%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240627185826+00'00') /ModDate (D:20240627185826+00'00') /Title (Report 06-2024) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4544 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 311.714 521.469 435.020 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 312.089 520.719 434.270 re S 0.773 0.773 0.773 rg 61.016 327.464 m 550.984 327.464 l 550.984 328.214 l 61.016 328.214 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(HOW SAFE IS INFORMATION ON YOUR DEVICE?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Smartphones frequently act as the control centres where we schedule meetings, send e-mails and socialise. To satisfy )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(these needs, they require personal information.)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(Our lives are documented and storedin e-mails, social networks and the apps we install on our phones. All this )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(information syncs seamlessly with your work PC or your tablet. And after initial set up, it might not even prompt you for a )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(password again. Wonderful news if you are terrible at remembering passwords. Also, wonderful news if you are the thief )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(who steals a smartphone.)] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(What information would a clever criminal get his hands on if you lose your smartphone now? Banking information? A copy )] TJ ET BT 61.016 542.497 Td /F4 9.0 Tf [(of your ID or passport saved somewhere in your e-mail? All your holiday photos on Dropbox?)] TJ ET BT 61.016 522.508 Td /F4 9.0 Tf [(Here are a few tips to ensure he won't be able to get to it:)] TJ ET BT 78.360 502.535 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 502.519 Td /F1 9.0 Tf [(Always enable the password option on your phone to lock your screen)] TJ ET BT 393.596 502.519 Td /F4 9.0 Tf [(. Most phones have various options - )] TJ ET BT 91.016 491.530 Td /F4 9.0 Tf [(typing in a password, a pin code or even swiping a sequence of dots. This is your first line of defence.)] TJ ET BT 78.360 480.557 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 480.541 Td /F4 9.0 Tf [()] TJ ET BT 93.518 480.541 Td /F1 9.0 Tf [(Don't select "remember password")] TJ ET BT 243.233 480.541 Td /F4 9.0 Tf [( on any of your apps or your e-mail applications. Yes, it is a nuisance to type )] TJ ET BT 91.016 469.552 Td /F4 9.0 Tf [(in your password, but do you really want someone else to read your e-mails?)] TJ ET BT 78.360 458.579 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 458.563 Td /F1 9.0 Tf [(Turn off cookies and autofill. )] TJ ET BT 216.539 458.563 Td /F4 9.0 Tf [(This prevents your device from remembering your username and possibly even )] TJ ET BT 91.016 447.574 Td /F4 9.0 Tf [(your password at websites you regularly visit.)] TJ ET BT 78.360 436.601 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 436.585 Td /F4 9.0 Tf [(If you need to access sensitive information, e.g. banking, )] TJ ET BT 319.634 436.585 Td /F1 9.0 Tf [(rather go to the)] TJ ET BT 385.640 436.585 Td /F4 9.0 Tf [()] TJ ET BT 388.142 436.585 Td /F1 9.0 Tf [(website)] TJ ET BT 421.154 436.585 Td /F4 9.0 Tf [(, via a web browser, than using )] TJ ET BT 91.016 425.596 Td /F4 9.0 Tf [(an app.)] TJ ET BT 78.360 414.623 Td /F4 9.0 Tf [(5.)] TJ ET BT 91.016 414.607 Td /F1 9.0 Tf [(Set up your phone to be tracked)] TJ ET BT 228.545 414.607 Td /F4 9.0 Tf [( if you do lose it. \(Read our previous instructions on locating lost or stolen )] TJ ET BT 91.016 403.618 Td /F4 9.0 Tf [(devices )] TJ ET 0.373 0.169 0.255 rg BT 124.028 403.618 Td /F4 9.0 Tf [(here.)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 124.028 402.467 m 144.539 402.467 l S 0.153 0.153 0.153 rg BT 144.539 403.618 Td /F4 9.0 Tf [(\)A device can also be wiped remotely in some cases, which at least ensures that your information )] TJ ET BT 91.016 392.629 Td /F4 9.0 Tf [(doesn't end up being used, even though your actual device is.)] TJ ET BT 61.016 372.640 Td /F4 9.0 Tf [(Remember that you also need toremove ALL personal data \(for example e-mails, SMS's and telephone numbers\) and )] TJ ET BT 61.016 361.651 Td /F4 9.0 Tf [(anything which could connect you to the phone when you sell or dispose of it.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 341.662 Td /F2 9.0 Tf [(Posted in:Apps,E-mail,Security | | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 124.0277 402.7852 144.5387 411.9427 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2014/12/tracking-your-android-phone/) >> endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000472 00000 n 0000000554 00000 n 0000005150 00000 n 0000005262 00000 n 0000005377 00000 n 0000005497 00000 n 0000005605 00000 n 0000005733 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 5850 %%EOF Apps « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Apps

Interactive campus map shows WiFi in buildings

Thursday, April 1st, 2021

Almost a year ago Facilities Management introduced their custom-made, interactive campus map. This online application was developed in collaboration with Information Technology and Esri South Africa and is particularly handy for new students who are not yet familiar with our campus. More on the app’s functionality.

