College of Engineering and Physical Sciences

Computer Resources

The College of Engineering and Physical Sciences has several computer labs available to students, some are available to all Engineering students, and others are available to students based on their home department. Students in Civil and Architectural Engineering should have access to a laptop or tablet for some department coursework.

If you choose to buy a computer, then you should purchase the best computer you can afford, so it will last your entire academic career. Many computer vendors offer student discounts, so make sure to check.

Laptops or tablets are encouraged. Wireless access is available around campus using your student login credentials.

These are the minimum specifications you should follow (Autodesk Revit Users, Computer Science, and Computer Engineering students should use the larger specifications as minimum specifications). Revit and SolidWorks users should check the video card recommendations at the vendor’s web sites.


 

Recommended Laptop Tech Specs

Approximate Cost $1,000 - $1,500

 

Laptop

Cad station laptop

Computer Processor

Intel i5/i7

Intel i7/i9

Memory

8 - 16 GB

16 - 32 GB

Hard Drive

256 / 512 GB Solid State

512 GB / 1 TB Solid State

DVD+RW

Optional

Optional

Video Card

256 / 512 MB

NVIDIA / AMD Class

Monitor

User preference weight vs. size

User preference weight vs. size

Ethernet

Ethernet adaptor

Ethernet adaptor

Wireless

Yes

Yes

Sound Card with Speakers

Optional

Optional

2nd Laptop Battery

Optional

Optional

2nd A/C Adapter

Optional

Optional

Warranty 3/4yr Parts/Labor

Yes

Yes

Theft/Damage Insurance

Recommended

Recommended


 

Student Software

The University of Wyoming now provides free copies of Office 365 to enrolled students.

For more information on free software for students in the College of Engineering and Physical Sciences checkout CEPS Computer Resources.


 

CEPS Computer Labs

The Engineering Science Computer Labs (ESIG) are available to students who are enrolled full-time in any College of Engineering degree program. Any room may be used during hours of operation unless a class has been scheduled.

All labs are networked. The Engineering College is part of the University of Wyoming wide area network.


 

Technology Policy

Introduction:

The information technology resources of the College of Engineering and Physical Sciences support the instructional, research and administrative activities of the College of Engineering and Physical Sciencese and the University of Wyoming. These resources include, but are not limited to, information technology assets, local area networks, servers, client workstations, electronic mail, Internet access, voice mail, video conferencing and other related services. Information technology assets are computer hardware and software, networking hardware and software and peripherals (printers, personal digital assistants, laboratory measurement devices, etc.) whether used as general purpose devices or embedded in special-purpose devices such as diagnostic equipment or digital copiers. Users of the information technology resources have access to valuable University resources, to sensitive data and external networks. This policy document is a supplement to federal, state and university laws, regulations, and policies.

This policy applies to all persons and equipment utilizing the information technology resources of the College of Engineering and Physical Sciences. This includes but is not limited to, faculty, visiting faculty, staff, students, guests of the administration and authorized individuals or organizations. Equipment that uses the information technology resources of the College of Engineering and Physical Sciences and the University of Wyoming including equipment which is purchased using non University funds are subject to the same requirements as University equipment and will be held accountable for any misuse.

A system / network manager is defined as the person responsible for the upkeep and maintenance of technology resources. They will make a good faith effort to maintain resource security by applying security patches and taking other security measures. The manager will also actively monitor systems and filter network traffic as needed or required by contractual obligations.

The University has established specific procedures to be followed when abuse of computing resources has allegedly occurred. The College of Engineering and Applied Science shall comply with these procedures.

Authorization to Use Information Technology Resources:

Each department within the College of Engineering and Physical Sciences is the grantor of access to that department's information technology resources. The College of Engineering and Physical Sciences and its departments reserve the right to limit, restrict or extend computing privileges and access to their information technology resources. If the use or access to an information technology resource is not explicitly given then it is unauthorized.

Privacy:

The College of Engineering and Physical Sciences system / network managers will comply with UNIREG 3-690. Users of information technology resources should be aware that administrative access to resources assigned to a user may occur. This access may be at the request of a user to correct a problem in their assigned resources. The access may be in response to a system security, resource overload, or other event requiring administrative access. Access may also occur by law enforcement or judicial requirements.

Policies for Use:

University of Wyoming and College of Engineering and Physical Sciences computers, networks and other information technology resources may not be used in any manner prohibited by law, licenses, contracts, or university regulations.

Organizations, faculty, staff, students and other individuals are accountable for the information they publish across College of Engineering and Applied Science and University of Wyoming information technology resources. They must be aware of and abide by university and College of Engineering and Physical Sciences policies regarding confidential information, intellectual property, harassment, and the acceptable use of information technology resources.

Users are individually responsible for their use of the information technology resources to which they have been granted access. Sharing of personal accounts is prohibited.

Pranks, practical jokes, use of accounts without authorization, cracking systems or accounts, and malicious or unauthorized hacking are prohibited.

Physical damage to information technology resources is prohibited.

Email, executable binary programs, software, recordable media and data files should be treated as possibly containing computer viruses, worms or other destructive programs unless there is reliable evidence to the contrary. Scan first, ask questions later.

College resources are shared resources. Be considerate and refrain from monopolizing systems, overloading networks with excessive data or wasting computer time, disk space, printer paper, manuals or other resources.

All wireless access points used in the College of Engineering and Physical Sciences facilities will be managed by departments or Information Technology. Access points that are not managed will be removed from the network.

It is a violation federal and state laws and University policy to use College technology resources to intimidate or single out individuals or groups for degradation or harassment. Use of College resources for private financial gain or compensation is prohibited except as permitted under University of Wyoming regulations.

Remediation of Policy Violations:

Abuse of information technology resources, unauthorized access, inappropriate use, or violation of these policies is cause for dismissal and may result in disciplinary action per university regulations and prosecution under federal or state laws.

Accidental abuse, including but not limited to run-away computer processes, sudden loss of disk space on a shared device, loss of network bandwidth and accidental virus infestations may be corrected by the resource owner or department network manager. Reasonable efforts will be made to notify and educate the user who is abusing a resource if time permits before the resource or access to it is removed. Department network managers may take appropriate action to eliminate the resource abuse including but not limited to the removal of offending processes, accounts and or files. Users suspecting they may have propagated viruses or worms should notify the local administrators as soon as possible.

Intentional or repeated accidental abuse will be reported to the Information Security Office of the Division of Information Technology. The owner or departmental network manager will coordinate all remedial activities with the Information Security office. Department network managers may take appropriate action to eliminate the resource abuse including but not limited to the removal of offending processes, accounts and or files.

Policy Review:

This document is to be reviewed by the College of Engineering and Physical Sciences Technology Committee on at least an annual basis.


 

 
Contact Us

College of Engineering and Physical Sciences Dean's Office EERB 401

1000 E. University Ave.

Laramie, WY 82071

Phone: (307) 766-4253

Email: enginfo@uwyo.edu

Find us on Instagram (Link opens a new window)Find us on Facebook (Link opens a new window)Find us on Twitter (Link opens a new window)Find us on LinkedIn (Link opens a new window)Find us on YouTube (Link opens a new window)