Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

General

Virtual classrooms become reality at Worcester campus

Friday, November 9th, 2012

Although use of visualised desktops has been in use at the Main Campus CUAs for several years, with considerable success, smaller campuses like Tygerberg and the Business School, have been unable to adopt the technology because of the prohibitive costs of the infrastructure that is required in the background. (network and storage) However in 2012 a new company, Pivot3 entered the market with a decidedly innovative solution to provide VDI for smaller enterprises.

But what is VDI or Virtual Desktop Integration?

Wikipedia describes VDI as the storing of a “virtualized” desktop on a remote central server, so that when users work from their local machine, all of the programs, applications, processes, and data used are kept on the server and run centrally.”

VDI allows users to run an operating system and execute applications from a smartphone or “thin client” where the processing power and capacity is delivered by the server and not the user’s own computer. The most obvious benefit is that there is no longer any need for huge, power-hungry and expensive workstations or personal computers.

Secondly, the “desktops” are managed centrally and thus can be updated and patched without the need for technicians to go from computer to computer, updating and managing patches, repairing broken operating systems.

With the completion of Stellenbosch University’s Worcester Campus – the hub of the Ukwanda Rural Clinical School, the Faculty of Medicine and Health Sciences identified VDI as a solution to deliver “virtual classrooms” and desktops to the students and personnel based at Worcester Campus. Although the Worcester Campus can permanently accommodate 50 students, there are large numbers of “visiting” students that are hosted at the Worcester Campus. Meeting the needs and requirement of this “passing traffic” on this small campus (with a single personnel member to run the ICT infrastructure) was an enormous challenge.

Fortunately, the FMHS was introduced to the Pivot3 VDI appliance solution – a blend of highly-tweaked Dell servers and VMWare’s VMView virtualization software – being introduced at a fraction of the cost of the equivalent VDI solution running at the Stellenbosch University Main Campus – SAN/Citrix/XenDesktop.

The FMHS recognised the potential and cost-effectiveness of Pivot3’s VDI appliance solution, and purchased the first unit on the continent to be used in an academic environment.

The immediate benefit of Pivot3-VDI is that custom and standardised desktops can be delivered to students and personnel on the Worcester Campus, on demand and literally in seconds, without the need for extensive IT personnel to personally set up and configure individual computers. Old computers, laptops, tablets, Android cellphones can all receive and operate the same desktop and software.

However Pivot3 did not anticipate another possible use of their product – as a delivery mechanism for secure electronic exams! Stellenbosch University makes considerable use of e-assessment and LMS systems like WebCT/Blackboard and Moodle, but accommodating large numbers of students at the same time to write these online exams is a challenge. With a product like Pivot3, the FMHS will be able to allow students to use their own devices (BYOD) to write electronic exams, by delivering preconfigured and secure desktops on demand for the exams increasing the capacity of the FMHS for electronic exams.

Worcester Campus and FMHS is currently engaged in extensive trials of its new VDI solution, and by the middle of 2013 will have a fully deployed VDI solution for desktops and electronic exams to approximately 100 students and personnel.

ARTICLE BY DAVID WILES

Vaccinate your pc

Friday, November 9th, 2012

Every year you have to go to your doctor to get an anti-flu injection. You have to get one every year because the influenza virus mutates and adapts every year into a new strain. Computer viruses are exactly the same! Here are a few handy tips and hints to ensure the whole process is as painless as possible. But first things first –

  • Use an AntiVirus Software – It is very important that your computer has an antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and therefore infect yourself.

See this link for a listing of some online/stand-alone antivirus programs: Virus, Spyware, and Malware Protection and Removal Resources

  • Update your AntiVirus Software –  There is no point running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. Then if a new infection appears in your computer, the antivirus program will not know that it is bad, and not alert you when you run it and become infected. Therefore it is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats. If you are lucky then you will have an anti-virus product that will update itself automatically via the internet, but never blindly trust this. A large number of the more virulent viruses and trojans can deactivate your anti-virus software’s updating functions.
  • Install an Anti-Spyware Program – Just as you installed and use an antivirus program, it is essential these days to use a Spyware protection and removal program. These programs can be used to scan your computer for spyware, dialers, browser hijackers, and other programs that are malicious in nature. The 4 program that I recommend are SuperAnti-SpywareSpybot – Search and Destroy, andLavasoft’s Ad-Aware, and Windows Defender.A tutorial on using some of these programs can be found below:

Using Spybot – Search & Destroy to remove Spyware , Malware, and Hijackers

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer

  • Commercial Spyware Removal/Protection Programs – If you feel more comfortable installing a commercial Spyware removal program then I recommend WebRoot’s Spysweeper or Lavasoft’s Ad-Aware Professional. Both are fair products and a worthy addition to the arsenal of software protecting your computer.

