News

September 2019

by Angel Lu and Dr. Crusher Wong

panopto
Lecture recording is an effective medium for learners to review and revise the concept being taught. To streamline the process of lecture recording and facilitate flipped classroom learning, the Office of Chief Information Officer (OCIO), has joined hands with the Jockey Club College of Veterinary ...

by Jacky Tsui, Roger Wong

ERIC
​What is ERIC? Executive Research Information System for CityU (ERIC) ​is the new research project management solution of the University and it was rolled out in early February 2019. It not only replaced the old system – Integrated Research Information System (IRIS), which has been serving the CityU ...

by Joe Chow

windows upgrade
According to Microsoft, no more support and security patches will be provided for computers running on Windows 7 after 14th January 2020. Without support and security patching, Windows 7 will be vulnerable to hacking activities. To mitigate the potential risks, all Windows 7 machines are required to ...

March 2019

by Joe Chow

classroom
In recent years, many Audio Visual (AV) vendors made use of IP technology on their AV products. Such technology allows administration, control, and transmission of AV and signals over computer networks. Such flexibility extended the manageability and extensibility of AV systems and made AV ...

by Manfred Chan

data centre
The Primary Data Centre at City University of Hong Kong (CityU) will be relocated to make room for several strategic initiatives and the setting up of additional web laboratories. The Primary Data Centre relocation project is divided into two phases: the first phase is scheduled to complete by the ...

by S K Tsui

wifi
The CityU WLAN upgrade project began in 2017 (Ref: Network Computing Issue 92 – June 2017​) and has been ongoing for more than two years. During this period, the outdated Aruba Wi-Fi system was replaced to support the 5th generation of Wi-Fi standard 802.11ac (Wi-Fi 5). Up until now the Computing ...

by JUCC ISTF

phishing
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or ...