One of the useful functions that has been added over time is a layer which indicates WiFi availability in buildings. To access the WiFi layer, just follow the instructions below. 

  1. Open https://campusmap.sun.ac.za/in your browser.
  2. Select Proceed. 

 

3. Click on the layers-icon (circled in red below)

 

4. Select Campus WiFi Coverage

 

Although the campus map is live, it is continuously improved and updated as new needs arise from its users. 

For enquiries and suggestions, you are welcome to  contact Facilities Management. 

SU releases first interactive campus map

Apple update news

Wednesday, December 2nd, 2020

Should I upgrade to macOS Big Sur?

macOS 11 Big Sur is now available to the public and it comes with new features and changes. But you may be wondering, should I upgrade to macOS Big Sur on my Mac?

macOS 11 Big Sur has been widely seen as the least stable of the major new Apple software releases this year during the beta period.

Common issues have included graphical issues like problems with external display support, apps freezing, and random reboots. Stability has improved over the course of the beta period and Apple had postponed macOS Big Sur launching to November instead of September or October, but bugs and performance issues are not totally resolved yet.

So, the question remains, should I upgrade to macOS Big Sur?

  • if you have any concerns about app stability, performance issues, and other bugs, hold out at least for the next bug fix update before upgrading (but maybe even a later update depending on your stability tolerance).
  • If you have critical apps that must work, make sure to check for Big Sur compatibility before upgrading whenever you choose to (initial release not recommended if you have crucial apps)

[Source: https://9to5mac.com/2020/11/16/should-i-upgrade-to-big-sur-on-my-mac/] 

We at IT have received reports of issues with software like Parrallels®, Adobe Acrobat, Microsoft Office after upgrading to Big Sur. We recommend that user refrain from upgrading to Big Sur.


Apple’s M1 chipset could have some major compatibility issues

Since Apple made its reveal of the M1 chip during the ‘One More Thing’ event on November 10, everyone has been itching to get their hands on a new MacBook Air or MacBook Pro to see for themselves if this SoC (System on a chip) lives up to its hype. 

Whilst we certainly enjoyed the new machines ourselves, some prominent figures on Twitter are documenting various compatibility issues when using the new M1-powered machines.

Patrick Moorhead (@patrickmoorehead) is a well-known tech analyst, so his claims shouldn’t be dismissed. We’re also seeing other reports popping up over social media sites that reveal his problems are not isolated issues, to the point where a web service called ‘Is Apple Silicon Ready?’ has now been set up to track the compatibility of important Mac software and found around 40% had compatibility issues.

How to check your apps are silicon ready

You can check your existing applications and the Apple Silicon M1 compatible apps database for yourself using the above service, and follow along on the ‘Is Apple Silicon Ready?’ Twitter account for updates. You can also check the featured story on the Mac App Store that highlights what M1 compatible apps are readily available

Source: https://www.techradar.com/news/apples-m1-chipset-could-have-some-major-compatibility-issues

If your apps are not compatible with the new M1 chip you are likely to receive errors when installing. Applications are built to run on specific processors, and not every developer has done all the work necessary to make their apps run natively on Apple Silicon Macs. M1-powered Macs can run native, universal (in which the installer carries code for both Intel and Apple chips) and Intel apps.

Apple is encouraging developers to release universal apps where possible and is making it possible to run Intel apps on Apple silicon using emulation technology called Rosetta 2.

What is Rosetta 2?

Rosetta 2 is an emulator designed to bridge the transition between Intel and Apple processors. In short, it translates apps built for Intel so they will run on Apple Silicon.

Without Rosetta 2 you won’t be able to install applications with .pgk extensions. Rosetta 2 according to Apple is not currently available in South Africa.

[ARTICLE BY BRADLEY VAN DER VENTER]

Working remotely toolkit

Monday, March 23rd, 2020

Despite current circumstances we still need to ensure that staff and students are enabled to continue with their work and research. Below we suggest the necessary tools for effectively working online remotely. The ICT Partner Portal is our preferred method for reporting or requesting especially during these trying times. Please use the ICT Partner Portal to automatically receive an ICT reference that can be used for feedback.

