News

by Kevin Chan

With the mobile workforce growing continuously, it is a major concern for IT decision makers to protect sensitive data on mobile computers. Starting from Windows Vista, BitLocker Drive Encryption helps protect sensitive data from being accessed by unauthorized users. BitLocker To Go extends such ...

by Dr. Crusher Wong (OCIO), Betsy wong (OCIO)

The introduction of learning management system (LMS or VLE for virtual learning environment) at City University of Hong Kong (CityU) was led by a small group of colleagues, including myself, in the Department of Physics and Materials Science and the Computing Server Centre (CSC) in 1998 [1]. Seven ...

by S K Tsui

Similar to the eduroam service, Universities Wi-Fi is a free collaborative Wi-Fi network offered by the JUCC institutions (CityU, HKU, CUHK, PolyU, HKUST, HKBU, LU and HKIEd) since year 2009 allowing staff and students of any member institution to log on and use the WLANs while they visit the other ...

by S K Tsui

As a VIP to the CityU, alumnus can now enjoy free Wireless LAN (WLAN) service anywhere inside the campus to access the Internet. Being a registered user of the CityU-Net Basic Service , alumnus can use any IEEE802.11a/b/g/n compliant wireless device, whether it is a wifi phone, PDA or notebook ...

by Joe Lee

Enterprise 2.0 is defined as “a system of web-based technologies that provide rapid and agile collaboration, information sharing, emergence and integration capabilities in the extended enterprise.” (Please visit http://www.aiim.org/What-is-Web-2.0.aspx for details.) As technologies advance rapidly ...

by S K Tsui

Voice over WLAN (VoWLAN) is the technology integrating Voice over IP (VoIP, the technology used in the IP Phone system) and WLAN technology, enabling the Computing Services Centre (CSC) to e nhance the current phone service to include wifi phones in mobile communication support. The wifi phones ...

by Yeung Man

Business Intelligence With the advance of technology, organizational data is often already collected in computer database through the use of database management system such as Access, Oracle, SQL Server … etc. Data has to be gathered, modeled and transformed before it can be used to troubleshoot ...

by Clevin Wong

In recent years, due to the proliferation of low cost mobile devices like notebook/netbook computers and Wi-Fi phones, more and more people use these devices for communication and Internet access via the wireless networks. However, wireless networks are insecure by nature. In wireless networks, data ...

by Joe Lee

We have announced our tentative implementation plan of Windows 7 through various channels, including Network Computing (“ Windows 7 – A First Glimpse”, Network Computing Issue 61 - September 2009), notification to Departmental Network Administrators of departments (early November) and network ...

by Angela Tang, Maria Chin

An organization’s website introduces the organization to the billions of Internet users worldwide and showcases its strengths and achievements. Therefore, it would be crucial to find out who the audiences are and if the information being put up on the website is useful and interesting to them ...