%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 12 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250721165803+00'00') /ModDate (D:20250721165803+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Length 3409 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 313.214 521.469 433.520 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 313.589 520.719 432.770 re S 0.773 0.773 0.773 rg 61.016 328.964 m 550.984 328.964 l 550.984 329.714 l 61.016 329.714 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(WIFI DURING LOAD-SHEDDING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(It seems we are never really done with loads-shedding and even )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(though we try our utmost to prepare for the imminent )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(interruptions, there is only so much we can do.)] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(We realise that a stable internet connection in classrooms is vital )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(for lecturers to stream academic content to students. In most )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(university buildings we have generators in place to provide a )] TJ ET BT 61.016 562.486 Td /F4 9.0 Tf [(backup for load-shedding. However, unfortunately we cannot )] TJ ET BT 61.016 551.497 Td /F4 9.0 Tf [(guarantee uninterrupted supply of power. The reasons are as )] TJ ET BT 61.016 540.508 Td /F4 9.0 Tf [(follows:)] TJ ET BT 61.016 520.519 Td /F4 9.0 Tf [(When load-shedding starts all network equipment loses power )] TJ ET BT 61.016 509.530 Td /F4 9.0 Tf [(and the generator automatically kicks in. The network equipment )] TJ ET BT 61.016 498.541 Td /F4 9.0 Tf [(will do a so-called "cold-boot" which can take several minutes. )] TJ ET BT 61.016 487.552 Td /F4 9.0 Tf [(Subsequently it can take 10 minutes to 30 minutes \(in some )] TJ ET BT 61.016 476.563 Td /F4 9.0 Tf [(extreme cases\) for the network to function optimally again.)] TJ ET BT 61.016 456.574 Td /F4 9.0 Tf [(Adding to this delay it could happen that network equipment will not recover automatically when the generator is activated. )] TJ ET BT 61.016 445.585 Td /F4 9.0 Tf [(In these instances the network and WiFi will remain down for the whole duration of the load-shedding slot.)] TJ ET BT 61.016 425.596 Td /F4 9.0 Tf [(Stabilising equipment and connections during load-shedding isn't practically possible since the effort must be repeated )] TJ ET BT 61.016 414.607 Td /F4 9.0 Tf [(once Eskom switches the power back on. However, we do have a monitoring system which checks for the equipment that )] TJ ET BT 61.016 403.618 Td /F4 9.0 Tf [(does not recover by itself.)] TJ ET BT 61.016 383.629 Td /F4 9.0 Tf [(In most cases WiFi and the rest of the network should be operational with the help of generator power after about 10 )] TJ ET BT 61.016 372.640 Td /F4 9.0 Tf [(minutes. To ensure that the transition is seamless and network connectivity continues, it would be helpful if staff in the )] TJ ET BT 61.016 361.651 Td /F4 9.0 Tf [(building could, after about 15 minutes after the generator started, check if the WiFi is active or not.