on our network is considered private and secure - sitting behind a second DEB firewall isolating and protecting the DEB  infrastructure. It is managed according to the policies and procedures laid out in the UCOP Policy of Electronic Information Security (IS-3).  We perform daily vulnerability scans and remediate as necessary. Regularly applying updates and patches as required to OS, Application, and networking hardware. Virtual machines (VM) and databases are protected at-rest through the use of strong encryption. Additional protection for VMs is provided through shielding from the Hypervisor host.  All traffic into and out of our infrastructure is monitored via FireEye NX hardware.  We are considered a high-security zone within the UCSF network and are currently compliant with FSMA/NIST security protocol 800-53 (LOW). CSET report available upon request.