%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 22 0 R /I2 23 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250707205745+00'00') /ModDate (D:20250707205745+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 5809 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 308.192 521.469 438.542 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 308.567 520.719 437.792 re S 0.773 0.773 0.773 rg 61.016 323.942 m 550.984 323.942 l 550.984 324.692 l 61.016 324.692 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(EDUROAM VISITOR ACCESS \(EVA\))] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(June 11,2019)] TJ ET BT 160.079 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 174.587 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.373 0.169 0.255 rg BT 61.016 637.420 Td /F4 9.0 Tf [(eVA \(e)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 636.269 m 88.529 636.269 l S BT 88.529 637.420 Td /F2 9.0 Tf [(duroam Visitor Access)] TJ ET 0.18 w 0 J [ ] 0 d 88.529 636.269 m 178.052 636.269 l S BT 178.052 637.420 Td /F4 9.0 Tf [(\))] TJ ET 0.18 w 0 J [ ] 0 d 178.052 636.269 m 181.049 636.269 l S 0.153 0.153 0.153 rg BT 181.049 637.420 Td /F4 9.0 Tf [( is a new service which enables higher education and research institute visitors to access )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(the secure and trusted eduroam Wi-Fi network. As additional identity management tool, eVA is a platform where visitors )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(who only need temporary internet access can be registered in a simple and secure manner.)] TJ ET BT 61.016 595.453 Td /F1 9.0 Tf [(What is it?)] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(eVA provides a mechanism that allows authorised staff at eduroam participating institutions to sponsor a visitor and issue )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(temporary credentials to that person for a defined period. Designated eVA admin can determine who is eligible to sponsor )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(visitors, and how long those visitors may gain access.)] TJ ET BT 61.016 533.497 Td /F1 9.0 Tf [(How does it work?)] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(If you are interested in using eVA to register your departments visitors, please log a request on the )] TJ ET 0.373 0.169 0.255 rg BT 457.205 513.508 Td /F4 9.0 Tf [(ICT Partner Portal)] TJ ET 0.18 w 0 J [ ] 0 d 457.205 512.357 m 529.727 512.357 l S 0.153 0.153 0.153 rg BT 529.727 513.508 Td /F4 9.0 Tf [(. To )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(simplify matters, this could typically be