Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Connectivity

Your conference – unplugged

Friday, June 7th, 2013

As the trend to use your own, personal devices within the university environment increases, so does the need and expectation to have access to the internet at all times and wherever you are.

This is also the case when it comes to conferences and other academic events on campus. But how do you go about to make life easier for your and your conference attendees?

To apply for wireless access for your conference or event, just follow these simple instructions.

E-mail help@sun.ac.za with the following information*
 
Name of conference/visitor
Location of conference (building, room)
Start date and time
End date and time
Interdepartmental requisition (OE 6414​ for the amount of R300-00 per day)
Contact person
 

* E-mail has to be sent 14 days prior to the conference or arrival of visitor to ensure that there are existing WAPs (wireless access points ) at the location)

 

As soon as the request is received and after the SSID –  “service set identifier,” (username and password) is created, you will be notified by e-mail or telephonically.  When conference goers or visitors are inside the WIFI area, their equipment will pick up the WIFI  and they will be able to connect.

To blog or not to blog?

Friday, May 24th, 2013

Over the past fifteen years the word “blog” has become part of our daily vocabulary and most of us visit some form of blog on a daily basis. In some cases we’re not even aware of the fact that it’s a blog. Since the emergence of blogs in the late 1990’s their appearance and functions changed and developed.

A Blog (combination of the words “web” and “log”) is a website that contains stories and updates in reverse chronological order–the most recent entries appear at the top of the front page, and you browse backwards to move through the past articles.

A typical blog combines text, images, and links to other blogs, Web pages, and other media related to its topic. The ability of readers to leave comments in an interactive format is an important contribution to the popularity of many blogs. Through the sharing of information the blogger builds a relationship with his readers or followers and a virtual community of like minded people with similar interests is cultivated.

The emergence of blogs changed the face &  future of journalism to a large extent. Suddenly anyone with access to a pc, was able to publish their opinions and writings. Most blogging platforms are extremely user friendly and makes it easy for individuals without web design experience to have their blog at no cost whatsoever.

Initially blogs were about personal experiences and maintained by a single person as a form of self expression or commentary on certain topics. These blogs were initially made possible by sites like Open Diary, Live Journal and Blogger. By the late 2000’s the focus shifted from blogs as personal diaries to full blown, edited and moderated digital magazines. “Multi-author blogs” started developing, with posts written by large numbers of authors and professionally edited.

As the purpose of blogs shifted through the years, so did their format. Now we also have a scaled down version of the original blog format, the microblog.  Microblogs consist of short commentaries or content, and photos, videos or other multimedia. Twitter and Tumblr are two of the more popular examples of microblogging and are especially useful when it comes to realtime updates of important global events.

If you’re feeling inspired and would like to create a blog for your department, you don’t have to look far. You can host your department’s blog locally on the university’s own WordPress platform. For more information, click here.

[SOURCE: www.howtogeek.com & www.wikipedia.org]

 

 

 

Still missing out on the new SU website?

Friday, April 26th, 2013

On Monday when we browsed to www.sun.ac.za, most of us were met with a fresh new Stellenbosch University web site.  For those of you who still haven’t managed to see what the fuss is about, here’s how to fix that. (Read more on the new site)

Each time you access a page through your web browser, the browser caches (i.e., stores) it locally. The browser does this to reduce bandwidth usage, server load and also to load pages faster.

By doing this, the browser doesn’t have to newly retrieve files or images from the remote web site each time. As convenient as this is, it also means that if you do not clean your browser’s cache, you might miss out on new information and any changes on websites.

If, after Monday’s changes to the university’s homepage, you are experiencing problems accessing the new sun page or any other sun web pages, we suggest you clear your browser’s cache.

Below you’ll find instructions on how to do this, depending on the browser you use.

 

Internet Explorer 9 and 8

  • Click Tools, and select Delete Browsing History… .
  • Deselect Preserve Favorites website data, and select Temporary Internet filesCookies, and History.
  • Click Delete.