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 343.162 Td /F2 9.0 Tf [(Posted in:Connectivity,News,Notices | | With 0 comments)] TJ ET q 225.000 0 0 150.000 325.984 496.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 200 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 9336>> stream JFIF``;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?? (Q@((Q((((J((((EQE0 (i)M'Bi)OZJ))hǵKKEQEQEQEQE~4Q@PEPZC@ E-RPE-R@ 4RJ`QE h昄4CEJ( hC ( ( ( ( J_Əƀ (hh)hhh(4%%Q@Q@Q@Q@4(@@ GE!4%QLD߅QHaEPE%-QEQI@ QEQQE~RPi)i(((( %PEPA ( CKM(HQM,4H R(h 3IA @ J@z0?-QEQEQEQFAEQEQE(J %PFi  sYw^*v\n |Ku/;?uFy>+֋kbQպ.^ǩw[^GoH#r2{Ua>!I]3.FT:o#JE0㣷G'm/ yΘΈ~gU'K=-&(Mk4VfY0(,qQ^oܧ-HG>$v=u]XeXK_)Oη?KZ*V__Piz[_>n#YP2*h#+ %&MؤP 7-RFi3Ef4B ; 20aP#jO0tVL2ublyn<Ұ 0N|7v;r[BU8QhI FXA]Z3\|X|M&vx[^j 42bWV5;H4&` NbdfS6GMS8JޠeGKȖbIgo%%ڹ)_I"}Ghܨc;׬.[pۈ͟ro&GDi$"ӈx$";c*~|,GA mT4-}b0}sZ^ :oĝ O"kyƻ)ւSJR*3S0Vȣ,|sy=˘TSv37Ege~*\wKUrZ=2}'ڽW5>m;SKI׍9v#\IDts*%vC^KwOȉ-w8:H$dF? 5_| Kԡ]MG{c K?wx7.qm.9pۄGr1NWujzݣ\|^[G2|;׷ ʲ𶉧wzݦmx'E8?{g8E!@;< ГFQ^uB ? -']j#bpOi>7(p+;}E-*#^Iy^-դTM5c+rV("xF!UcP3X62ҮṍE@=kHp‹u I2ښʐ|ޒ3} qWtLr*p5MzH:ځN4ȑ0F:F#\XA9;W'j- .Q#]Du-nU%B@QҰJnh|3<k4Uʮ[h~#hN bb^Xxz[_]Ec;22#$g5?4+MHHc]P˟zkft]e7{+Y~ bĞdw0Y"0|9PXѮ vDaԴW1[rwCs?+?`5 s^R"kbGZM֭^%&c*moj0VrϵJ(/ u8D=>6TyW+A.u i!HI$ l5N|ՔY.-GVW7:u^"ƣ Sm.{5r1<@>*O$iį̹=GN ac.s2E {IJnʓT|I}oJ\Fyl,C6޷]wc_G޵miPo^[&B';xwW@,0}oa}zBMjI+_Lեy'UA+$KZi{֝ȭr=ky筭=k.t#|yt.:}3^uKFu;eR<}bϖڞ %?I:{h"KH6h^^m1 kľ-7{=@ʳy'6zvĺewnfEې!5k=:u=hq_?*Og}Dn_jr~kګ)ݪߟo=ƞ5}Q.Yi9Ͼkf x,D~!: ƽZ7^y%rӣl̒#_١b<1ֻ/ᮟ +_T9}h}6g30º?+j7N ҷU1<ǞOjgF #GJǥ{%Z-$j -vx6 8bUHFB˙jV[8ϥj%Zh6|\ܐ+bNԥ뼿5QiNҒ [/H-`_j,yhA#$槺4;&baUBѶ[rjxzQRQMEў\ w;<{4nfʹ$Aɑ3mҦ6#ܼ2xңiRԤ[ŝ קi:j؎jF;'2H+ѵE&w T{H:0seaT0ȹb4P<@c\%͌Ҥr82BLz5~5D)GrK:c\qqzί;6ug^F+5rEnp5 KN@"a)'qf]H/n^(|eȍOjք{Iݣbϧ\F4+3F,3bI'dFNdBw?4=z[tBXv-o~Xk>KTFjJ PfAuZVXKrU,qԜ\ek.8oqI$PzWNg4'rOB흞k5 5ctaFH $B==< ڌrIC?w})8sjSk(@2QwhrmڈX;Nxy潝+ݖ6{yIe&&"6zЛH!+KXDx&x^FTXp+:q3ҙĻVqNNntV_Zgbb$6U#iwf)e;e`J>=qTR4us9)nB*$Oc9I^)ʅIFWtèƬ'5.I񗆌k۝ hY>t`.pxgOv$Vu`'J2qgULG]Q+'ڸ? LtG&waWD&akYClRL|qMR= r+cMkI,d)c1Yu%v(=V/; @x(,#Ӽ6 d U^ z6rEr.Ѽ@t"E滁Z8qv:\^\³lc h4Fܻ08&"3hgwq6HzU(.bB3Ek0qDWW[.ye֮#G,j5;=˖i)r2*#`Mo-vQPcteXYı8=zfjH4:dj*%'aMb# «?Y/ |Xس>2X`N2risxef́Hz fQKs;\H yzӰ6 Oj[j29HsSXHhRtOXkUtwW,, CeWKCȧ pҹ!UB9r#0ZE M^1'cZҀʹIY-x'v;O ڿt}5n[}PnJp?:GWڰg+0}⷇ V[)!se64.Tc;`|D/R;_exymb2YLq]-^6*Gwv61#W_i?a5,;\,QTuS[\_h帄qy+]\4 n|e)ڤWZZ@JU9wsYv}vkwLzV]ϊnČD~T_:# KiQa? ƘIa=;UYWI% rnfZB )#>$-B"HHfZ᳴ԛVqmTvA/nc|h `75qunoB@E5)5vU51R밨?[: IF1>0P@<}ꎬLr` W,ܾn¬fѤc'S ܢѴޫRO `ZF圐įP7ǭg@.eU8^Itݼ)lg$?2FX6=I%E*74dzr] ې7Ph$bgr5%ẉU1ED,}ӟ0AU[W(;pJ31䧽.M,KD\Iq&Yq֧hr@Pګ9TksQހ dG=*ݻ[:(JeёxEUO3)Z(RZ n| TURl 9ɢ,Ar wg`YGEA$Gy #5"O+֊(iqwKqtU8-f܁(#ϱ'@$qu*G9si9?Ub-'We #n=hEJ6f  PUIҊ*0JE[YK{J$$R (QWRH̒[S$7N:b.>ERZD؏Q4מsPuwrd9 sv(OwinePr*ţ;v5e(>ЖRO1UL*ЬU )Ei-$gF%!%iDEdrcRJ\FFUF>cC#?)9zp0IEM3 endstream endobj xref 0 13 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000570 00000 n 0000004031 00000 n 0000004143 00000 n 0000004258 00000 n 0000004378 00000 n 0000004486 00000 n trailer << /Size 13 /Root 1 0 R /Info 5 0 R >> startxref 13990 %%EOF Connectivity « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Connectivity