the same contact person as for SUNid and only one person per department or )] TJ ET BT 61.016 491.530 Td /F4 9.0 Tf [(division.)] TJ ET BT 61.016 471.541 Td /F4 9.0 Tf [(Note that your line manager has to approve your request before we can assign you rights. Approval can also be done on )] TJ ET BT 61.016 460.552 Td /F4 9.0 Tf [(the ITC Partner Portal.)] TJ ET BT 61.016 440.563 Td /F1 9.0 Tf [(What are the benefits?)] TJ ET 0.153 0.153 0.153 RG 85.866 423.390 m 85.866 423.802 85.696 424.212 85.404 424.504 c 85.113 424.795 84.703 424.965 84.291 424.965 c 83.878 424.965 83.469 424.795 83.177 424.504 c 82.885 424.212 82.716 423.802 82.716 423.390 c 82.716 422.978 82.885 422.568 83.177 422.276 c 83.469 421.985 83.878 421.815 84.291 421.815 c 84.703 421.815 85.113 421.985 85.404 422.276 c 85.696 422.568 85.866 422.978 85.866 423.390 c f BT 91.016 420.574 Td /F4 9.0 Tf [(No other, additional registration, for example SUNid, is necessary to use this service.)] TJ ET 85.866 412.401 m 85.866 412.813 85.696 413.223 85.404 413.515 c 85.113 413.806 84.703 413.976 84.291 413.976 c 83.878 413.976 83.469 413.806 83.177 413.515 c 82.885 413.223 82.716 412.813 82.716 412.401 c 82.716 411.989 82.885 411.579 83.177 411.287 c 83.469 410.996 83.878 410.826 84.291 410.826 c 84.703 410.826 85.113 410.996 85.404 411.287 c 85.696 411.579 85.866 411.989 85.866 412.401 c f BT 91.016 409.585 Td /F4 9.0 Tf [(Ease of use. Manuals and instructions are available online.)] TJ ET 85.866 401.412 m 85.866 401.824 85.696 402.234 85.404 402.526 c 85.113 402.817 84.703 402.987 84.291 402.987 c 83.878 402.987 83.469 402.817 83.177 402.526 c 82.885 402.234 82.716 401.824 82.716 401.412 c 82.716 401.000 82.885 400.590 83.177 400.298 c 83.469 400.007 83.878 399.837 84.291 399.837 c 84.703 399.837 85.113 400.007 85.404 400.298 c 85.696 400.590 85.866 401.000 85.866 401.412 c f BT 91.016 398.596 Td /F4 9.0 Tf [(Visitor rights can be managed and limited.)] TJ ET 85.866 390.423 m 85.866 390.835 85.696 391.245 85.404 391.537 c 85.113 391.828 84.703 391.998 84.291 391.998 c 83.878 391.998 83.469 391.828 83.177 391.537 c 82.885 391.245 82.716 390.835 82.716 390.423 c 82.716 390.011 82.885 389.601 83.177 389.309 c 83.469 389.018 83.878 388.848 84.291 388.848 c 84.703 388.848 85.113 389.018 85.404 389.309 c 85.696 389.601 85.866 390.011 85.866 390.423 c f BT 91.016 387.607 Td /F4 9.0 Tf [(Access expires automatically after the selected set date.)] TJ ET 85.866 379.434 m 85.866 379.846 85.696 380.256 85.404 380.548 c 85.113 380.839 84.703 381.009 84.291 381.009 c 83.878 381.009 83.469 380.839 83.177 380.548 c 82.885 380.256 82.716 379.846 82.716 