College of Engineering and Physical Sciences Dean's Office EERB 401
1000 E. University Ave.
Laramie, WY 82071
Phone: (307) 766-4253
Email: enginfo@uwyo.edu
If you choose to buy a computer, then you should purchase the best computer you can afford, so it will last your entire academic career. Many computer vendors offer student discounts, so make sure to check.
Laptops or tablets are encouraged. Wireless access is available around campus using your student login credentials.
These are the minimum specifications you should follow (Autodesk Revit Users, Computer
Science, and Computer Engineering students should use the larger specifications as
minimum specifications). Revit and SolidWorks users should check the video card recommendations
at the vendor’s web sites.
|
Laptop |
Cad station laptop |
Computer Processor |
Intel i5/i7 |
Intel i7/i9 |
Memory |
8 - 16 GB |
16 - 32 GB |
Hard Drive |
256 / 512 GB Solid State |
512 GB / 1 TB Solid State |
DVD+RW |
Optional |
Optional |
Video Card |
256 / 512 MB |
NVIDIA / AMD Class |
Monitor |
User preference weight vs. size |
User preference weight vs. size |
Ethernet |
Ethernet adaptor |
Ethernet adaptor |
Wireless |
Yes |
Yes |
Sound Card with Speakers |
Optional |
Optional |
2nd Laptop Battery |
Optional |
Optional |
2nd A/C Adapter |
Optional |
Optional |
Warranty 3/4yr Parts/Labor |
Yes |
Yes |
Theft/Damage Insurance |
Recommended |
Recommended |
The University of Wyoming now provides free copies of Office 365 to enrolled students.
For more information on free software for students in the College of Engineering and Physical Sciences checkout CEPS Computer Resources.
The Engineering Science Computer Labs (ESIG) are available to students who are enrolled full-time in any College of Engineering degree program. Any room may be used during hours of operation unless a class has been scheduled.
All labs are networked. The Engineering College is part of the University of Wyoming wide area network.
Introduction:
The information technology resources of the College of Engineering and Physical Sciences support the instructional, research and administrative activities of the College of Engineering and Physical Sciencese and the University of Wyoming. These resources include, but are not limited to, information technology assets, local area networks, servers, client workstations, electronic mail, Internet access, voice mail, video conferencing and other related services. Information technology assets are computer hardware and software, networking hardware and software and peripherals (printers, personal digital assistants, laboratory measurement devices, etc.) whether used as general purpose devices or embedded in special-purpose devices such as diagnostic equipment or digital copiers. Users of the information technology resources have access to valuable University resources, to sensitive data and external networks. This policy document is a supplement to federal, state and university laws, regulations, and policies.
This policy applies to all persons and equipment utilizing the information technology resources of the College of Engineering and Physical Sciences. This includes but is not limited to, faculty, visiting faculty, staff, students, guests of the administration and authorized individuals or organizations. Equipment that uses the information technology resources of the College of Engineering and Physical Sciences and the University of Wyoming including equipment which is purchased using non University funds are subject to the same requirements as University equipment and will be held accountable for any misuse.
A system / network manager is defined as the person responsible for the upkeep and maintenance of technology resources. They will make a good faith effort to maintain resource security by applying security patches and taking other security measures. The manager will also actively monitor systems and filter network traffic as needed or required by contractual obligations.
The University has established specific procedures to be followed when abuse of computing resources has allegedly occurred. The College of Engineering and Applied Science shall comply with these procedures.
Authorization to Use Information Technology Resources:
Each department within the College of Engineering and Physical Sciences is the grantor of access to that department's information technology resources. The College of Engineering and Physical Sciences and its departments reserve the right to limit, restrict or extend computing privileges and access to their information technology resources. If the use or access to an information technology resource is not explicitly given then it is unauthorized.
Privacy:
The College of Engineering and Physical Sciences system / network managers will comply with UNIREG 3-690. Users of information technology resources should be aware that administrative access to resources assigned to a user may occur. This access may be at the request of a user to correct a problem in their assigned resources. The access may be in response to a system security, resource overload, or other event requiring administrative access. Access may also occur by law enforcement or judicial requirements.
Policies for Use:
University of Wyoming and College of Engineering and Physical Sciences computers, networks and other information technology resources may not be used in any manner prohibited by law, licenses, contracts, or university regulations.
Organizations, faculty, staff, students and other individuals are accountable for the information they publish across College of Engineering and Applied Science and University of Wyoming information technology resources. They must be aware of and abide by university and College of Engineering and Physical Sciences policies regarding confidential information, intellectual property, harassment, and the acceptable use of information technology resources.
Users are individually responsible for their use of the information technology resources to which they have been granted access. Sharing of personal accounts is prohibited.
Pranks, practical jokes, use of accounts without authorization, cracking systems or accounts, and malicious or unauthorized hacking are prohibited.
Physical damage to information technology resources is prohibited.
Email, executable binary programs, software, recordable media and data files should be treated as possibly containing computer viruses, worms or other destructive programs unless there is reliable evidence to the contrary. Scan first, ask questions later.
College resources are shared resources. Be considerate and refrain from monopolizing systems, overloading networks with excessive data or wasting computer time, disk space, printer paper, manuals or other resources.
All wireless access points used in the College of Engineering and Physical Sciences facilities will be managed by departments or Information Technology. Access points that are not managed will be removed from the network.
It is a violation federal and state laws and University policy to use College technology resources to intimidate or single out individuals or groups for degradation or harassment. Use of College resources for private financial gain or compensation is prohibited except as permitted under University of Wyoming regulations.
Remediation of Policy Violations:
Abuse of information technology resources, unauthorized access, inappropriate use, or violation of these policies is cause for dismissal and may result in disciplinary action per university regulations and prosecution under federal or state laws.
Accidental abuse, including but not limited to run-away computer processes, sudden loss of disk space on a shared device, loss of network bandwidth and accidental virus infestations may be corrected by the resource owner or department network manager. Reasonable efforts will be made to notify and educate the user who is abusing a resource if time permits before the resource or access to it is removed. Department network managers may take appropriate action to eliminate the resource abuse including but not limited to the removal of offending processes, accounts and or files. Users suspecting they may have propagated viruses or worms should notify the local administrators as soon as possible.
Intentional or repeated accidental abuse will be reported to the Information Security Office of the Division of Information Technology. The owner or departmental network manager will coordinate all remedial activities with the Information Security office. Department network managers may take appropriate action to eliminate the resource abuse including but not limited to the removal of offending processes, accounts and or files.
Policy Review:
This document is to be reviewed by the College of Engineering and Physical Sciences Technology Committee on at least an annual basis.
College of Engineering and Physical Sciences Dean's Office EERB 401
1000 E. University Ave.
Laramie, WY 82071
Phone: (307) 766-4253
Email: enginfo@uwyo.edu