Computer Clusters

Computing Clusters

ITS supports Computing Clusters (Labs) located on the Omaha and Lincoln UNMC campuses available to students, faculty and staff. A UNMC NetID is required to log in to the computers and files should be stored on flash drives. Some clusters or buildings may require Campus Photo ID card swipe access. Contact the ITS Helpdesk at 402-559-7700 with questions.

Student Printing

Locations Room Phone Hours # of Computers
College of Pharmacy *(P) 2003 402-559-5162 8 a.m. - 5 p.m. 18

Sorrell Center (P)

*Events Center, Clinical Skills, 1005,2010,2014,2018,3001,3002,3029,3030,4024,4053

3rd floor near lockers phone in hallway 8 a.m. - 5 p.m. 16
McGoogan Library *(P) 8012 402-559-4575 8 a.m. - 6 p.m. 12
McGoogan Library *(P) 6th floor near interlibrary loan no phone same as library 6
Center for Nursing Science* 3rd Floor common area no phone same as building 15
Student Life Center* 2005 402-559-4577 24 hrs/ 7 days 8
College of Dentistry *(P) 47 402-472-5564 8 a.m. - 4:30 p.m. 14
College of Nursing *(P) 021 Commerce Court 402-472-7380 24 hrs 7 days 35

(P) Printer available
* DVD/CD drive available


  • Microsoft Windows 7 including recent patches and fixes
  • Microsoft Office 2010 including:
    • Word
    • Excel
    • PowerPoint and
    • Access
    • Publisher
    • OneNote
    • InfoPath
  • SPSS and SAS Statistical Applications
  • Microsoft Internet Explorer Browser
  • Firefox Browser
  • Java
  • Symantec Virus Software
  • Radiology Viewing Software

Appropriate Use of Computing Cluster Equipment

Faculty, staff and students are required to observe appropriate use of computers. Downloading music, video and text without permission is not allowed. Network traffic is monitored by ITS. Before using the UNMC information systems and resources, faculty, staff and students are required to understand the UNMC’s policy on Appropriate Use of Information Technology Resources and the University of Nebraska’s Policy for Responsible Use of University Computers and Information Systems, Executive Memorandum 16. For more information about Information Security, click here