Main navigation
News
- Academic Regulations and Records Office
- (-) Computing Services Centre
- Department of Computer Science
- Department of Electrical Engineering
- Department of Information Systems
- Department of Marketing
- Enterprise Solutions Office
- Facilities Management Office
- Finance Office
- Human Resources Office
- Internal Audit Office
- Office of the President
- Office of the Vice-President (Administration)
- Research Grants and Contracts Office
- Run Run Shaw Library
- School of Law
- Shenzhen Research Institute
- Student Development Services
- Talent and Education Development Office
by Louisa Tang

AIMS ( Administrative Information Management System) was first launched in 1998/99. At that time, there were functions available only to students. As time goes on, more and more AIMS functions have been developed. Up to now, there are hundreds of them with application systems varying from student ...
by Joe Lee

We have used Microsoft's Software Update Services (SUS) for desktop patch management since 2003. According to statistics, the number of desktop computers with missing patches has been under control, making our campus network more secure. However, SUS mainly supports Microsoft's operating systems ...
by Raymond Poon
The Policy on the Registration and Use of University Domain Names was approved by the Management Board at the 152nd meeting held on 28 November 2005, and below was the decision made: Policy on the Registration and Use of University Domain Names University domain names and sub-domain names are, like ...
by Raymond Poon
Currently there is a limited courtesy email service scheme for long-serving staff (i.e. staff serving 10 years or more) who are leaving the University. The email addresses under this scheme assume the same format as those for alumni (i.e. [email protected], which might give rise to confusion ...
by Raymond Poon
Why standardize on a common Chinese language environment There are many coding standards today that define how an alphabet or a character of a language is represented in a computer. These standards typically define uniquely the corresponding numerical value that represents each alphabet or character ...
by Alex Lam

Overview Everyday, new viruses, worms and software security vulnerabilities of all types are discovered on the Internet. Network security is becoming an ongoing network monitoring and management activity. In response to these security hazards, the Computing Services Centre (CSC) is continuously ...
by Joe Lee
When the Hot Line Service evolved to the Help Desk in September 1997, a commercial Help Desk software was deployed to assist the day-to-day operations of the office. (See Network Computing, Issue 12 - September 1997 for details.) Since then, the software has been further developed to automate the ...
by John Chan
You may be aware of the heightened alerts for computer security measures from recent press reports. Hackers are using all sorts of sophisticated means in order to illegally gain access to computer systems, to capture electronic ID and passwords, to steal electronic data, and/or launch denial of ...
by Clevin Wong
Microsoft Outlook is a versatile component of the Microsoft Office 2003 for users to manage personal information and to communicate with others. It helps you in managing your email messages, appointments, contacts, and tasks, as well as making reminders and tracking activities. In this article, we ...
by Raymond Poon
An Internet domain name (e.g., cityu.edu.hk) including all its sub-domain names under it (e.g., cs.cityu.edu.hk) resemble in many ways a trademark, a brand name, or a logo of a company. Thus, like the name of the University, domain names should be considered institutional assets whose use must be ...