Temporary backlog with network infrastructure projects

Thursday, January 29th, 2015

Due to a current lack of manpower in the network infrastructure team, IT doesn’t have the capacity to deal with network infrastructure projects, as well as general KKW requests, in particular networkpoints.

The present focus has to be on Facilities management projects, rather than individual KKWs as these project has the largest financial impact on performance within Stellenbosch University. In case of urgent KKWs the network team will try their best to be accommodating or investigate temporary solution, such as a WiFi connection.

Rest assured that we are trying our utmost to rectify the situation. In the meantime, we appreciate you understanding and patience.

More information regarding network infrastructure services provided by IT, can be found in the IT Service Catalogue.

 

 

Microsoft Lync improves communication on campus

Friday, December 5th, 2014

The world revolves around communication. Over the past few years our means of communication has expanded rapidly thanks to technological advances.lync

If these technologies are used cleverly they can improve communication and save you and your department money. One example of this is Microsoft Lync.

With Microsoft Lync you can chat away to your heart’s content with fellow SU colleagues – whether it’s through instant messaging, voice calls or a video conference. And because the programme uses the university’s existing network, this will won’t cost your department an arm and a leg (as long as your calls are to internal staff). In addition to this, Lync connects to your Outlook information, your Office documents and other Microsoft applications ensuring you’re up to date at all times.

Lync’s main focus is the corporate environment and this shows in it’s functionality. Functions and advantages include the following:

  • instant messaging
  • voice over ip (voice calls)
  • videoconferences
  • visibility of Outlook contacts
  • availability of global addresslist Outlook contacts
  • know when colleagues are available to chat
  • users can work on the same document simultaneously, whether it includes text or graphics and can see when someone else is working on a document
  • better tools for collaboration between staff, for example, desktop sharing, sharing documents, whiteboard, etc.
  • more secure communication since it takes places on the SU network
  • available for Windows Phone, Android en Mac’s
  • working from home more accessible
  • removes travel time between meetings
  • possibility for staff to link a phone number to a roaming laptop (at a registration fee and normal phone costs)
  • communication with other organisations using Lync

To start using Lync, contact the IT Service Centre at x4367 or help@sun.ac.za. For more information on Microsoft Lync, go to http://lync.stb.sun.ac.za

A programme will be installed on your PC and if you want to use of the VOIP function, a Lync headset is recommended.

The cost to use Lync on campus is as follows:

Lync Softclient: R150-00 per month
Users are responsible for their own headset at a cost of approximately R290-00

Lync with Polycom 600: R 200-00 per month
Users are responsible for their own headset at a cost of approximately R290-00

 

Tracking your lost Android

Friday, December 5th, 2014
In a previous article we explained how you can track your Windows phone. This time around we look at Android tracking services

A. GOOGLE SERVICES

Requirements:

  • Your device is connected with your Google account.
  • Your device has access to the internet.
  • Allow Android Device Manager (ADM) to locate your device (turned on by default). This can changed in the Google Settings app.
  • Allow ADM to lock your device and erase its data (turned off by default).

