News

December 2016

by Joe Chow

PVS
​ As mentioned in the previous article (item 3 in Ref: Network Computing Issue 85 - September 2015), the first phase of desktop virtualization using Citrix Provisioning Service (PVS) had been implemented in selected teaching venues (a few lecture theatres, classrooms and CSC teaching studios) for ...

by Wilson Wong

​ The CityU central web servers (www.cityu.edu.hk and www6.cityu.edu.hk) are load-balanced web farms, which provide high availability services to the communities. In case any server instance of a web farm is unavailable (due to errors or maintenance), other server instances of the same web farm can ...

by Joe Chow

​ The Policy Concept Windows policy, better known as Group Policy, is a feature of all Microsoft Windows operating systems (…Windows 7, Windows 8.1, Windows 10…) that controls the working environment and behaviour of a system. For example, a policy setting that allows or disallows remote access to ...

by Written by Dr. Crusher Wong (CIO), edited by Angel Lu (CIO)

​ Massive Open Online Course, MOOC in short, has brought about a revolutionary change to how education can be delivered to learners worldwide. By definition, MOOC is a course with purposes to serve a massive number of distant learners simultaneously via online platforms. It brings a host of ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ ​According to a study conducted by IBM in 2012, it costs an organization US$80 per defect if vulnerabilities are identified early during the development stage, but the cost ...

September 2016

by Manfred Chan

What are public, private and hybrid clouds? Public clouds are services based on the standard cloud computing technology to provide flexible and on-demand computing and network resources to the general public over the internet. A public cloud deployment model is different from a private network ...

by Tony Chan

​ The new school year has just commenced and the Computing Services Centre (CSC) would like to take this opportunity to introduce the Virtual Desktop Service (VDS) to new students and provide a brief update on the enhancements made on the VDS during the course of the year. The CSC had launched the ...

by Simpson Wong

​ Some hardware and software in the CSC Teaching Studios have been upgraded this summer: PC Hardware Half of the CSC Teaching Studios, around 500 PCs, have been upgraded to newer hardware as described in the table below. By using the Citrix Provisioning Services (PVS), these PCs have been configured ...

by S K Tsui

​ CityU is collaborating with various organisations and wireless service providers (WSP) to provide free Wi-Fi services for all CityU staff and students outside the CityU campus. Hotspot locations span over 70 countries world-wide. When you visit any one of these hotspots and provided your Wi-Fi ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ ​“Successful businesses understand the value of timely, accurate information, good communications and secrecy. Information security is as much about exploiting the opportunities ...

June 2016

by by Annie Yu

IT Course
As mentioned in the March issue, the Computing Services Centre (CSC) will make Windows 10 available on CSC-managed computers for teaching and learning starting Semester A 2016-17. In the meantime, the Central IT is testing Windows 10 compatibility with all in-house developed central applications ...

by by Henry Wong

O365 Exchange Online Protection
With all staff mailboxes migrated to Office 365 (O365), the migration of on-premises email supporting tools is underway. One significant upgrade is the migration of on-premises email anti-spam tool to the O365 Exchange Online Protection (EOP) cloud-hosted email filtering service. The migration has ...

by by Joe Chow

Remove Data before Recycling or Disposing Handheld Devices
Handheld devices such as smart phones and tablets are so popular nowadays that their daily use frequently touch on sensitive and personal data such as email messages, conversational records, contacts, calendar events and even bank transactions. Many people replace their old devices but do not know ...

by by Tony Chan

IT Service Support for Macintosh Users
In view of the increasing popularity of Macintosh (Mac) computers in the University, the Computing Services Centre (CSC) has expanded the support to our Mac users. Following is the list of supported services for Mac computers: · Campus Network (CTNET) Connectivity o Fixed Network Point It allows Mac ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ ​Relationship with ISMS Information Security Management System (ISMS) is defined in the ISO/IEC 27000 set of standards. The ISO/IEC 27001 standard sets out a certifiable and ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ ​The NIST Definition of Cloud Computing1 The cloud model is composed of 5 essential characteristics (Ondemand self-services; Broad network access; Resource pooling; Rapid ...

March 2016

by Joe Lee

Users have different preferences on using Internet browsers. Preferences may vary from place to place and change over time. We share with you the usage statistics collected in four scenarios. (1) Browser preferences of users accessing the City University Homepage The bar chart below depicts the ...

by ML Lee

In today’s office environment, we often share information like reports, presentations and minutes among colleagues. We have been taught how to connect to the departmental share drive through a network drive letter to store and access files in a traditional file folder structure. This works quite ...

by Maria Chin

Microsoft launched its latest version of operating system (OS), Windows 10, in July 2015. In the article on “Windows 10 at First Glimpse” (Ref: Network Computing Issue 85 - September 2015), some of the key new features in Windows 10 were highlighted, and the plan to release it first on centrally ...

by Dick Wong

A new upgrade of the campus network had already been started with Phase I (replace/upgrade the network switches at the core and distribution layers) being completed in 2015. The existing network design adopted a traditional 3-tier hierarchical model comprising the core, distribution and access ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The term APT was first used by U.S. Air Force back in 2006 to facilitate discussion about a set intrusion activities with specific characteristics. These days, APT is often used ...