News

December 2017

by Dr. Crusher Wong (OCIO)

Gamification of Learning
Imagine that you had burnt the midnight oil to prepare for teaching of a new course. You had planned a myriad of learning activities including group projects with insightful topics. The first class came but students were just passively jotting notes. You tried to encourage them by asking a few ...

by Joe Chow

Advanced Threat Protection
What is Advanced Threat Protection? Advanced threat protection (ATP) is a proactive security solution that defends against attacks by malware. One of its important goals is to prevent any malware from reaching and running in the protected devices. Usually, ATP deploys on cloud where files from the ...

by Joe Chow

In the previous two articles (Ref: September 2015 and March 2016), we have introduced Windows 10 and its deployment plan on both Student LAN and Staff LAN. Subsequently, the Computing Services Centre (CSC) deployed Windows 10 for teaching and learning in the CSC teaching studios, lecture theatres ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Network forensics is the technique in capturing, storing, and analysing network logs in incident events. It also comes in other names, such as specific packet mining, packet ...

September 2017

by Joe Lee

CityU values the diversity of its students and is committed to providing a learning environment that is conducive to the success of all its students, including those with Special Educational Needs (SEN), in their academic pursues and personal developments. In supporting the IT needs for SEN, the ...

by Michael Cheng (LIB)

Location Services Location services system has been around for quite a number of years, such as Global Positioning System (GPS) and GSM. Unfortunately, they do not work well indoors because of signal characteristics and coverage. With the proliferation of Wi-Fi, Bluetooth and the mobile devices, the ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Distributed Denial of Service attack is one of the most menacing security threats on the Internet. In order to put down these attacks, the real source of the attack should be ...

by Simpson Wong

PC Upgrade
PC Hardware Further to the PC upgrade last year, the remaining half of the CSC Teaching Studio Areas, around 500 PCs, have been upgraded to newer hardware this summer. These PCs are also configured as diskless start-ups with Citrix Provisioning Services (PVS). The computers boot up from the network ...

by Angel Lu and Crusher Wong (OCIO)

Smart Classroom
Being a young university with vitality, City University of Hong Kong has always been ambitious and courageous to explore cutting-edge technologies which may benefit teaching and learning on campus. In order to search for and promote suitable technologies in classroom, the Smart Classroom Working ...

June 2017

by Michael Gibb

scholars
CityU Scholars was launched on 30 June to promote the achievements of faculty members, facilitate reporting information to the government, enhance the efficiency of internal reporting, and eliminate duplication.

by Yeung Man

Why to Migrate With the evolution of best practices and IT Service Management (ITSM), the Computing Services Centre (CSC) has been planning for years to upgrade its IT Service Automation platform. The old Help Desk System has been used since 2001. The plan is to migrate from an on-premises ...

by Wilson Wong, S K Tsui, Alex Lam

A Distributed Denial-of-Service (DDoS) attack is a cyber-attack, which an attacker tries to overload the targeted server/system with a huge volume of traffic from multiple, distributed sources (usually zombie computers), making the server/system unavailable to its intended users. As the attacks come ...

by S K Tsui

The majority of the wireless access points (APs) installed on campus were the outdated Aruba AP-125 model (product of year 2009) which supports legacy standards 802.11a/b/g/n but cannot support the 5th generation of Wi-Fi standard 802.11ac. In order to meet the increasing demands from user devices ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Internet of Things (IoT) envisions everything in the physical world will be connected seamlessly and integrated securely through Internet infrastructure. When things react to ...

March 2017

by Tony Chan

To follow up our previous article on “A New look of Virtual Desktop Service for Students” (Ref: Network Computing Issue 89 - September 2016), several enhancements had been made on the VDS. In September 2016, 300 VDS concurrent connections were available for use by students and staff, and the virtual ...

by Wilson Wong

Security and user-friendliness tend to be in conflict with each other. From the security point of view, proper protection of sensitive information is critical. Sensitive data leakage not only damage the reputation of the University, it may also be harmful to the data custodians and related ...

by CityU Scholars Project Team

CityU Scholars
Background Research is one of the key output of a research-based institution like CityU. It is playing not only an important role in raising the ranking and branding of the institution but also as a way to attract talented students and researchers to join the big family. Showcasing our excellent ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Wireless network (Wi-Fi) is now widely established and utilized at home, offices and everywhere in public areas such as rail stations, streets, and etc. This newsletter provides ...