News
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force.
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force.While data centre management is a cost-saving approach and brings a lot benefits including increased productivity, higher reliability, improved security and compliance, however, there are risks that may make the universities vulnerable to attack. Some common factors that increase the risk exposure of data centres are
by Dr Crusher Wong (OCIO), Angel Lu (OCIO)
Canvas by Instructure, a cloud-based Learning Management System (LMS) originated in Utah, the USA, has been fully implemented at City University of Hong Kong (CityU) for e-learning since the start of Semester B 2014/15. The Canvas for CityU is served from Singapore with a much better network latency than serving from the USA or Australia, and users are generally pleased with the system response time. Currently in CityU, Canvas is supporting 1,514 course sites, 1,389 teaching staff and over 24,000 students. It is hoped that with the following tips, users will enjoy and benefit from the intuitive interface of Canvas, as well as have a smoother learning curve for this advance application.
by Yeung Man
To support work related activities of staff and academic use by students, all regular staff and students are now free to install and use the latest versions of Microsoft Office software in the Office 365 ProPlus suite via the University's Enrollment for Education Solutions with Microsoft. This allows each regular staff/student free installation of Microsoft Office software on up to a maximum of 5 PCs or Macs owned and used by staff and students for their work or study at the University. They can also run Office Mobile for Android or Office Mobile for iPhone on up to 5 mobile devices.
by Tony Chan
The Computing Services Centre (CSC) is preparing to launch the Virtual Desktop Service (VDS) program very soon, to cater for the trend of Bring Your Own Device (BYOD) and explore the feasibility of adopting personal mobile devices for teaching and learning. Around 40 virtual desktops will be provided in the first phase. Users can connect to the virtual desktops using their mobile devices such as tablets and notebook computers via the campus wireless LAN.
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force.
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force.Hardening steps specific to each hacking category should be considered when planning the protection of the universities' systems against hacking.
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force.There are a number of risks universities should pay attention to when considering or implementing different hacking protection methodologies.
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force.
Introduction to Hacking In order to protect the universities' information systems against malicious attacks, IT professionals should obtain a basic understanding of the common hacking methodology and learn to think from the perspective of a black-hat hacker.Hacking Methodology
The hacking process can be summarised into the following five phases.
Introduction to Hacking In order to protect the universities' information systems against malicious attacks, IT professionals should obtain a basic understanding of the common hacking methodology and learn to think from the perspective of a black-hat hacker.Hacking Methodology
The hacking process can be summarised into the following five phases.
by Annie Yu
With technology moving along at a rate so fast that it is easy to fall behind if one does not stay up to date with one’s IT skill set. The Computing Services Centre (CSC) saw the training needs and had been running Staff Computer Courses and Student Computer Literacy courses for many years. Course statistics over the years had shown that although the enrolment is not particularly high, computer courses are still popular among staff. Student literacy courses, on the other hand, had shown a decline in both the number of applicants and student show-up rates in the past three years despite more training classes were offered.
CityU IT ChatBot