379.434 c 82.716 379.022 82.885 378.612 83.177 378.320 c 83.469 378.029 83.878 377.859 84.291 377.859 c 84.703 377.859 85.113 378.029 85.404 378.320 c 85.696 378.612 85.866 379.022 85.866 379.434 c f BT 91.016 376.618 Td /F4 9.0 Tf [(Records can be tracked and audited.)] TJ ET 0.373 0.169 0.255 rg BT 61.016 356.629 Td /F4 9.0 Tf [(More information on eVA)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 355.478 m 160.556 355.478 l S 0.153 0.153 0.153 rg BT 160.556 356.629 Td /F4 9.0 Tf [(.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 338.140 Td /F2 9.0 Tf [(Posted in:General,Internet,Security | Tagged:Besoekers,Eduroam,Eva,Visitors | With 0 comments)] TJ ET q 225.000 0 0 97.500 61.016 548.711 cm /I2 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 548.7109 286.0157 646.2109 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/files/2019/11/eduroam.png) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 636.5872 91.5257 645.7447 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://eduroam.ac.za/faq/eva/) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 88.5287 636.5872 178.0517 645.7447 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://eduroam.ac.za/faq/eva/) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 457.2047 512.6752 529.7267 521.8327 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 355.7962 160.5557 364.9537 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (https://eduroam.ac.za) >> endobj 22 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 130 /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 1 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceGray /BitsPerComponent 8 /Length 289>> stream xA 0 =fy9뀟\ 0* endstream endobj 23 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 130 /SMask 22 0 R /Filter /FlateDecode /DecodeParms << /Predictor 15 /Colors 3 /Columns 300 /BitsPerComponent 8>> /ColorSpace /DeviceRGB /BitsPerComponent 8 /Length 26464>> stream xܽyoUxN}eZl -cd*Mf"3@aLbT0?B $Ȱ@3Nba0#h}g{OS.{׷}"" "ky dL^L)oxW{oc#` $vh9!Nc4*;pPB#˿utUЫ]` (ZO+PwįkeWcx/KR}+m1g$'Vt!5Ԫ74n/@5t?Jr"&@PUW,\fw0u9":  r0耻61@Tr|Ƕ`Cmw /^pb#u|0_|P]7騟|)Md?+%J.96Ջy7U._}ZW0ˠ#9>wG@==]'G;GV] vIO3vwF jP .rL`XېUzw -QߜT?w9z(/gQ p%Uڿ2])IGo5TCA]άmt{܁}2=8e:vu mq8A_X].= rzGq/F rMvw  ]IU]8z JP[ gcH#8z}#* 3,r.?]͘o8sZTQAhz3%;E8^ey@6Ogh'J_*U |҅-&i#e _"=X'=H m< ! 4>$)R<}ޱ .s(46'B4;=k.o {Ag,/lG A|T#(fȡ])I0hzAx#tܼO-B? Ak ]fB9vD{xS裣r0e+QBtF[`mu "aW00 g y>ʩFP?l+-/|o#Ѵwp:hLs 8~Q|]ͣ7 -O8ScH *=)H]f؞8+H iutO} Y剝:A~X#+A9mؠ|W}d7ǰ{t it8(@F}BpH-u  n#鈭8XfX> o۠dp,!HMHl_u)e. .oٻH5UЋmgPs w lkjj tWk>T%0GAء:{ =(Qlmo0dႲ_/9ά. O{PX _C@Ψ2 W6 ]v`X+ r'8?/A0! k?