Internet Explorer 7

  • From the Tools menu in the upper right, select Delete Browsing History… .
  • To delete your cache, click Delete files….To delete your cookies, click Delete cookies… .

    To delete your history, click Delete history… .

  • Click Close, and then click OK to exit.

Firefox

The following instructions apply to Firefox 3.5 and later.

  • From the Tools menu, select Clear Recent History. (Alternatively, in Firefox 4 and above for Windows, you can also click the orange Firefox button, and then select Clear Recent History from the History menu.)If the menu bar is hidden, press Alt to make it visible.
  • From the Time range to clear: drop-down menu, select the desired range; to clear your entire cache, select Everything.
  • Click the down arrow next to “Details” to choose which elements of the history to clear. Click Clear Now.

Chrome

  • In the browser bar, enter: chrome://settings/clearBrowserData
  • Select the items you want to clear (e.g., Clear browsing historyClear download historyEmpty the cacheDelete cookies and other site and plug-in data).From the Obliterate the following items from: drop-down menu, you can choose the period of time for which you want to clear cached information. To clear your entire cache, select the beginning of time.
  • Click Clear browsing data.

Opera

  • From the Opera menu, select Settings, and then Delete Private Data… .
  • In the dialog box that opens, select the items you want to clear, and then click Delete.

Safari

  • From the Safari menu, select Reset Safari… .
  • From the menu, select the items you want to reset, and then click Reset. As of Safari 5.1, Remove all website data covers both cookies and cache.

Mobile Safari for iPhone OS (iPhone, iPod touch, iPad)

To clear cache and cookies:

  1. From the home screen, tap Settings, and then tap Safari.
  2. At the bottom of Safari’s settings screen, tap Clear cookies and data, or Clear Cookies and Clear Cache. Confirm when prompted.

To clear history:

  1. From the home screen, tap Safari.
  2. At the bottom of the screen, tap the Bookmarks icon.
  3. In the lower left, tap Clear.
  4. Tap Clear History.

Android

  1. Start your browser.
  2. Tap Menu, and then tap More.
  3. Select Settings.
  4. Under “Privacy settings”, select Clear cacheClear history, or Clear all cookie data as appropriate, and then tap OK to accept (or Cancel to cancel) the deletion.

(SOURCES: http://kb.iu.edu/data/ahic.html & www.wikipedia.org)

Access control on SU and private devices

Friday, April 26th, 2013

With choice and freedom, inevitably comes some guidelines, rules or policies. This is also the case with the university’s  approach to the usage of electronic equipment, such as laptops, phones and tablets in the near future.

Due to our ever changing technological landscape Information Technology recently saw the need to  compile a policy to act as a guide for the use of SU and private devices. (Read our previous article on BYOD.)

Then End-user equipment and media policy establishes rules for the appropriate use of end-user equipment and media in the Stellenbosch University environment in order to protect the confidentiality and the integrity of academic and institutional information and applications as well as the availability of services at the University. It specifies the University and individual user responsibilities for processing, managing, and securing academic and institutional information on University and privately owned equipment (devices) and media.

These guidelines apply to all staff, students and associates who access the University network and information that relates to University owned or privately owned end-user equipment that will be used to connect to, access and/or process academic and institutional information.

This week we’ll look at the measures that have to be taken when it comes to access control to devices.

Prior to initial use via a physical connection to the University internal network or related infrastructure, all end-user equipment (with the exception of devices that are used to connect via Virtual Private Network (VPN)) must be registered with University Information Technology (IT) Division.

The IT Organisation reserves the right to:

– Refuse, by physical and non-physical means, the ability to connect privately owned or non-sanctioned end-user equipment to the University Network. The IT Organisation will engage in such action if it feels such equipment is being, or may be, used in a way that puts the University’s systems, information or users at risk.

