Skip to main content

Cornell University

Hardware Asset Management

""

Hardware Asset Management for Cornell Ithaca supports asset lifecycle management by streamlining workflows for
  • procurement
  • deployment
  • maintenance
  • decommissioning 

It acts as a single source of data for institutional devices to inform decision-making, investments and security.

Hardware Asset Management is not accepting general requests for onboarding at this time. Onboarding is being performed for IT Service Groups by invitation. IT Service Group Directors and Desktop Services Managers are being actively engaged to form a priority list.

Overview

Hardware Asset Management for Cornell Ithaca supports asset lifecycle management by streamlining procurement, deployment, maintenance, and decommissioning workflows and acting as a single source of data for institutional devices to inform decision-making, investments and security.

Centralized processes capture information about devices when they are purchased. The system provides easy, fast, consistent data access, dashboards, and management to support better decision-making and operational efficiency. 

Hardware Asset Management changes are part of the Endpoint Asset Management Project. Tools being used seed Cornell's Hardware Asset and Lifecycle Management data of record. They include inventory information on Cornell University Ithaca's device fleet, both managed and not managed. Devices will be captured at the time of purchase with Dell, Apple, and CDW-G purchase integrations.

CIT is reaching out to IT Service Group Directors and Desktop Services Managers, who are being actively engaged to form a priority list. The documentation library is being built now and will be available soon for IT Service Groups.

Privacy

Hardware Asset Management is governed by Cornell policy as outlined in the University  Privacy Statement.
 

Comments?

To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.