Android Device Manager is a Google’s official and easy-to-use tool to track your Android phone or tablet. The best thing about it is that you don’t need to install an application to be able to track your devices. The only requirement is that your device is connected to your Google account, turned on and connected to the internet.

Besides tracking, letting your phone ring and wiping your phone (which has to be enabled manually), Android Device Manager doesn’t offer more options to remote control your phone. Hopefully, Google will work on that and offer more features, such as taking pictures in case it got stolen and you want to know who took it.

In case there’s no laptop around when you lose your device, you can also use someone else’s Android phone to track it. Instead of using the mobile browser, you can also use the Android Device Manager app. You can sign in using the guest mode and your Google account credentials. Now you should be able to track your lost device, let it ring or wipe its data.

  1. Activate the service on your phone
  2. Make sure Google Maps location services is enabled (www.google.com/android/devicemanager)

More information can be found here.

B. SAMSUNG TRACKING SERVICES 

8
C. AVAST MOBILE SECURITY

[Free]

The anti-theft feature for this antivirus is actually a hidden component which can be remotely controlled via SMS commands sent from another phone or through the Web. You can log into Web controls to perform mobile tracking and/or give your phone commands.

10

D. AVG ANTIVIRUS

[Free]

Besides protecting your devices from virus attacks, it also can locate your lost or stolen phone via Google Maps and lock your device to protect your privacy via a text message. If your phone or tablet is stolen or missing, you can also set a lock screen message to help the locator find you and make your device ring even when it’s on silent mode.

12

E. NORTON MOBILE SECURITY LITE

[Free; Pro $29.99]

This software can give you total protection for all your devices. Lost devices can be located on a map, and the Pro version gives you a scream alarm to help you find your missing device. A nifty trick it has is that the phone is automatically locked once the SIM card is removed. It also backs up your data which can be easily restored.

14

F. KASPERSKY MOBILE SECURITY

[$4.95]

This one has plenty of anti-theft protection, with remote block, remote wipe and device-tracking capabilities via GPS, Wi-Fi and Google Maps even if your SIM card has been replaced. Unwanted or unknown calls and text messages can also be blocked, and it lets you hide certain information from friends and family who borrow your phone for use.

16

G. MCAFEE ANTIVIRUS 7 SECURITY

[Free to download; $30 a year to keep]

Here’s the award-winning software that will keep your smartphone safe from the inside out. It comes as a 7-day free trial but to keep it on your phone, it’s a $30/year subscription. For that sum, you get the regular anti-theft protection, antivirus protection, plus data backup and restore functions.

18

 

H. LOOKOUT SECURITY 7 ANTIVIRUS

[Free; Premium: $2.99/month]

You can find your lost phone on Google Maps, sound a loud alarm (even from silent mode) and lock your phone remotely with this app. In the event that your phone has run out of battery, it will notify you of its last known location. Also has an automated backup and restore function which can be accessed from the website.

20

I. ANDROID LOST FREE

[Free]

This app is not only perfect for finding your lost phone, it will also torment the thief (something which we’re sure they fully deserve). You can activate (via SMS or the Web) the alarm to ring with a flashing screen, enable and disable the GPS, data and Wi-Fi connection, remote wipe the SD card, and get their latest call list.

22

 [Information supplied by M.Ridoh Rylands, IT HUB]

 

Become a Google search pro

Friday, December 5th, 2014

google-doodleGoogle does more than 2 million searches per second. Impressive, isn’t it? And Google’s head office do not use regular lawn mowers to keep their lawns neat and tidy. Oh no, they hire goats to do it!  (more interesting Google facts)

The word Google has become synonymous with the idea of internet searches in spite of the fact that Google is merely one of various existing search engines. That it’s by far the largest and possibly the most effective, might be a good enough reason for its preference.

But do you use Google as well and efficient as you could? Research done in 2011 at Wesleyan University in Illinois suggests that less than 25% of students can conduct a thorough search for information. Let’s hope this improved over the past three years.

