News

December 2012

by Manfred Chan

To exploit the cloud computing technologies, CityU has decided to adopt the Microsoft Office 365 (Office 365 hereafter) for Education. Office 365 is the cloud computing solution offered by the Microsoft for academic institutions. As an initial step, the Computing Services Centre (CSC) will replace ...

by Helium Hung

The CityU Search was powered by the public Google Search (a service hosted by Google) since 2005. After Google announced the availability of their enterprise solution for Asia-Pacific region in late 2009, the Google Search was replaced by the Google Search Appliance (a CityU locally hosted service) ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ In view of a numerous benefits of virtualisation, virtualisation technology has recently gained popularity in the marketplace. According to Gartner, percentage of workloads ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Virtualisation is the separation of resource or request for a service from the underlying physical delivery of the service. It can dramatically improve the efficiency and ...

by Joe Lee

In response to the University's emphasis on Discovery & Innovation and the subsequent implementation of Discovery-enriched Curriculum (DEC) in academic year 2012-13, the Chief Information Officer together with the Department of Computer Science (CS) proposed to set up a few DEC Labs for academic ...

by Tony Chan

Taking a huge leap forward, Microsoft launched the latest version of the Windows Operation System – Windows 8. The new operating system radically changes the way Windows works by introducing a new shell and user interface designed to be used with touchscreens yet maintaining certain compatibility ...

September 2012

by Helium Hung

Introduction The central web hosting service is set up to provide a consolidated, fully monitored and managed environment for hosting departmental and project websites for all departments and offices. The hardware and software offered by the central web service are maintained and supported by the ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Code injection attacks pose massive threats to the IT environment within universities. They could allow hackers to compromise universities' network, access and destroy their data ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Code injection attacks typically occur when inputs has not been adequately validated before execution. The basic principle is to provide some form of input with additional ...

by Joe Lee

Microsoft officially launched its latest web browser Internet Explorer 9 (IE9) in mid-March 2011. In comparison with IE8 and IE7, IE9 is clearly faster and safer than its predecessors. Furthermore, Microsoft claims that IE9 even outperforms some rival browsers. In order to allow offices, support ...

by Wilson Wong

Numerous websites and applications have been deployed on the Central IIS production Web Server, namely the www6.cityu.edu.hk. Without proper User Acceptance Testing (UAT), site owners cannot guarantee the new sites are delivering the expected quality or the new applications may even cause ...

by Joe Lee

After several months of preparation and hard work, the Computing Services Centre (CSC) Service Counter and Teaching Studio Areas have been successfully moved from Academic 1 (AC1) to Academic 2 (AC2) before the commencement of Semester A, 2012-13. In fact, the new Service Counter located on 4/F (AC2 ...

June 2012

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Websites and web applications are often used by universities for public access and provide required services to their end-users, including staff and students, round-the-clock (e.g ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Code Injection is a type of exploitation caused by processing invalid data input. The concept of injection attacks is to introduce (or "inject") malicious code into a program so ...

by Francis Chu

Background – CityU’s Unified e-Learning Management System and e-Portal Since 2005, the University has adopted the Blackboard Academic Suite (Bb) as the unified e-learning management system as well as a platform for the University e-Portal. It is widely used by all CityU members for teaching ...

by Joseph Leung

According to our past experience, more than 50% of incoming emails are possibly spam in nature. These emails not only waste our system resources, but also cause delay of normal email delivery. Users would be annoyed, and even worse, they have to take security risk when opening the message or the ...

by Joe Lee

​ The CSC Student Terminal Area (STA) has been located on Level 2, AC1 (previously named Academic Building) since 1990 when the University moved from the Mongkok campus to the current permanent campus in Kowloon Tong. The STA had undergone a few changes over the years before it arrives at its final ...

March 2012

by Joe Chow

Introduction Virtualization in computing, according to Wikipedia, “is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources”. The same virtualization concept can also be extended to include ...

by Eric Shai

Screen shot 2 of CityVoD
The new CityVoD (ref: http://www6.cityu.edu.hk/cityvod/) was launched in November last year. Its interface not only changed to allow users to use mobile devices such as iPhone, iPad, Android and Windows Phone 7 to navigate and watch videos but the underlying technology of the service also enhanced ...

by Joseph Leung

The Sun Java System Messaging Server (JSMS) has been used as the staff email server for many years. It can no longer satisfy today’s communication needs for advanced features such as calendar and appointment scheduling, cooperate phone book, task and reminders, anywhere anytime access via web ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ SaaS provides the most integrated functionality built directly into the offering, with the least customised extensibility, and a relatively high level of integrated security ...

by Joe Lee

Acquisition of new printers i. Quota-controlled free printing service Although the existing printers for supporting the quota-controlled free printing service have only been used for about 3 years, they break down quite frequently due to abnormal wear-and-tear resulting from year after year ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The innovation of cloud computing has changed the way IT operations are deployed in various organisations around the world, including universities. Its benefits in cost saving ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ PaaS is intended to enable developers to build their own applications on top of the platform supported by cloud service providers. As a result, it tends to be more extensible than ...