News

December 2011

by Joe Lee

The following is a brief update of the recent changes in the Academic Building 2 (AC2): - New room numbers for AC2 will be adopted in Semester B 2011/12. These new room numbers were used when the ARRO’s class scheduling data was loaded into the CSC Teaching Studio Booking System on 6/7 Dec. The ...

by Joe Chow

What is the Microsoft Student Option (MSO) scheme? To encourage use of IT and use of genuine software, this scheme entitles CityU’s students to use one university subscribed copy of the latest version of Microsoft Office (“the software”) during the licensed period (1 October 2011 to 30 September ...

by Matthew Hung

In the last issue of Network Computing, the upgrading of www6 has been described in view of the application side (Ref: Upgrading www6: The Application Side). In this article, we shall look at the infrastructure aspects of the upgrade. In July 2011, the www6 system (front-end and back-end components) ...

September 2011

by Francis Chu

The central web hosting service has been set up for many years to provide a consolidated, fully monitored and managed environment for hosting departmental web sites and project web sites. The hardware and the software of the central web service are maintained and supported by the Computing Services ...

by S K Tsui

Introduction Since the CityU Wireless Local Area Network (WLAN) has rapidly become an essential requirement for the University community, the usability and stability of the WLAN service is therefore very important. In this regard, the Computing Services Centre (CSC) has decided to conduct ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The benefits of cloud computing are both a friend and a foe from a security point of view. The massive concentrations of resources and shared usage pattern present a more ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features ...

by Samuel Wong

Conventional Interface
Every day, a large amount of sensitive information and data are being transferred through emails or movable devices. Security threats increase as emails are uncontrollable after leaving the senders while movable devices can be lost or stolen easily. Hence, it is important to secure sensitive ...

by Tony Chan

Microsoft launched its latest web browser Internet Explorer 9 (IE9) in mid-March 2011. In comparison with IE8 and IE7, IE9 is clearly faster, cleaner and safer than its predecessors. In addition, Microsoft has derived a table to show that IE9 outperforms some rival browsers in terms of performance ...

by Joe Lee

The Computing Services Centre (CSC) announced on 25 May 2011 that the university will cease the support of Windows Vista (Win Vista, SP1 and SP2) upon the termination of support for Vista SP1 by Microsoft starting August 2011 (actually, Microsoft officially terminated the support of Win Vista SP1 on ...

June 2011

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing is a computing style in which scalable and flexible IT functionalities are delivered as a service to external customers using Internet technologies. Cloud ...

by Dick Wong

Due to a shortage of space, the university is exploring various ways to accommodate new staff and academic programmes. One way of tackling this problem is to adopt a “core-satellite” approach. The “core” represents premises in the Kowloon Tong main campus while “satellite” refers to remote offices ...

by Alex Lam

Overview Since the setup of student residence in year 2000, the number of users has grown from 800 to about 2800 this year. Furthermore, with the completion of phase 4 early next year, the number of residents will be further increased to around 3500. With the increase in the population and ...

by Wilson Wong

It is always recommended that a strong password should be used to resist guessing and brute-force attacks and lower the risk of security breach. An account with a weak password, such as a word in dictionary, can easily be broken by a hacker. He/She may then read, modify or delete all your files and ...

by Mei-ling Lee, Edward Chan

Today, we are living in a mobile world and our students are using their mobile devices to communicate electronically whenever and wherever they desire. To make use of the latest mobile technologies for their university learning and to take advantage of the high performance and reliable full campus ...

April 2011

by Raymond Poon

Introduction Social media have become new ways we communicate with one another - both as an individual and as an institution. As an individual, by using social media tools such as Facebook, Twitter, YouTube, LinkedIn, Blogger, Flickr, etc., anyone with an Internet connection now has the ability to ...

March 2011

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The following security recommendations or guidelines help secure your server: 1. Rename the Administrator Account - Renaming the Administrator Account will help to prevent a brute ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 1. Consider Using a Firewall For the network hosting the Terminal Server, it is best practice to use a firewall capable of stateful packet inspection. A firewall capable of ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Vulnerabilities in Remote Desktop Connection Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control ...

by Joe Lee

A. Printing a Single Copy of Course Work is Green According to the printing usage records in recent years, most students have printed one copy of their work only. Print Jobs 2009* 2010 * 20/1/2009 - 31/12/2009. Semester started on 12/1/2009. Printing system was upgraded on 20/1/2009 and able to ...

by Joe Chow

The Notebook Ownership Programme (NOP) has been run for many years and had always been one of the most well received programmes for students since the programme addressed their learning needs with notebooks at high discounted prices. This year’s NOP roadshows were held during 6-10 December 2010 and ...

by Annie Yu

The Staff Computer Courses offered by the Computing Services Centre (CSC) has provided leading-edge training to strengthen the IT skills of faculty and staff since 1992. A variety of courses are offered throughout the year at different technical levels (introduction and advanced) and conducted in ...

by Joe Lee

In the last Semester Break (20 Dec 2010 - 8 Jan 2011), the Computing Services Centre (CSC) replaced the five years old HP dx6120 computers with new HP 8100 Elite computers. Below shows the major configurations of the new Elite computers: Processor Intel Core i5-750 (2.66 GHz, 4 MB cache) Chipset ...

by Joe Lee

The CityU has recently subscribed the SAS Education Analytical Suite (EAS). Apart from the fundamental products bundled in the EAS foundation offer, some optional SAS products which are currently used by departments for teaching and research are also included in the contract. Under the Terms and ...

January 2011

by C Y Kwok

ctnet
Introduction The University’s data network (CTNET – City University Campus Network) has undergone several major upgrades since its creation in 1985. Each major upgrade represents the adoption of the latest state-of-the-art networking technologies and standards. The network has evolved from circuit ...

by Joe Lee

Hitting new record high sometimes is good but it is certainly not the case in student printing as more trees are destroyed and substantial energy is consumed to produce tons of paper, distribute them and print them. The following chart depicts the usage trend of quota-controlled free student ...

by Henry Wong

spam
As a protection for all University email users, the Committee on Information Services and Technology (CIST) endorsed in its meeting in August 2010 to enable email spam filtering as a default for all CityU email users, and it was implemented on staff, student and alumni email systems on 21 December ...

by C Y Kwok

optical HARNET
The Hong Kong Academic and Research Network (HARNET) is the wide-area network that links the campus networks of the eight tertiary institutions in Hong Kong and connects them to the Internet, the TEIN2 and other research and academic networks. The HARNET is managed by the Joint Universities Computer ...