News

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Distributed Denial of Service attack is one of the most menacing security threats on the Internet. In order to put down these attacks, the real source of the attack should be ...

by Simpson Wong

PC Upgrade
PC Hardware Further to the PC upgrade last year, the remaining half of the CSC Teaching Studio Areas, around 500 PCs, have been upgraded to newer hardware this summer. These PCs are also configured as diskless start-ups with Citrix Provisioning Services (PVS). The computers boot up from the network ...

by Angel Lu and Dr Crusher Wong (OCIO)

Smart Classroom
Being a young university with vitality, City University of Hong Kong has always been ambitious and courageous to explore cutting-edge technologies which may benefit teaching and learning on campus. In order to search for and promote suitable technologies in classroom, the Smart Classroom Working ...

by Michael Gibb

scholars
CityU Scholars was launched on 30 June to promote the achievements of faculty members, facilitate reporting information to the government, enhance the efficiency of internal reporting, and eliminate duplication.

by S K Tsui

The majority of the wireless access points (APs) installed on campus were the outdated Aruba AP-125 model (product of year 2009) which supports legacy standards 802.11a/b/g/n but cannot support the 5th generation of Wi-Fi standard 802.11ac. In order to meet the increasing demands from user devices ...

by Yeung Man

Why to Migrate With the evolution of best practices and IT Service Management (ITSM), the Computing Services Centre (CSC) has been planning for years to upgrade its IT Service Automation platform. The old Help Desk System has been used since 2001. The plan is to migrate from an on-premises ...

by Wilson Wong, S K Tsui, Alex Lam

A Distributed Denial-of-Service (DDoS) attack is a cyber-attack, which an attacker tries to overload the targeted server/system with a huge volume of traffic from multiple, distributed sources (usually zombie computers), making the server/system unavailable to its intended users. As the attacks come ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Internet of Things (IoT) envisions everything in the physical world will be connected seamlessly and integrated securely through Internet infrastructure. When things react to ...

by Tony Chan

As a follow-up to our previous article on “A New look of Virtual Desktop Service for Students” (Ref: Network Computing Issue 89 - September 2016), several enhancements had been made on the VDS. In September 2016, 300 VDS concurrent connections were available for use by students and staff, and the ...

by Wilson Wong

Security and user-friendliness tend to be in conflict with each other. From the security point of view, proper protection of sensitive information is critical. Sensitive data leakage not only damage the reputation of the University, it may also be harmful to the data custodians and related ...