Tulane Home Tulane Shield logo linking to site home page
SPHTM Information Technology

SPHTM-IT supports the Tulane School of Public Health and Tropical Medicine by demonstrating technological leadership and by providing a secure, cost-efficient, stable computing environment.

Services Submit a Ticket Connect to WiFi

Contact UsReset Password Knowledge Base

SPHTM-IT Open House

School of Public Health and Tropical Medicine Information Technology (SPHTM-IT) Department Open House. New SPHTM students, come check out what services SPHTM-IT has to offer!

Learn More
COVID-19
SPHTM-IT/COVID-19

Tulane IT has released its Academic and Business Continuity Plan.

Learn More
Blue cloud shape with symbol for a laptop, setting up a remote computer lab
SPHTM-IT/VCL

Tulane is offering SPHTM students access to available software on-demand, anywhere, and anytime.

Learn More
Android and IPhone graphics with WiFI symbol
SPHTM-IT/Hotspot

A Personal Hotspot lets you share the cellular data connection of your iPhone or iPad (Wi-Fi + Cellular) when you don't have access to a Wi-Fi network.

Learn More
Blue box with Zoom letter logo in middle
GRIT / Zoom Videoconferencing

Zoom is our new Enterprise tool for videoconferencing. Available to students, faculty and staff.

Learn More
Yuja platform logo on white background, Black YU and green YA, letter "a" styled as play button
GRIT/YuJa Enterprise Video Platform

Cloud-based enterprise video platform enabling lecture capture, live streaming, synchronous video classrooms and video management and distribution, includes captioning.

Learn More
Purple graphic for Endnote X9 product for students
SPHTM-IT/EndNoteX9

EndNote X9 makes managing research easy for anyone from the novice researcher publishing their first discovery to the senior professor writing a grant.

Learn More
Keyboard, pen, and sticky note with "Tulane Cyber Security Best Practices" written on it
GRIT/Cybersecurity

Tulane faculty, staff, and students are vulnerable to information theft, data loss, and identity impersonation which can be used for profit and exploitation if steps are not taken to secure devices and accounts. Focusing on best security practices will help reduce these threats.

Learn More

tracking code