Main navigation
News
- Academic Regulations and Records Office
- (-) Computing Services Centre
- Department of Computer Science
- Department of Electrical Engineering
- Department of Information Systems
- Department of Marketing
- Enterprise Solutions Office
- Facilities Management Office
- Finance Office
- Human Resources Office
- Internal Audit Office
- Office of the President
- Office of the Vice-President (Administration)
- Research Grants and Contracts Office
- Run Run Shaw Library
- School of Law
- Shenzhen Research Institute
- Student Development Services
- Talent and Education Development Office
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Cloud computing is a computing style in which scalable and flexible IT functionalities are delivered as a service to external customers using Internet technologies. Cloud ...
by Dick Wong

Due to a shortage of space, the university is exploring various ways to accommodate new staff and academic programmes. One way of tackling this problem is to adopt a “core-satellite” approach. The “core” represents premises in the Kowloon Tong main campus while “satellite” refers to remote offices ...
by Alex Lam

Overview Since the setup of student residence in year 2000, the number of users has grown from 800 to about 2800 this year. Furthermore, with the completion of phase 4 early next year, the number of residents will be further increased to around 3500. With the increase in the population and ...
by Raymond Poon
Introduction Social media have become new ways we communicate with one another - both as an individual and as an institution. As an individual, by using social media tools such as Facebook, Twitter, YouTube, LinkedIn, Blogger, Flickr, etc., anyone with an Internet connection now has the ability to ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The following security recommendations or guidelines help secure your server: 1. Rename the Administrator Account - Renaming the Administrator Account will help to prevent a brute ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 1. Consider Using a Firewall For the network hosting the Terminal Server, it is best practice to use a firewall capable of stateful packet inspection. A firewall capable of ...
by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Vulnerabilities in Remote Desktop Connection Vulnerabilities have been discovered in the Microsoft Remote Desktop Connection which could allow an attacker to take complete control ...
by Joe Lee
A. Printing a Single Copy of Course Work is Green According to the printing usage records in recent years, most students have printed one copy of their work only. Print Jobs 2009* 2010 * 20/1/2009 - 31/12/2009. Semester started on 12/1/2009. Printing system was upgraded on 20/1/2009 and able to ...
by Joe Chow
The Notebook Ownership Programme (NOP) has been run for many years and had always been one of the most well received programmes for students since the programme addressed their learning needs with notebooks at high discounted prices. This year’s NOP roadshows were held during 6-10 December 2010 and ...
by Annie Yu
The Staff Computer Courses offered by the Computing Services Centre (CSC) has provided leading-edge training to strengthen the IT skills of faculty and staff since 1992. A variety of courses are offered throughout the year at different technical levels (introduction and advanced) and conducted in ...