Spysweeper Product Information

  • Occasionally Run Online Virus Scans – Unfortunately not all antivirus programs are created equal. Each program may find infections that other antivirus programs do not and vice-versa. It is therefore recommended that you occasionally run some free online antivirus scanners to make sure that you are not infected with items that your particular antivirus program does not know how to find. Three online scanners that we recommend are:

Every once in a while, maybe once every 2 weeks, run one or both of these scanners to see if they find anything that may have been missed by your locally installed antivirus software. Believe me, you will not regret it!

ARTICLE BY David Wiles, GERGA

For regular updates on the latest spam, malware and ransomware threats, please check or blog regularly.

HUAWEI consulted about network instability

Thursday, November 1st, 2012

Since this weekend, access to the residential segment on the SU network has been extremely unstable.

IT’s network engineers have been working since Monday on finding a solution to the problem. HUAWEI and First Tech have also been consulted to assist with the trouble shooting process.

We are well aware of the inconvenience caused by this network instability, especially at such a critical time of year.

Be assured that we are doing everything within our power to resolve the situation as soon as possible.

Lost your cell phone?

Friday, October 26th, 2012

You know that sinking feeling when you realise you’re lost your wallet/phone/keys? Well, we can help you with the lost phone …

If your cell phone has been stolen, there are ways to prevent whoever has your phone from accessing your data and personal information. Some applications can even track the location of your phone.

Which method you use, depends on the phone you use.

1. BlackBerry

BlackBerry Protect is a free application able to assist you with locating your BlackBerry and to ensure that your data is safe.

If you lose your BlackBerry, you can log on to the BlackBerry Protect website and lock your device to make sure the person who has it, can’t use it. If you’re pretty sure you won’t be seeing your phone again, you can remove your data and SD card via the website.

If you are registered on Blackberry’s Enterprise Server, the device can also be wiped on the server side.

If you merely lost your phone, there’s also the option to lock your phone and display a message on the screen for whoever finds your phone. By means of GPS, it’s possible to establish your phone’s location and find it again. Or, if you suspect the device is within hearing distance, just adjust the volume to it’s loudest setting and you’ll be able to find your phone,

Apart from these functions, you can also backup your contacts, calender and bookmarks wirelessly. This can be done automatically and as frequently as you prefer (daily, weekly or monthly)

If you’ve replaced your old BlackBerry with a new one, you also can get your backed up settings, contacts and calender items back with BlackBerry Protect.

2. iPhone

Apple users can user Find My iPhone via the iCloud-fasiliteit.

Sign on at  iCloud.com or use the Find My iPhone app on a different phone to locate your phone on a map, display a message on the screen, lock the phone and display a message or wipe your data.

With iOS 6, iCloud also provides a Lost Mode, which makes it even easier to lock your phone with a four digit password and send a message to the phone with a contact number. If the phone is in Lost mode, it will continuously keep track of where the phone was and you’ll be given a report when you sign on to p iCloud.com or on the Find My iPhone app.

3. Android

If  Google Sync is configured on your phone or the Google Apps Device Policy application on your  Android, your data and personal information can be wiped from another device. Use this function when you phone has been stolen or lost. Just keep in mind the remote wipe function will remove ALL device based data  – e-mail, calendars and contacts and reset your phone to it’s initial default factory settings. It will not, however, remove data stored on the SD card.

New procedures for setting up Outlook on Android causes confusion

Friday, October 26th, 2012

Since the recent Exchange upgrade a few people have been confronted with a few unusual questions when trying to set up Outlook on their Android phones.Fortunately the process is less intimidating than it seems at first glance.

After the standard Outlook setup on your Android (click here for the full instructions),  Activate device administrator” will appear, prompting you to select a long list of options, for example Erase all dataChange Screen unlock passwordPassword recovery . Do not be alarmed as this is standard for setting up Exchange/Outlook on any Android phone. This just indicates what the app is capable of doing. Other cell phone operating systems include the same settings, but it’s not always displayed to the user when the programme is being installed.

The text being displayed is therefore standard for the specific Android application – IT has no control over the text it displays. It is also standard practice at various universities using MS Exchange.

One of the options is – Erase all data: Perform a factory reset, deleting all of your data without any confirmation. This option in particular led to many questions. If we look at the Exchange implementation, it’s very clear that the only person who has access to this function and can actually wipe the device, is the mailbox owner himself.

These and other advantages  and additional e-mail functionality, is available to Android users on www.sun.ac.za/webmail. In webmail, under Options -> See All Options -> Phone -> Mobile Phones there are various functions available:

Sync Logging: Enables you to look at the synchronisation of your phone, to select what you want synchronised, which servers should be used, etc.

Remote Wipe: With this option, you can wipe your phone’s data (contacts, photos, etc.) if it ever gets into the wrong hands. The phone will then be reset to it’s default factory settings. ONLY the registered e-mail user will have access to this function, no one else has access.

Details: Shows exactly which devices is linked, model, software versions, etc. 

Delete Device: This removes the connection between the Exchange and the selected device. If you initiate this via webmail, the person who has your phone will not be able to reinstall the mailbox. Your data stays protected.

(INFORMATION SUPPLIED BY FRANCOIS DE KOKER)

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.