/we^q" ms7 r/XtD_`fG )XVyЫ=sWurfI8Tv dz|ssD\R>c>'eE=/ "Exjuxz}N{aOHdj>`C{En׼]'z]M&?OH>]b^pʟ=q('e֣ %ε;r{ZqA,eDoNVѱzYKĘs^ O l`m+*N_9]jB5d t>].)?28mPb-nFp~9܎>>҈ +4s!["8!*yŷU;à3- GQzwC=V`}7­a#Ƅh"=R eL"vd})e_kV"aorیd v7w經6BLvn͂ aQt[?\ X:vC;4w-$I(6MvPqq /Ԫi𧧍cƷ$N>#prK{3pxv^㉂t$6uxXrCvWqXj ;pvq&Ht4BPQup(t}zt5׺ vfe]5:_)C m 9hwy;qRw{b+5q<#k|w% *ߝ7+KY):o\Ne@ܚYݻ!Cjbh9;BAq*}wZN3A =svQớ.dr&ȇ.۠, ɇM`T{m.:"e-Z̋z^yūZ "( ;T'9$3QͿ2L %ߞ$+lJZC)qcӤ;."%}CGO|}w MPppw gK< jQ1KW|QⵠZ/!D<>>>b!-uj*..oͷL6A1]6lvDFdRBqAeUGg%qhG bGv 0Gd0*50><`𨲹~V-*c>Clkd00&"QBS~☙RG>$'q//=;cn:4)>|{*إ'tw4.;.OE"(SG>-[a Eͳ4Sk0fsu5wCDm. q{Zp/"KDiORTT ".k`دt Z%˚vEK/43d)C̮x:tfWvcm? }!JK3J ATT Qqg$8Ո0b" A^I{|9ج `rsa8 tL)Kq>-.[sʩqYc>=V(~Qͅ@@j  \PppoqR;)e'WBH`w})!ʠ(fy=/A2ý0J$͋x'rbj:f=5rl,2kL ]؁`wi ާȷ.I  #c7j[`!p -c1cӼZuU'>9RߚY!EKaL\!H,GPbQ\3DɅQcw WD ⋲!KsڥlN{l=},{;P:3iV?Acp3ON0o٢%;,_^wrNi^_ˮe& s"+u$ Yf4yQAE 7& C|**cD*QR9Q UKQjNYɅp9ƿmɚz)>_\vLm؉?Anu~Hiwtu1?T#N\p+Ul1N3<>zT'G^ˡNe}ugq o[,q;/# "p)Y,+ Ϙ8=XRyUC6:R䞓f_8*(Y=8bjT>m\!0D\}<4>CSTv1DBd8z2)yČ1D5wg$McDNa>IoؑYD!&-I;Nb*H":Ny%I+&H&,ME0"5YɋJL/ OYa4hkZ/A00C"3#@il-qW` q]A]/xl *:za7l !~x.iP͉8CX&](EgymJĘ<YU˓C7̈(_TecYbU4Ɯ!xDYQkٺGD4I8(V^MjM4 0K衭?¡`d,ж`>4{ EA-r*E "ZP;N.qE)4:1xc*ȘR9p;LE Gi3Vr( v F66W4̇S5[sNʢLx ӨXpzۗ R@(T\̊zu2#<`u|UˮM`,*!eG0ym@`(뉨v١?hиW o0Q^Y^ %H y)cR.%psea>˫yQIM\竂herX.dlgJعV"ld5|h@7!A۳^.:PrX=LT\lR C2Pi0$b+$f|@ϫt;f(bX,, Lr'XihԜ0󾱗 ނ.$:nJ:%'1 a4RFޜI4 ̛GN}Im-5 $-)&(*e*’?#$bm҅%(6aI-U/6i#sTjg.~]ml]"4AQs.k2h`TKc5iqfL.I+nK پ{$:>%^;=O<>N`2xիN:@+MS5]۝\(%`Q4vDD8 yA:,[PbQc;^Ñ a$5Me9Q^ NZ,C 177'#B\o!%Q̰dY#++o44:UEͥ߶:v"!xb[6+}kt3-YIhC4K+"6Nst+.UY H(6` 7ձ 6eY>3~ڵѹsgoƷW;!OyJfb!U-׃973`qgiS"cݽR5LAXD ੟!ZLb Ҍu,K5%{PSR^yQ z̘U4LIjl&H= O?Xt(gO#?4<]₩uHPqyI}!$Wql_T)&^ŖC8Wh 0X>\av;ds!"p//>hXcQĒ$詧/<A!Nd+#ɜl=pVkw%g,J)W?asS/P9hG1Sz IdF[+l3~c|Ab4Ԛ @&\i^w6$S߬В[6SPĚ  j l s0Q񚓱 5SSJN D5J6T ^A$ふ׸vS_#QĘzT`'i^G?;;;'3M1ӡa) YYu|N(`̲Fn?ZpހrܐßI"f=׵ɯ5PՖ[1V3\QF2i!lOCT/'/;z%hcUhȐ Eb8?Ac6#V*P:cKMUθ~%Wvc_dHb]Cͦ2(v7 IC7o==D0b(I_c0D,*Q Is2b7CA& ɸҴAl!fДtX |zR5Tn%JplhO_vΨ ͱOr<ҏkT4) vPKjb7p}xbs 8͍&{1f@_|-g@ # fdTEk:܄DKzDU/hz2C[n=EaQ f ʫ1$ H4,|]8+kPYJ82Ԙ a&"hUx8WEvK?ѣgk6AU3P[DhN`1PsA4J8֛-VC[p6]  -q;˄VhT P&o!5z#D)d)˲,KE:o8čתéR$!Bʮא_DM`YmD2 # @h~Tl1GM0'9|nqr%3kjQ6ծb$ Ǵ8!QW5C7X#iϜn+J[ 12 YO|Q_+ 6*o#s!g Oq5154i|s3(Y{q7|˷r[JxcЛFi$n3aU먩N ڀm,5o:E&T`ҞN'R[F(>pG 'y͹>EϦК !c8h/5(9jQQ%φZ<^A$j=sT׾ȊZΠ̐*J LzT51X&E Hf#w8IWs1΋z[}`TbREMxz5]U;swݯOvvvXX]Yɲ;=AcpjA^^s>򁤊1qiwvF]n+W2IYq.,W-@ 'gdˏvb#ѩQYƬ[S),h}qϡċ/^~7{n;SXU壏>O}Sɲ K5-^_R24RYHsli`$kAg@  #JmuMӬ*:mM(aG-:< m Z0M87N2s(ӐeN@Y< ȼbo†(+zJg yci~sOW ƍI:ͪ DuvD `W7ێO"=A|vcķhWh4RJ~ug1ꍥtyw@K/]?W(b{[W^-=yO-eͷ~VβfǺX~Gfe _],JԢpDK? yv^ b[m |D2e*&ZWau\$P҈qn-z'H#jL2Ʋ0f˫(v-k$ָ6^Q(Y u;ʕˣdu5u6&FY.63/itf}0msNU ғPrڙӼZKUy쉅?cq'W\Bqu(d3żrA#К_/ wJw祥[v#jsNi )U-gEElaT A2sD"+ }nj~|H)m#%>cj4a<쌮L@hH.