All these tools have been thoroughly tested by the IT Division and are recommended and supported. The following tools are available:

CITRIX GATEWAY

Citrix provides users with a secure access and single sign-on to web applications or software as a services solution. The following web applications are available and accessed through https://suvpnweb.sun.ac.za:

a. Real time accessed Database (RTAD)
b. Phambili Facilities Management
c. Workspace (WRRC)
d. ARCGIS                                   

VIRTUAL PRIVATE NETWORK (VPN)

Allows access to the entire University network from any internet-connected location. VPN is only necessary if you require secure access to servers, devices, applications that are only accessible via the University network. 

VPN is needed to use:

a. SSH or remote desktop to your work computer/server, usually for access to specialist software or resources.
b. Full drive mapping (G: , H: and P: ) and scope of services as if you are in your office.

To apply for VPN, log a request on the ICT Partner Portal and select the Remote Access option right at the top. More information on VPN on our blog. 

CITRIX

The remote interface to centrally hosted application, requires the installation of the Citrix client application on the user’s personal computing device.

Citrix is needed for:

a. Teraterm (Administration applications)
b. SUN E-HR (only with relation to Ad HOC Payments)

To apply for Citrix, log a request on the ICT Partner Portal and select the Remote Access option right at the top.

SKYPE FOR BUSINESS

A unified communication platform that includes instant messaging, presence (with the status option, be able to check availability of colleagues), file transfer, video conferencing.

MICROSOFT TEAMS (MS Teams)

A versatile collaboration HUB for teamwork. Users can create teams to collaborate and work together – the MS Teams application can easily be installed from the Microsoft Store – Office 365 Training . More information on Teams on Microsoft’s website.

ONEDRIVE FOR BUSINESS

Files are available anywhere on all devices – store, protect, share them with colleagues (co-authoring).
End-users are encouraged to copy (synchronise) their files from the home directory to their OneDrive Stellenbosch University storage space.


With work switching to online platforms and the need for online meetings using Microsoft Teams, we strongly advise staff to upgrade to Office365. The following applications will work without any special access requirements from your home:

Office including Teams and Skype for business

Sharepoint

Onedrive

SUNLearn in client and development mode.

Webaccess to your mapped drives from my.sun.ac.za 

To enable any of these tools, log a request on the ICT Partner Portal.

To download software such as SAS; Mathematica; SPSS; Pastel; Matlab, etc. you can use our Software Hub. 

 

 

 

McAfee upgrade

Thursday, March 12th, 2020

As we all know, McAfee has been the product of choice with regards to Virus Protection on campus computers. New and improved products are released regularly, and we need to keep up with the change to remain protected against virus attacks.

We are currently in the process of upgrading our McAfee environment to McAfee Endpoint Security.

What is it?

McAfee Endpoint Security is a modern, integrated, extensible security solution that protects servers, computer systems, laptops, and tablets against known and unknown threats. These threats include malware, suspicious communications, unsafe websites, and downloaded files. It replaces several legacy McAfee products that were deployed as point products (VirusScan Enterprise and others) with a single-agent architecture and integrated advanced defences like machine learning analysis, containment, and endpoint detection and response (EDR).

How is it different from VirusScan Enterprise?

McAfee Endpoint Security outperforms VirusScan Enterprise, giving you a 25% higher protection rate.

How will the upgrade affect my computer?

During the upgrade process, your computer will become a little slower, but this is just temporary.

Any questions? Have a look at the FAQs.

Adobe licences update

Friday, November 29th, 2019

Users of Adobe Acrobat software may have noticed a pop-up notification stating that their licence will be expiring at the end of November.

This is an administration issue on Adobe’s side and can easily be rectified for you to continue working seamlessly. If you don’t update your licence, you will no longer be able to read or edit pdf documents with the Adobe Acrobat software.

To prevent this from happening, you can do one of the following:

  • Open the following link. You will be prompted to enter your username & password and the licenceupdate.exe file will, depending on your browser, either ask you to run/save or download automatically.
    1. If your browser prompts you to run/save, click run. You might get a notification that Windows considers the file to be unsafe, but you can click more info and click run anyway. Notices will pop up on your screen. In each instance, just click on Yes. The command window will display the new date when Acrobat will expire. Click any key to close the command window.
    2. If your browser automatically downloaded the file, browse to your download folder and double click the licenceupdate.exe file. Follow the steps described above.
  • If you can’t successfully execute the instructions above, please log a request with the subject “Update Adobe licence” on the ICT Partner Portal. Keep in mind that this option will mean a delay in response time. 

 

 

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.