Contact IT for Help
To ensure that Biola stays secure and productive, IT must upgrade operating systems and periodically replace older computer hardware. Out-of-date operating systems are a major vulnerability for any organization, and older computer hardware that will not run a secure operating system must be replaced.
Both Microsoft and Apple set expiration dates for their operating systems by no longer providing them with bug fixes and security updates. Apple goes further and makes their older hardware incompatible with their newer, secure operating systems, rendering their older computers obsolete.
If your hardware is too old to run a secure operating system, it must be decommissioned or replaced. To facilitate this, IT is implementing a Computer Subscription Program for providing computers to departments. Instead of paying up to $1500 for a new Mac, you can subscribe to receive a computer from IT for about $350 to $400, billed annually. The Computer Subscription Program has the following benefits:
IT doesn’t have many viable, used computers available. In the last three years, Biola increased the life cycle of laptops to five years and the life cycle of desktops to six years. This means that when we decommission faculty and staff computers every summer, they will be near to the end of their useful life and not ideal for redeployment.
IT will reach out and let you know if you need to update your OS or replace the computer. Once you hear from us, here are some ways you can prepare for your update or replacement.
If you think you may need to new software or adapters before you upgrade, fill out the computer software and accessory needs assessment form. IT will help you select and purchase replacements as needed.
Whenever you receive a new Mac or update your Mac operating system, there is always a chance that your current software, peripherals, or adapters may not be compatible. PC computers do not usually suffer from incompatibility as regularly as Macs, but you still might need to update your older software. Old software can be challenging to install, configure, support, not function well, and create security vulnerabilities.