$Xo~c2o;5+u0+Ãq(W)jdym[_&g/ܚg<ŤdiGLw}.A䉃v7GJ۳&U\؝;Z Dz[NV")J;>:2XK]:qc?QٕmWFIqpSڞ -DUV{4!$\,s&+ܱژ@TVt"`.4W\,J*-&(4M=>!.Ik6K;aEQ+t38'KRz;LمhkitruxykΛlɰGLPs7gmNV " GO-KкEuU/Lfy5/j&dfSd)"ӱT)(+s7hQM5KD#!5Vƃhuly-ݚZel_ 챱̻r4#EY_͚ :~ I+D)֥*fZ*@AFkɒSj!E"4XRL{~}Tg4h]5ÓI䈲*ꨱc't,0mzdǓ7sCe%tkvxm)N0lfxf}4NP/d~1APaʵ<]QM7"!B5^Ϝ_F mz)Y)(2$=:Lֳ;(̊iqm/&oX  WA>s&WAyQ7WϬ+Q -5-,8RN۩ C\ik"fy]Ղ1(){6 (bɇmNJKգs|\$8MՕ28d4ޢAxXS_PTҭuIi3z8CΈn=5ڞ4 tP@B(jӚMoŭ~^qamD s6f∝Z 8 iV]Ҩ?jbru4n/b74?a(k1lBzUN Fb#,zw^ʭ*P[⑝01yEUל)ƒ~DaN6|@<ͱls!v1.COV`\_"ؙ4MMze57Wq}8hmIl,+!S1^WZg&6Z"5T橀7 Šj8]+dÈI3yQ b 4/'%Feν8y,_YZlcҒ:4ǖ[SM#ڞS͂1čԜi+qARWvtJ"2^L,%SƠ-UhBheXNp֨ӬA[b0 ffu-+Q#T6`ˣ DBUf_Wn͏-Wl+8 icfeeѼiݐnD:ȉҘSy0aA.ٌ2;/ny)@ohLC+CX%FC}ұo$pEͯe{@ w:̂?eplylGrSυؚrQ1 jډ( oCִjj5cE 5'@40*ͅ8ȪLg? Nڐds7N-:p1?O)?K;}srug˽&Mii^\nXJAVFɉaVYqUu'22{d2 (\$dy ӈo<֙ޢXuhh$yX@VG'VuR~F*k.Y!H?GJ 2O W\m%񳯽yus?ofk豽pc)AӼޝ_K3̅p@qyUScA6ljQm!|"Q}Pcnn q2_}r~&H3u1ꦄBjs<2F"1ѱJ/ʬ-K.5!i&A+eaXa}ä yNnء$4/bok"5O=rBdgGgG̈7,j~}/Ff ZU $\%mNFiA/ʚ_˚Q/Qv"x{54:1BQ]ޚ һMfkli2J< Y1kK 3". 5N2=:nۢ27틡'lA^TZUXd>q\lHRFi4LX QBYqIY=3DEi$IFFidʷʖi&7B>lԛTAd& 0aX\ni/Zmh;@Đ 8`F;EY7r1bƥ{$hND5ɛc'rWs>S,P(|"'V1ۊjs!vf`MHTQ~ "Kv9B1qDokm cD$1nj;6Nb5-EmfZ4ZIM 90{3vly2JƩ C2( "arC5RxՉ%{|շ3 APTwf,3>dXoe. '鉕8 ".~5-|0oԫ0:$uPK4ȮaktmV@%NLެz Oҡ~Bo`Q-JWPI{ $Z%c+ ʋا`>m~q O'~~Ue-d^ҢfG 45v[8+=[?q[ Xy4vJUImBa+S_A <`Q ԮHk4oӈZmݭ*D;/erB ou4y5!d\ $p__kAEQ+?Ez A/uiqoI$'AR^\˛4[*i>6o`?T̬51\, n y3++N!@[1bƎ-^p͋i{(ZIr4Mh B?VcK Zʊjݮ$GBs`8@ayqqteu-8 づXAL"vly c%85'D# %X_vJqXK#m-&QO$bDcGwX xzO|e1B mB ,9哜qÇ˵kq80h=/~:È8Y!cN~ C$,;9^A;C+#yXLoPnΜA̻% n$wWaӾ#85>|7Vt,y˟XPuဏ<4&+mr@=;*8j`8U#عT.p\!}4bEN >7="@Mm-wx~EXƠI<ԇ!ѹ\P﷫6"r%@4᭯>fB C.SCqEg.:sH}/)ұd[oQDP ]QVt6PƱ ]^^Y]]MK3m0w97oޘfL~;6VVVmHN0YADUUݺu D;q`00gYv`{%h$ YQ:Xp*"v|e2Lc"+b^ ٍQDB̲Ezkf•A2`si4LueU|o͋SQ6L4IxDW&>YYߚ.JvIܘV|`1];\g!xW,*xt䩻[[Ϝ9ETIc6>[[[/]vOV@Z_?|w^|~oǎm~C# /?"`- ?{čGO\}s"+~uɞyKۏ]ʕ[׶E~s^Y4he/}z 6^wO'}ewJWK׶o,EvPԳA< xM>sl. Sb/mg<9:4M6٧.ׯoJQz[n;mw0 =}𹫟ҵ;y/ߥ04:_w>cNn_{zHNkK<]ʲ|+>O~O?}agg,˺Qd/$P]Wqq<,?~Moz?孓:|>iWUXEҺ.d]qkl6{衇z`s{X,]:>AsWG**w* +|o,~E!GEMs./>ܵ'w[ 7syuv~E×{-ċ=vO.͈s]=PoRE/ybw7m>3$vw`'^xj:NX{?SǾ4[Jo~~o?y_|kgnxKOUW+6xMx|vv^ۥYO ̲W_v1"XenQ!Icl3OK~{Ϝ9C[noo\|9I8d 3壏>zEMK~W8H=lk++cQnj?DD< v"}(b$zw X +>wc羇{>h}  rx]ͻ_?VY Ezʯ>?~[Ӆ`+zV^޺t+>}7ve?__  wd\sp}SDa!mhn.?f=N[O=~鳏]lO\.`+V`syL`/ܵǯٿWpA^/_.|PO)V3V|c4[_;H|4[@->M/\ߝC(` {QnU; cwgrc_E:hE0<}mwַU-< VڶĀs/Od2˞ٙƔ"huu%Ibl$K2n,ٿw6˲5v(!|3G~iww| K4"ADxmͶb+q347ȶ|fXtqΗ.\ڙ /={' ި/++wz#CzAF$˹8(Ǯj_uVK?wߟf x$o;sw9󂄕76DNn#Wn^Wpgv%Q]3[\p'TKYxY7 9hCe2E횕٧?}yƘ~fۤDDWgeiG~<裏=h`t`t[qcj"ݜ.> m,@YE_T;bVV׳b/*>ϏL~ w6R|sy:}/\ (lYYf6+A?z]İO~O9a]LwGoT˷~?}dm-Ҵ|J|g;SE"meͭ[[=砍,L Du=[dYXu]~m=hA]vmcc(˗_Ȳl04h]{׽="S|[ӏX-3sI`}h.