News

December 2015

by by Tony Chan

End of Support for IE 10 and Lower Versions
As announced by Microsoft, only the newest version of Internet Explorer (IE) will be supported from 12 January 2016. The older versions of IE will no longer be supported meaning that there will be no more security update for these browser versions thereafter, and any computer running them will ...

by Wilson Wong

Verify a Website before Providing your Username/Password
Phishing email spreads over the Internet from time to time. You may have received suspicious email telling you that your computer account has problems/will expire/has exceeded quota/etc. and requires you to verify your identity by clicking on a URL (Uniform Resource Locator) to a web page, and then ...

by Tony Chan

In the IT world, software applications have an associated life cycle - newer versions of applications with new or enhanced features are often released after a certain period of time to replace the older versions. As Microsoft Office 2013 had been released for more than three years, Microsoft ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ There is a massive upsurge of mobile devices in the consumer market. Corporations are also demanding their employees to have instant connectivity to their working environment ...

September 2015

by Tony Chan

Windows 10 – the latest version of the Windows Operating System was launched in July 2015. It takes a huge leap forward and gives users a deep impression. It introduces plenty of new features and improves a number of existing features. Besides, the best news is the free upgrade of Windows 10 for ...

by Joe Lee

New and Relocation of Printing Facilities Two new Konica Minolta industrial grade fast printers have been installed to replace the old printers at the Run Run Shaw Creative Media Centre (CMC) to support the quota-controlled free printing service for students. A new colour printer is also made ...

by Vicker Leung (OCIO)

There's no doubt that nowadays mobile devices already become one of our essential gadgets, and we spend hours daily on these devices to consume news, socializing, gaming or work. According to a study [1] in March 2015, the digital media time people spent on mobile devices (phones and tablets) ...

by JUCC ISTF

Data Centre Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ To ensure that data centres meet the reliability and performance needs of universities, and achieve the comprehensive protection from various security threats, a number of aspects ...

by JUCC ISTF

Data Centre Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Vulnerabilities of data centres are found in their physical security, systems / devices hosted and management procedures implemented. Several common exploitation techniques are ...

June 2015

by Kevin Chan

Has Facebook, Twitter or Instagram already become an integral part of your life? You may want to share whatever you find interesting with your friends or followers, as frequent as you can. Wouldn’t it be a good idea if you can communicate with your colleagues on business issues the same way? What if ...

by Joe Lee

The Student Notebook Computer Daily Loan Scheme (DLS) has been established by the Computing Services Centre for more than ten years (previously known as the Mobile Computer Service) to give students the convenience and flexibility to make use of the wireless network (Wifi) to access the campus IT ...

by Wilson Wong

What is Information Rights Management? Information Rights Management (IRM) is a technology that protects sensitive information from unauthorized access. It allows information owners/publishers to distribute sensitive information to specific individuals. When an email or a document is protected by ...

by JUCC ISTF

Data Centre Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ While data centre management is a cost-saving approach and brings a lot benefits including increased productivity, higher reliability, improved security and compliance, however ...

by JUCC ISTF

Data Centre Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Data center management is a holistic process to oversee the operational and technical issues within a data centre or server room. It covers environmental control, physical ...

March 2015

by Crusher Wong (OCIO), Angel Lu (OCIO)

Canvas by Instructure, a cloud-based Learning Management System (LMS) originated in Utah, the USA, has been fully implemented at City University of Hong Kong (CityU) for e-learning since the start of Semester B 2014/15. The Canvas for CityU is served from Singapore with a much better network latency ...

by Yeung Man

To support work related activities of staff and academic use by students, all regular staff and students are now free to install and use the latest versions of Microsoft Office software in the Office 365 ProPlus suite via the University's Enrollment for Education Solutions with Microsoft. This ...

by Tony Chan

The Computing Services Centre (CSC) is preparing to launch the Virtual Desktop Service (VDS) program very soon, to cater for the trend of Bring Your Own Device (BYOD) and explore the feasibility of adopting personal mobile devices for teaching and learning. Around 40 virtual desktops will be ...

by JUCC ISTF

Protection against Hacking
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Hardening steps specific to each hacking category should be considered when planning the protection of the universities' systems against hacking. Hardening Steps against Scanning ...

by JUCC ISTF

Protection against Hacking
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Common Types of Attack Vulnerability scanning Hacker may initiate vulnerability scanning on target organisation's network to proactively identify the vulnerabilities of computer ...