helpdesk

How request new hardware or software

This guide will explain the options available to you in terms of hardware and software as well we how you can request a new piece of hardware or a piece of software be installed.


Steven Barkey

Steven Barkey

07 December 2020

To support the diverse hardware and software requirements, the Computing Resources Unit (CRU) has carefully selected various pieces of hardware and software that can be effectively, and securely, supported for use within the supported departments. This guide will outline the hardware and software options available to use as a user supported by CAES CRU.


Hardware

The CAES Computing Resources Unit (CRU) supports both Windows and macOS laptops for use within the suppoted departments, as well as various peripherals to provide an effective computing experience.

How to request the purchase of hardware:

  1. Review the related articles below and select a piece of hardware that you would like to purchase
  2. If necessary, determine what departmental fund will be used to pay for the hardware
  3. Submit your request via CAES Help for the desired hardware
    • All hardware must meet the minimum hardware requirements as identified by CRU.
    • Although you may have existing hardware (eg. Docks, Monitors, etc.), not all existing hardware will be compatible with the new hardware being ordered and may need to be replaced at the same time. As such, upon submitting your request, CRU may inquire about your other existing hardware to determine if it is compatible with the new hardware being ordered.



Software

The CAES Computing Resources Unit (CRU) supports various pieces of Windows and macOS software for use within the suppoted departments.

How to request software:

  1. Review the Approved Software List and select a piece of software that you would like to have installed
  2. If necessary, determine what departmental fund will be used to pay for the software (if licensing is required)
  3. Submit your request via CAES Help for the desired software
    • Due to the implementation of IS-3, many software applications must go through the Vendor Risk Assesment (VRA) process, which requires the Information Security Office to review the software and it's vendor (eg. Adobe, Microsoft, etc.) before the software can be used on University owned machines. While many of the software applications on the Approved Software List have already gone through the VRA process, if a VRA is required, it may result in delays between the time you request the software and when it can be installed.