^tgH @%:9^}l^LD`,zū.kw%Xclww^E'ilMI]Atd*lѻ1mY߲yϯ/Wj_@(j7]'H;Vb&5+W!nL,VB<(;yUNYד3:6L[~#-_ JtVe8d#ࡅs!0$ ?fU$Dyl}}Lt˧t8SVl3M#Y+L.8Mxdm8h#4׀Q'[FFFlj= 7 bE$0b8x0ӻ3Nu+mVemֹ]HfCgMկz"|"I~?Z:9 hZ___ZZS?ǎCDƢ%) ' DDD6< C 6 3o /i Zŋ:%:12U/B8vehkO-T܎{jt3GB"[ןzT3qt~u=9-=6Lp+SLlM| x== {a'nO>Z9? RG:qd28P0 9>@!D]N%bDF`UCX0ɲ|6;c^n : ;T:LlAD! >h y7Y(Z !hQٽP!y. ̮<j!~3{d&/^[^n^(SNw3֣BUʲN6[~|>gS_`tl` SKtlLiȯPO_͞fSy!gŭ>,O" FLeo:w'6z$'EVkGvogkǡ vh6@z zY⎰0be[?_opcEG;7ѦsX<ں5,%I ("c6O~>t٥讻oӢ~`F衇o%IUU=;L)hhbӃ{][ظ|.KK._(R$zbĶdvZeY~؍$-˵~TEEQ@h)ĊP$8v؂lQIYO$w眙]ݹ3|;{eG/>eEx(Dl? -N;3nBlzQK7מo$L].yfj{<56=:Sʍ rp8=me=ۋz'lS<̘:FYUlwxA!I=uHUf_ֻzH@>୷޼qFhuV#b/_~饿|cc/O KV/WlI$獌l뛜L$4^o=+VJRxwϿ+o3UmiTR799nݺ w#e]l]+FvtGU^h"D;߽K/ohv/ 'rhl`WRjTֵi:*Y5T͹to!/^y0̎H^"v)%{W⼢guL$)&-:g `1 8mb<{?ߴf2Hw{B6۱f͚BpBa1KzwI[{LX>tm۶*w911nEaU]"455[7E@O&MMbytF)333#y%(" ¹ejPԖJk? 3?޽]=U$r"ԣ#ޒǴ=t9 0,y׿֓;3K?{)C$a5A  ,J]S 3_1;X,XFxO\^xbt##F6}ȾNߚյ_BrÏ߀CSW*9 Kr|ۓjƆap݃0 ZqB [0㣱*:;;_|c(W*|Y.=O?]`.J---O<ğkFO}{=L|W>VӗNKD`&V}{)*JCC$,1rL)سm}x|@{2$tDoIɄ3yksMGvm:sP̀L7'N&U*D+~*c੘Rd:^tѹrg(ǧF#[YH+2ުͶ`&ޕ UI=|~$i֭S_7lŋbC!^j\^~ر/:m۶yNTOOϗѣO75%` 2ֺX,[Ǻ]HMm0ܾ}W6Ij b!?܉,--1f{AP#ɾ# TS\T, Nck޿6nSP:nګ:2nZZmn..o0CHuk`yugm^qWkBq\L1==_}[B!|`͌Ǜb}>|֭[Ǐ?H49sڵk_b}X,i|oj,F%|]tԩoo}6|Pz5T*/k xbpp_:trBxk5p5@UZ.W>w_#{}][ZT"7ELiIAs"~Oown䆾dTeZsW',+ϋ~Ž7=C_%:OO/tқW" PgSoj4+!I8HTώq+P2%u;w|ࣗ.]r巗.]Z\\\ZZb),^&nnnnooڸi{c;y=ι?[]-*lOO;>Gv^~㡇k:<ϗ+AXĕĽLKswO?e`D۷rt~1x›JC}6$Pl4$RT'ӂ϶ٽYK73 ,qBI$k&,i$Ł % MNE@3\./..-//ϛzՕK3l{&Ӗv=Ơ-,,ܾ}{n~[rTPΚ'b8===p=Oe2l6tptaaann6|IcXwwW2l:L~ŷ:b ڼsV1\^\Y\Y]\.ܚ/ To&)K[߹bi&_)NN-YY &6TG:iimom7˅٥>C.jK%օby:RX^P< tdp\ݜ]\)WlmQwsM,%@\ib3YT xSnDOT``i| (LdC [Gޕ 1E[6r<vٲzSQYW,˄"FQ;# Yq  BlTYDQ&AMuno`lE`"#O9mk{8Axu$p, dmmK䈩%RObQI$Davn3Y$o0ǰn䶳4K' O$ S _o$1P,M 3i%\16<6O`K9Q$x`INa6 F>D硆]iKH<$߶ CQ*:B'dxv,8ë ~q(FH6z[;Lam"&N7 hFB36bEmPzxB݌O+P#V#\p劸D1.pbfV5\|Ђ $=$9lF/m$h&Oq2JbC5OUdy A{ J-}"bC|`Nݕ b9 c[C  _z ^tg ̵@X$Cf&;025,@±||JL!&9r76~HsኂƱ Rd>|H !@"'L!0NL6~qq/f&!Aŭ8ʲrb 5AYjSGA4Blϣxw+gD $ x"6 l!VD6<ܿܖBE|ҺbHbuI#`$xdDI Vk)dHrXNd"R0b^^9E""3b\,͖b]L $1 C%~'ɉ{$yb@ 4<<Lh"l:фQHpH'!ᅽȭVh{4 G/F r""rd:0wN"VGl-H cH\8%fiAc+s1!)0E¸;wM؂7z-;h&N] H]7ysjKĒ]IT7wFl;nzR endstream endobj xref 0 24 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000343 00000 n 0000000380 00000 n 0000000518 00000 n 0000000628 00000 n 0000006489 00000 n 0000006601 00000 n 0000006716 00000 n 0000006836 00000 n 0000006944 00000 n 0000007071 00000 n 0000007174 00000 n 0000007300 00000 n 0000007382 00000 n 0000007509 00000 n 0000007591 00000 n 0000007719 00000 n 0000007800 00000 n 0000007927 00000 n 0000008000 00000 n 0000008534 00000 n trailer << /Size 24 /Root 1 0 R /Info 5 0 R >> startxref 35258 %%EOF Internet « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Internet