– Summarily ban the use of a privately owned end-user device at any time. The IT Organisation need not provide a reason for doing so, as protection of the University Network and information is of the highest priority.

– Physically disable communication ports (such as Universal Serial Bus (USB) ports, other ports that can connect to storage devices or media) on University-owned IT assets to limit physical and virtual access to University systems and information.

– Users who wish to connect privately owned or non-sanctioned end-user equipment to the University Network to gain access to University applications or information and/or the Internet must implement, for their devices and related infrastructure, appropriate and up-to-date:

* personal firewall;

* anti-virus software;

* anti-malware software;

* any other security measure deemed necessary by the IT Organisation;

* operating systems (e.g. Microsoft Windows, Android, Apple iOS, etc.) and operating system updates.

– Users must implement physical security practices to prevent the theft or loss of end-user equipment and media, especially mobile devices, and academic and institutional information, including:

– If it is absolutely necessary to leave a portable device unattended, it should be secured with a cable lock or similar security device,

– Ensure that portable devices are not visible when left in a vehicle. If portable devices are left unattended in a vehicle it is recommended that they be locked in the boot.

– Lock portable devices away when not in use.

– Portable end-user media or devices which contain confidential academic and institutional information must be protected by an access control mechanism (e.g. password, biometric, PIN code or pattern lock, etc.). If the latter is not possible, access to data files on these devices or media, must be protected by an access control mechanism. Devices that are unprotected by an access control mechanism may not hold confidential1 academic and institutional information.

The big drive in the sky

Friday, April 12th, 2013

Last year we told you more about cloud storage, what it is and the multitude of options available to you. (read the articles here) If you haven’t taken the virtual leap yet, we have even more information for you to digest. This time we have a closer look at one of those options, Microsoft’s OneDrive.

What is OneDrive?

OneDrive is a file hosting service that allows users to upload and sync files to a cloud storage and then access them from a Web browser or their local device.

What does OneDrive offer me?

The service offers 7 GB of free storage and additional storage is available for purchase. Files of up to 300 MB can be uploaded via drag and drop into the web browser, or up to 2 GB via the OneDrive desktop application for Microsoft Windows and OS X.

With the OneDrive desktop application for Windows or Mac, your files on OneDrive are available online or offline and update automatically across your devices. You can also access your OneDrive using a brand new app for Android v2.3 or the updated apps for Windows Phone, iPhone, and iPad.

The Office apps (Word, Excel, etc.) let you save your documents by default into your OneDrive directory on your local computer. With the help of OneDrive, those files are synchronized with the files in your OneDrive cloud storage, letting you access them from anywhere, or edit them using the online Web version of Microsoft Office.

Online collaboration is made easy with the new  Office Web apps, including Excel forms, co-authoring in PowerPoint and embedable Word documents. Microsoft added Office Web Apps support to OneDrive allowing users to upload, create, edit, and share Microsoft Office documents directly within a Web browser.

You can share documents with other people, which provides them with a link to access the documents from their own OneDrive account. From there, the other people can make changes to the documents at the same time that you’re changing them. As you’re working, you’ll see the areas you’re changing. Then when you save, your document will receive the updates from the other person before saving. If there are any conflicts, you’ll be notified of them and given a chance to fix them.

 

When users delete any files on OneDrive, the service will allow the user to undo the action and restore the deleted file from the recycle bin back to the original folder.  All items stored in the recycle bin are kept for a minimum of 3 days and a maximum of 30 days.

OneDrive integrates with social networks such as Facebook, Twitter and LinkedIn to enable users to quickly share their files with their contacts on these social networks. It also supports geo-location data for photos uploaded onto the service, and will automatically display a map of the tagged location. OneDrive also allows users to tag people on the photos uploaded onto the service via the web interface or via Windows Photo Gallery.

Additionally you can sort files, change file views, view photo slide shows, and stream video.  All this functionality in one place, safe up in the clouds.

[SOURCE: Wikipedia]

 

(more…)

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.