News

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Data leakage refers to unauthorised transmission of data from within an organisation to an external destination or recipient. The transmission can be done both electronically and ...

by Eliza Lee

CityU was conferred two Gold Awards at the first Web Accessibility Recognition Scheme Awards Presentation Ceremony on 15 April in recognition of its effort to undertake social responsibilities to make websites more friendly for all users.

by C Y Kwok

In order to cope with the ever increasing demands for Internet bandwidth of HARNET (Hong Kong Academic & Research Network) member institutions, especially in anticipation of new demands due to increased number of students arising from the 3-3-4 curriculum reform, a series of upgrades were carried ...

by Tony Chan

Newly released in January this year, Microsoft Office 2013 is the latest version of the Microsoft Office productivity suite designed to make creating, editing, reading and sharing documents easier and quicker. It is a cloud-based product that is closely integrated with SkyDrive, a free cloud storage ...

by Eric Shai

The CityUWiki was first introduced in June 2008. It is a document management and collaboration platform based on Microsoft SharePoint 2010. The usage of CityUWiki grew from 10 sites initially to over 100 sites as of today. It supports various departments, committees and project teams for closed ...

by Mirror Fung

CityU’s CIO has received the Computerworld Premier 100 IT Leaders award for initiating innovative development in information technology at the University.

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Virtual machines are the containers in which guest operating systems and their applications run. In best practise, all virtual machines are isolated from one another. Virtual ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The virtual networking layer consists of the virtual network devices through which virtual machines and the Service Console interface with the rest of the network. VM Server such ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ All configuration tasks for the VM Server are performed through the Service Console, including configuring storage, controlling aspects of virtual machine behaviour, and setting ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ A virtualisation infrastructure represents an additional architectural layer which can suffer from security vulnerabilities and be the target of attacks. Generally, attacks can be ...