Dharmesh Shah from HubSpot has a few hints:

1. Quotation marks

Instead of just typing the two words you need information on into the search box, rather put the phrase in quotation marks to narrow down Google’s search.

2. Exclude certain words

If you’re looking for info on marketing, but not on advertisements, use “-” in front of the word you want to exclude. For example “marketing -advertisements”.

3. Searches on a specific website

If you happen to know which website might contain your information, include this in your search. For example “marketing” site:www.bizcommunity.com

4. Similar words and synonyms

When you want to include a specific word in your search, but also words with a similar meaning, put “~” in front of the word.

5. Specific document types

If you already know the document you’re looking for is a pdf, you can use filetype. For example: “marketing” filetype:pdf

6. Use OR

When you carry out a search, Google includes all the words you supply. When you only want one of the two terms, use OR. Just remember to put it in caps. For example: marketing OR advertisements.

8. Phone numbers

You receive a phone call, but you have no idea who it’s from. Use Google’s phone book function. For example:  phonebook: 021-123456

9. Area code

If you have no idea for which area an area code is, add the 3 number code to the search box and you’ll immediately get the answer.

10. Numerical ranges

Do you need results falling in a certain time range? Use “..”. For example president 1940..1950.

10. Stock info 

Just add a valid ticker symbol in the search and Google will supply you with current financials and a stock chart.

11. Calculator

Next time you need to do a complicated calculation, forget about the calculator app on your PC. Just type your sum in Google. For example 48512 * 1.02

12. Word definitions

Do you quickly need a word’s definition? Just type define in front of it in Google. For example:  define:plethora

We hope these few hints help you to get answers even faster, but if you need more assistance, HackCollege compiled this handy infographic. More information can also be found on Google‘s support page.

Google-infograhic

 

 

Infographic via HackCollege

Now you’re talking

Friday, December 5th, 2014

Over the past six years Stellenbosch University had to reconsider alternatives for the existing phone system due to the unrealistically high cost of existing lines.

The main objectives were a significant and sustainable decrease in phone costs and improving the manageability of phone costs and usage. At the same time the university had to invest in technology compatible with the existing infrastructure and with a longer lifespan.

Since 2008 a new system has implemented where one network hosts all communication – data and speech. This new technological platform required more sophisticated and therefore also more expensive instruments. However, IT purchased the devices and users are only required to pay a monthly rental fee per instrument, along with actual call costs. Costs recovered will be used entirely to supply, maintain and upgrade the technology and keep it up to date with developments in the technological market.

We can now also announced that, from 1 February 2015, the overall costs of phone services will be decreased. The new tariffs are as follows:

Phone installation or moving a phone:*: R350
* Where infrastructure is available. In cases where the infrastructure in inadequate, a quotation will be provided.

New applications per month:

Siemens 40: R 260 (new installations)
R224 (existing installations)

Siemens 40 + 1 key module: R 310 (existing installations remain R224)

Siemens 40 + 2 key modules: R 360 (existing installations remain R224)

Siemens 15 and 20: R 150

All existing analogue lines from the internal PABX, for example fax machines and alarms: R1200 per month.

Rightfax: R150-00 per month for the service.

A new, additional service staff can make use of, is Lync. In order to use Lync as a telephone endpoint you will require one of the following:

  • a Lync compatible telephone
  • the Lync desktop client installed on your pc along with a Lync-certified headset
  • the Lync mobile app on your smartphone

Just keep in mind that the Lync Desktop Client is not a like-for-like replacement for a desktop telephone. There are trade-offs when opting for the Lync client as a telephone endpoint. These trade-offs include severely reduced call quality at times. For this reason the Lync client along with headset is not advised for use by personnel who rely on good audio quality at all times

Telephone calls from your Lync client using your university extension can be made from anywhere where the internet is accessible. This may lead to extremely high telephone usage.

Lync Softclient: R150 per month

When using Lync, users are required to purchase their own headsets at a cost of approximately R290-00.

Lync met Polycom 600: R200 per month

Costs stated above do not include any call costs. All costs of external outgoing calls are debited against the extension making the call. Managing private and non-work related calls still remain the responsibility of the particular environment. The phone managing system will in time will be configured to technologically enable heads of departments to monitor and manage these costs in a fair way.

For more information, send an e-mail to telecom@sun.ac.za  or contact the IT Service Desk at x4367 of helpinfo@sun.ac.za.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.