Lower internet rates and faster internet

Wednesday, February 6th, 2013

Thanks to the University’s collaboration with SANREN and the implementation of the new Fortigate firewall, users on campus can now look forward to lower internet rates and faster, more stable internet. Both these projects were necessary if one takes into consideration that the university’s bandwidth usage doubled each year for the past 8 years. In spite of the increase in usage, rates were never increased.

 

RATES FOR INTERNET USAGE FROM 1 JANUARY 2013

Tariff A @R0.02/MB: Monday-Friday: 08h00-23h59

Tariff B @ R0.01/MB : Monday-Friday: 00h00-07h59, as well as Saturdays and Sundays

 

Take note that the relevant tariff is determined by the day and time the download process was completed.

•Example 1: If you start downloading a file of 3 MB at 16:55 on Monday and the download is completed at 17:10 (Monday), the tariff for Monday 17:10 will apply.

•Example 2: If the same file is downloaded from Monday 07:55 to Monday 08:10, the tariff for Monday 08:10 will apply.

 

 

How do South Africans use their smart phones?

Friday, November 23rd, 2012

Ever wondered what other South Africans use their smart phones for? Well, designers Grant Barnard and Elizabeth Joss came up with a nifty infographics that will break it down for you.

According to the infographic cellphones are the most popular telecommunications device in South Africa and interestingly enough, also the device most used by South Africans to access the internet.

SOURCE: www.techtalkafrica.com

Virtual classrooms become reality at Worcester campus

Friday, November 9th, 2012

Although use of visualised desktops has been in use at the Main Campus CUAs for several years, with considerable success, smaller campuses like Tygerberg and the Business School, have been unable to adopt the technology because of the prohibitive costs of the infrastructure that is required in the background. (network and storage) However in 2012 a new company, Pivot3 entered the market with a decidedly innovative solution to provide VDI for smaller enterprises.

But what is VDI or Virtual Desktop Integration?

Wikipedia describes VDI as the storing of a “virtualized” desktop on a remote central server, so that when users work from their local machine, all of the programs, applications, processes, and data used are kept on the server and run centrally.”

VDI allows users to run an operating system and execute applications from a smartphone or “thin client” where the processing power and capacity is delivered by the server and not the user’s own computer. The most obvious benefit is that there is no longer any need for huge, power-hungry and expensive workstations or personal computers.

Secondly, the “desktops” are managed centrally and thus can be updated and patched without the need for technicians to go from computer to computer, updating and managing patches, repairing broken operating systems.

With the completion of Stellenbosch University’s Worcester Campus – the hub of the Ukwanda Rural Clinical School, the Faculty of Medicine and Health Sciences identified VDI as a solution to deliver “virtual classrooms” and desktops to the students and personnel based at Worcester Campus. Although the Worcester Campus can permanently accommodate 50 students, there are large numbers of “visiting” students that are hosted at the Worcester Campus. Meeting the needs and requirement of this “passing traffic” on this small campus (with a single personnel member to run the ICT infrastructure) was an enormous challenge.

Fortunately, the FMHS was introduced to the Pivot3 VDI appliance solution – a blend of highly-tweaked Dell servers and VMWare’s VMView virtualization software – being introduced at a fraction of the cost of the equivalent VDI solution running at the Stellenbosch University Main Campus – SAN/Citrix/XenDesktop.

The FMHS recognised the potential and cost-effectiveness of Pivot3’s VDI appliance solution, and purchased the first unit on the continent to be used in an academic environment.

The immediate benefit of Pivot3-VDI is that custom and standardised desktops can be delivered to students and personnel on the Worcester Campus, on demand and literally in seconds, without the need for extensive IT personnel to personally set up and configure individual computers. Old computers, laptops, tablets, Android cellphones can all receive and operate the same desktop and software.

However Pivot3 did not anticipate another possible use of their product – as a delivery mechanism for secure electronic exams! Stellenbosch University makes considerable use of e-assessment and LMS systems like WebCT/Blackboard and Moodle, but accommodating large numbers of students at the same time to write these online exams is a challenge. With a product like Pivot3, the FMHS will be able to allow students to use their own devices (BYOD) to write electronic exams, by delivering preconfigured and secure desktops on demand for the exams increasing the capacity of the FMHS for electronic exams.

