Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • Status
    • Security Announcements
  • Services
    • Projects
  • How To
  • News & Events
  • About Us
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (20)
    • Homepage (1)
    • How-To (623)
    • Landing Page (38)
    • News (132)
    • Other Content (598)
    • Service (163)
    • Standard & Guideline (41)
    • Status (813)

    Service Category

    • Access & Identity (24)
    • Business Applications (165)
    • Desktop Support (60)
    • Education Applications (17)
    • Email & Collaboration (138)
    • Health Systems (11)
    • Hosting & Computing (29)
    • Network & Wireless (35)
    • Phones & Pager (15)
    • Research Services (40)
    • Security (52)
    • Web Services (119)

    2429 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    How-To

    Research Data System (RDS)

    The DSS team supports a custom-programmed Research Data System (RDS) for facilitating data collection and cleaning for multi-center studies. This system has been in use for more than twenty years and has evolved to meet the ever- changing requirements that investigators face. The RDS is comprised of MS SQL & MySQL databases and customized web interfaces that deliver features as specified by each project, and is designed to fulfill a spectrum of needs pertaining to research data transfer, collection, cleaning, storage and analysis.Key system features

    • Affiliate
    • Research Staff
    • Researcher
    • Staff
    • Student
    • Research Services
    How-To

    Programming Skills and Technologies Supported

    T-SQLVBScriptJavaScriptSASVisual BasicC#Ruby MS ASP./NETMVCXMLSAS InternetMS SQL ServerMySQLPostgreSQLMongoDBVisual Studio EnterpriseMS DevOps ServerPower BI

    • Affiliate
    • Research Staff
    • Researcher
    • Staff
    • Student
    • Research Services

    Service Interruption

    General APeX Slowness at Marin

    Resolved

    Service Interruption

    Network Shared Drive Connectivity Issues

    Services impacted: Network Services

    Resolved

    Service

    Drupal Site Builder CMS Training

    • Staff
    • Technical Partner

    Scheduled Maintenance

    APeX Upgrade Downtime

    Other services impacted: APeX Lab Orders/Results

    Services impacted: APeX

    Resolved

    News

    Security Change: Duo Verified Push for MyAccess Effective May 28

    ‌

    Other Content

    05/16/25: Vulnerabilities in Intel CPU

    Intel released security updates to address vulnerabilities in Intel CPUs. Potential security vulnerabilities in some Intel® Processor indirect branch predictors may allow information disclosure.For a complete description of the vulnerabilities and affected systems, go to 2025.2 IPU - Intel® Processor Indirect Branch Predictor Advisory.IT Security

    Other Content

    05/16/25: Critical, 0-Day, Exploited and Other Vulnerabilities In Microsoft Products

    Microsoft released security updates to address Critical, 0-Day, Exploited and other vulnerabilities in Microsoft products.For a complete description of the vulnerabilities and affected systems, go to Microsoft Security Update Guide for May.IT SecurityRead more about IT Security service offerings.

    Other Content

    05/16/25: Vulnerabilities in ASUS DriverHub

    Asus released security updates to address vulnerabilities in Asus DriverHub. These vulnerabilities can be exploited to remotely perform arbitrary code execution.For a complete description of the vulnerabilities and affected systems, go to Asus Product Security Advisory.IT Security

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 2
    • Page 3
    • Page 4
    • Page 5
    • Current page 6
    • Page 7
    • Page 8
    • Page 9
    • Page 10
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California