Marketplace™ is the Division of Information Technology’s e-commerce solution for Jackson State University. Faculty and staff members may request the creation of Marketplace universal stores (uStores) to assist in the fulfillment of the University’s goals and objectives for their departments. The Division of Information Technology can create and manage online storefronts, registration or donation sites, and secure payment pages. Revenue from completed transactions automatically post to the general ledger. Store managers may run reports on their uStores anytime.
Students, faculty, staff, alumni, and community members can securely register and pay for events, products, and services around the clock from anywhere in the world.
To view current Marketplace uStores, click here.
Click here to access the Marketplace Store Request form.
IT services refer to the various types of support and assistance that organizations provide to users of computer and information technology systems. These services can be provided in-house by a company’s IT department, or they can be outsourced to a third-party vendor.
Some common types of IT services include:
- Help desk support: Provides assistance to users who are experiencing technical issues or have questions about how to use certain systems or software.
- Network and infrastructure support: Manages and maintains an organization’s computer networks and related infrastructure, such as servers and data centers.
- Cybersecurity: Protects an organization’s systems and data from cyber threats such as hacking and malware.
- Cloud services: Provides access to data storage and computing resources through the internet, rather than via on-premises hardware.
- Software development: Designs, creates, and maintains custom software applications for an organization.
IT services can be provided on a one-time or ongoing basis, and may be purchased on a pay-per-use or subscription basis. It is important for organizations to have reliable IT support in order to ensure the smooth operation of their systems and to protect against potential cybersecurity threats.