Worcester Campus and FMHS is currently engaged in extensive trials of its new VDI solution, and by the middle of 2013 will have a fully deployed VDI solution for desktops and electronic exams to approximately 100 students and personnel.

ARTICLE BY DAVID WILES

Every cloud has a silver lining

Friday, August 31st, 2012

Make no mistake, the movement towards cloud computing is a very real one, but before you get overly excited and send all your sensitive and academic information to a cloud, it’s important that you know the pros and cons, as well as the risks involved with this growing phenomenon.

ADVANTAGES

Probably the biggest advantage of cloud storage is the possibility of having access to your data or software from anywhere at any time from any appliance. You no longer have to carry around your laptop, flashdisk or external hard drive to ensure you have your data on hand at all times.

Thanks to data stored in a central location and being accessible via the internet, you can easily share documents and colleagues can collaborate on the same document without having to coordinate changes by email. All your documents will ideally be in one place, making it easier to find your documents. Google Docs for example, stores your documents in chronological order and also allows you to store them in folders.

For companies there are no upfront capital costs and fewer overhead expenses. The organization pays only for using the services; it saves on maintenance, user licenses, and expenses such as electricity and rack space. With cloud storage you needn’t worry about natural disasters – your data will be safe and sound, even if your office burns down or the geyser floods your study.

DISADVANTAGES

As we’ve seen, cloud storage has quite a few advantages, but unfortunately there’s one big disadvantage. It only works if you have internet access. The cloud is dependent on the internet and if the Telkom or Mweb experience problems, the cloud and your data is inaccessible.

Performance is also dependent on internet speed and the number of users accessing the cloud. Even though cloud computing may save companies costs on overheads, the costs of usage can become a nightmare if it’s not monitored and managed. Be very careful when using multiple devices, especially if you share folders with other people. If you share a 500MB file with three other people it will sync three times, in other words a total of 1500MB at your cost. If you sync the file to your pc, iPad and iPhone you pay each time and if you use 3G (which costs between 15c and R1-00 per MB)  this could amount to quite an expense if done regularly. Closely monitor your internet account if you use cloud storage otherwise you might be in for a surprise at the end of the month.

Privacy and security are important concerns when it comes to cloud computing. Safety measures to protect users are in place, but the level of security and privacy provided is still a grey area. There is not enough information to prove or disprove the credibility of the cloud for privacy and security overall. In effect the cloud service provider would be able to access information between the user and company at any time and change or delete data.  

Physical control of the Private Cloud equipment is more secure than having the equipment off site and under someone else’s control. Customer data may also not remain in the same data centre or on the same provider’s cloud. This causes legal concerns regarding jurisdiction. Other issues such as trademark infringement and security concerns regarding the sharing of data resources can also arise.

Unfortunately cloud computing is also vulnerable to threats and more criminals will try to find new ways to exploit vulnerabilities in the system. There are many underlying challenges and risks in cloud computing that increase the threat of data being compromised. So choose wisely when picking a service to use with your important data and make sure it can be downloaded if needed, but also enjoy the flexibility those services provide.

(SOURCES: Regan Januarie (IT User Services), http://www.ahimajournal-digital.com), www.wikipedia.org)

<< What is the cloud?

>>  Which one to choose?

Password synchronisation giving you a headache?

Friday, August 31st, 2012

Every 90 days you receive an email from helpinfo@sun.ac.za asking you nicely to change your password. We all know that, although it’s a bit of a nuisance, it’s also necessary for security reasons. But is there a way to simplify the process?

In 2007 Microsoft Research conducted a study and found that the average user has 6.5 internet passwords, each person has approximately 25 accounts with passwords and has to enter 8 passwords per day.  And this was in 2007 – imagine what the statistics will look like 5 years later.

If you use more than one device, password changes can become a nightmare. But there are a few steps you can follow to make sure it goes a bit smoother.

Switch off all your devices except for one, for example your laptop.

Sign on at http://www.sun.ac.za/useradm, select the Change Password option and select a new password according to the guidelines supplied on the website. Log out of the network with the Logout option given on http://www.sun.ac.za/useradm. Log onto the network with your new password. Make sure you can access all your network applications – email, internet and networkspace. Switch on all the other devices and type in your new password.

Remember, you can change your password any time at http://www.sun.ac.za/useradm with the Change Password option. Try to stick to the guidelines to ensure you have a secure password – it will safe you a lot of effort and frustration in the long run. If you’ve forgotten your password, you can also reset is by browsing to staff portal.

More information and hints on password changes can be found at https://stbsp01.stb.sun.ac.za/innov/it/it-help/Wiki%20Pages/Change%20password.aspx

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.