News

by Louisa Tang

jun2006-2g1
 AIMS (Administrative Information Management System) was first launched in 1998/99. At that time, there were functions available only to students. As time goes on, more and more AIMS functions have been developed. Up to now, there are hundreds of them with application systems varying from student, human resources, financial to alumni. Other projects include donation, student residence, event, etc.

by Raymond Poon

The Policy on the Registration and Use of University Domain Names was approved by the Management Board at the 152nd meeting held on 28 November 2005, and below was the decision made: Policy on the Registration and Use of University Domain Names

by Raymond Poon

Currently there is a limited courtesy email service scheme for long-serving staff (i.e. staff serving 10 years or more) who are leaving the University. The email addresses under this scheme assume the same format as those for alumni (i.e. EID@alumni.cityu.edu.hk, which might give rise to confusion and inconvenience). Over 150 former staff are now using this service.

by Raymond Poon

Why standardize on a common Chinese language environment There are many coding standards today that define how an alphabet or a character of a language is represented in a computer. These standards typically define uniquely the corresponding numerical value that represents each alphabet or character (including some special symbols that come or work with a language) of a language as well as the number of bytes necessary to represent all possible numerical values assumed by the entire set of characters or alphabets. The main Chinese language coding standards in the past such as BIG-5, GB, etc were designed to support only a single language while the more recent ones like Unicode support multiple languages. To complicate the matter further, even under the same Chinese coding standard, the same character can be represented by bytes of different length, either in fixed or variable length.

by Grace Ho

20060519_e-learning_1
The “2006 e-Learning Forum for Greater China” at City University of Hong Kong (CityU) gathered together 200 key participants from higher education institutions in Hong Kong, the mainland, Taiwan and Singapore to share their experience in and examine issues on e-learning relevant to the Greater China region. The two-day forum (19 to 20 May) was organized by CityU and Blackboard Inc.

by Joe Lee


 





When the Hot Line Service evolved to the Help Desk in September 1997, a commercial Help Desk software was deployed to assist the day-to-day operations of the office.

by Alex Lam

mar2006-1g
Overview Everyday, new viruses, worms and software security vulnerabilities of all types are discovered on the Internet. Network security is becoming an ongoing network monitoring and management activity. In response to these security hazards, the Computing Services Centre (CSC) is continuously making use of the most advanced technologies and security management devices to protect the campus network.

by Lily Siu

mar2006-2g
To comply with the Copyright Ordinance, the Management Board endorsed the implementation of a Software Asset Management Scheme in the University in July 2002.To implement the scheme, two application systems have been developed for use by all departments. They are the Software Inventory System and the software scanning tool, named SAMScan.

by Peter Mok

Background The sophistication of IT crime increases as technology advances. Widespread of scams are rampaged through the popular use of the Internet and email. Among all IT crimes, they are dominated by phishing and identity theft activities[1]. Phishing is a high-tech scam that uses spam email or fake web pages to deceive consumers into disclosing their credit card numbers, bank account information, identity numbers, passwords, and other sensitive personal information[2]. It is the fastest growing Internet attack and everyone is at risk as the unsolicited email and fake web sites are now encountered almost on a daily basis. Phishing attackers are getting more sophisticated in adopting social engineering skills, and reaching every corner where there is Internet users.

by Dr. J. T. Yu

The Information Services Strategic Plan 2005-2010 (ISSP) was approved by the Committee on Information Services and Technology (CIST), and then was formally endorsed by the Senate in May 2005. A retreat was held on July 20, 2005, to consider the implementation of the Plan. The retreat was attended by most of the senior staff members from the offices that are closely involved in the provision of information services, (namely, ARRO, CIO, DSL, EDO, ESU, CSC and LIB).

CityU IT ChatBotCityU IT ChatBot×

We use cookies to ensure you get the best experience on our website.

More Information