News

December 2011

by Joe Lee

The following is a brief update of the recent changes in the Academic Building 2 (AC2): - New room numbers for AC2 will be adopted in Semester B 2011/12. These new room numbers were used when the ARRO’s class scheduling data was loaded into the CSC Teaching Studio Booking System on 6/7 Dec. The ...

by Joe Chow

What is the Microsoft Student Option (MSO) scheme? To encourage use of IT and use of genuine software, this scheme entitles CityU’s students to use one university subscribed copy of the latest version of Microsoft Office (“the software”) during the licensed period (1 October 2011 to 30 September ...

by Matthew Hung

In the last issue of Network Computing, the upgrading of www6 has been described in view of the application side ( Ref: Upgrading www6: The Application Side). In this article, we shall look at the infrastructure aspects of the upgrade. In July 2011, the www6 system (front-end and back-end components ...

September 2011

by Francis Chu

The central web hosting service has been set up for many years to provide a consolidated, fully monitored and managed environment for hosting departmental web sites and project web sites. The hardware and the software of the central web service are maintained and supported by the Computing Services ...

by S K Tsui

Introduction Since the CityU Wireless Local Area Network ( WLAN) has rapidly become an essential requirement for the University community, the usability and stability of the WLAN service is therefore very important. In this regard, the Computing Services Centre (CSC) has decided to conduct ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The benefits of cloud computing are both a friend and a foe from a security point of view. The massive concentrations of resources and shared usage pattern present a more ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ IaaS includes the entire computing infrastructure resources stack from the facilities to the hardware platforms that reside in them. It provides limited application-like features ...

by Samuel Wong

Conventional Interface
Every day, a large amount of sensitive information and data are being transferred through emails or movable devices. S ecurity threats increase as emails are uncontrollable after leaving the senders while movable devices can be lost or stolen easily. Hence, i t is important to secure sensitive ...

by Tony Chan

Microsoft launched its latest web browser Internet Explorer 9 (IE9) in mid-March 2011. In comparison with IE8 and IE7, IE9 is clearly faster, cleaner and safer than its predecessors. In addition, Microsoft has derived a table to show that IE9 outperforms some rival browsers in terms of performance ...