Facilities

We are proud of our facilities, and even more so following the most recent renovations of Hathaway Hall. Below are pictures and descriptions of our computer labs. Please feel free to contact us to arrange a visit to our campus and facilities.

The Division is an active participant in the  Microsoft Azure Dev Tools for Teaching program which not only makes all the current Microsoft developer tools, platforms and servers available in our labs and classrooms, but also makes them available at no additional cost for students to use at home or on their laptops 


Instructional Lab HH-300

  • Student workstations – 24
  • Basic Usage – classroom instruction, presentations

HH 300 - General-Purpose Lab

Hathaway 300 – General Purpose Lab

HH 300 - General-Purpose Lab

Hathaway 300 – General Purpose Lab


 Security Lab HH-313

  • Student workstations – 18
  • Basic Usage – cybersecurity experimentation, classroom instruction, presentations

HH 313 - Security Lab


Hathaway 313 – Security Lab

HH 313- Security Lab


Hathaway 313 – Security Lab

 


Game Development Lab HH – 320

  • Student workstations – 20
  • Basic Usage – game programming & development, classroom instruction, presentations

HH 320 - Computer Lab

Hathaway 320 – Game development Lab

HH 320 - Game Development Lab

Hathaway 320 – Game development Lab


Linux/UNIX Experimental and Graduate Assistant Research Lab HH – 322

  • Numerous Computers Available – varies according to research needs
  • Operating Systems – mix of Linux/Unix/Windows, clients and servers
  • 8-Node high performance cluster
  • Basic Usage – experimentation and research, small group discussion and instruction, presentations
HH 322 - Graduate Research Lab


Hathaway 322 – Graduate Research Lab

HH 322 - Graduate Resarch Lab


Hathaway 322 – Graduate Research Lab

 


APPLE/MAC MULTIMEDIA LAB HH – 326 

  • Student workstations – 15
  • Basic Usage – general-purpose programming, classroom instruction, presentations

NETWORKING LAB HH – 328 

  • Student workstations – 20
  • Basic Usage – networking/networking security, cyber forensics, classroom instruction, presentations


** Please note that all trademarked products are the property of their respective owners.