%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 24 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250727183508+00'00') /ModDate (D:20250727183508+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R 18 0 R 20 0 R 22 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4042 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 291.236 521.469 455.498 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 291.611 520.719 454.748 re S 0.773 0.773 0.773 rg 61.016 306.986 m 550.984 306.986 l 550.984 307.736 l 61.016 307.736 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(REMEMBER TO CHECK YOUR JUNK EMAIL FOLDER)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(To ensure that staff and students )] TJ ET BT 195.098 637.420 Td /F1 9.0 Tf [(aren't)] TJ ET BT 219.245 637.420 Td /F4 9.0 Tf [( exposed to malicious )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(phishing or spam emails our system administrators and security )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(team)] TJ ET 0.373 0.169 0.255 rg BT 81.023 615.442 Td /F4 9.0 Tf [( had to enable a stricter spam filter earlier this year as added )] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 81.023 614.291 m 325.130 614.291 l S BT 61.016 604.453 Td /F4 9.0 Tf [(protection.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 603.302 m 103.037 603.302 l S 0.153 0.153 0.153 rg BT 61.016 584.464 Td /F4 9.0 Tf [(A spam filter assigns every message, received and sent, a spam )] TJ ET BT 61.016 573.475 Td /F4 9.0 Tf [(confidence level based on the likelihood that the message is )] TJ ET BT 61.016 562.486 Td /F4 9.0 Tf [(spam. Depending on its level an inbound message may be )] TJ ET BT 61.016 551.497 Td /F4 9.0 Tf [(relayed directly to the user's Junk Email folder. The filter looks at )] TJ ET BT 61.016 540.508 Td /F4 9.0 Tf [(certain criteria contained in the email it rates, for example too )] TJ ET BT 61.016 529.519 Td /F4 9.0 Tf [(many hyperlinks or a suspicious file attached. Tweaking the filter )] TJ ET BT 61.016 518.530 Td /F4 9.0 Tf [(can be tricky we don't want you to miss important emails, but at )] TJ ET BT 61.016 507.541 Td /F4 9.0 Tf [(the same time it's our responsibility to protect you and all our staff )] TJ ET BT 61.016 496.552 Td /F4 9.0 Tf [(from harmful attacks.)] TJ ET BT 61.016 476.563 Td /F4 9.0 Tf [(For this reason, it's important that you regularly look in your Junk )] TJ ET BT 61.016 465.574 Td /F4 9.0 Tf [(Email folder in case the spam filter might have relayed it there.)] TJ ET BT 61.016 445.585 Td /F4 9.0 Tf [(The main purpose of Microsoft Outlook's Junk Email Filter helps )] TJ ET BT 61.016 434.596 Td /F4 9.0 Tf [(is to reduce unwanted email messages in your Inbox. Junk email, )] TJ ET BT 61.016 423.607 Td /F4 9.0 Tf [(also known as spam, is moved by the filter away to the Junk )] TJ ET BT 61.016 412.618 Td /F4 9.0 Tf [(Email folder. This is done at an institutional level by Microsoft \(as )] TJ ET BT 61.016 401.629 Td /F4 9.0 Tf [(mentioned above\), but you can also flag or "un"flag messages from a person or company as Junk email.)] TJ ET 0.373 0.169 0.255 rg BT 61.016 381.640 Td /F4 9.0 Tf [(How to change your spam filter's preferences.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 380.489 m 243.806 380.489 l S BT 61.016 370.651 Td /F4 9.0 Tf [(How to tag an email as junk mail.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 369.500 m 193.064 369.500 l S BT 61.016 359.662 Td /F4 9.0 Tf [(How to report spam or junk email to Microsoft.)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 358.511 m 244.571 358.511 l S 0.153 0.153 0.153 rg BT 244.571 359.662 Td /F4 9.0 Tf [( \(downloadable PDF-document\))] TJ ET BT 61.016 339.673 Td /F4 9.0 Tf [(If you have any questions, please log a request on the )] TJ ET 0.373 0.169 0.255 rg BT 279.149 339.673 Td /F4 9.0 Tf [(ICT Partner Portal.)] TJ ET 0.18 w 0 J [ ] 0 d 279.149 338.522 m 354.173 338.522 l S 0.400 0.400 0.400 rg BT 61.016 321.184 Td /F2 9.0 Tf [(Posted in:E-mail,Notices,Tips | | With 0 comments)] TJ ET q 225.000 0 0 225.000 325.984 421.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 81.0227 614.6092 325.1297 623.7667 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/03/additional-microsoft-security-for-email-activated/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 603.6202 103.0367 612.7777 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://blogs.sun.ac.za/it/en/2020/03/additional-microsoft-security-for-email-activated/) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 380.8072 243.8057 389.9647 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (https://support.office.com/en-us/article/changing-the-level-of-protection-e89c12d8-9d61-4320-8c57-d982c8d52f6b) >> endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 369.8182 193.0637 378.9757 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (https://support.office.com/en-us/article/Video-Block-unwanted-mail-a3cda7e7-03ab-4188-9a9c-0f05e6a41e75) >> endobj 20 0 obj << /Type /Annot /Subtype /Link /A 21 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 358.8292 244.5707 367.9867 ] >> endobj 21 0 obj << /Type /Action /S /URI /URI (http://admin.sun.ac.za/Infoteg/dokumente/Report_junkmail.pdf) >> endobj 22 0 obj << /Type /Annot /Subtype /Link /A 23 0 R /Border [0 0 0] /H /I /Rect [ 279.1487 338.8402 354.1727 347.9977 ] >> endobj 23 0 obj << /Type /Action /S /URI /URI (http://servicedesk.sun.ac.za) >> endobj 24 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 7855>> stream JFIF,,ExifMM*C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,,"D !1A"Qaq2#5BRs6Sbr$&34Cc%t&!12AQ"qBRa ?R uh֏YdQ-n_m;.n=ܜ޾nSܠJ|wo>>\s""" """ """ """ """ """ """ ""lm.{Z7O8]4 k}_ϑ\󹐎]^|w;˓a;Xأ52Tc'wWUW i]^\ӇX;RmI$dv|A.0N,?hQUhnP&p98v.wSPm  0= e.վB Â`m)H[n]-7iBhh׌HAa""  }(mq={Ldw3Eh|22@-;;i_$m :[rg{=DYnr=z>>pb-SI%GuGzH+t)sv䪵Mq뺥|6@1 y^V;VQ\&tC2n޸#D#cgymZ.ofN\Ρ舢 7kUU+jOՖg85j-SHc8j^kE5C.Cp+׏ {xg'KFm*"#LָM#z|wp˭OS0!`$eVg<8`,)bX#کlOwtUH99/}ڗHh'MYz8LNw}ӗVԉCd/0v6+< 17 z*[ ܲtjM-TSs(+TGmF2؞`>^2v5kzK`{OY!\;LѷzlV&|{r״z"" """ """ """ "" 4 wS$AU ɤ2j}ўQ2=U霰{|6oY%N+89s$`8{ F|=+oNmNY*qN$˩.R~0)|k"cV>{Wu:_+UGUoa|' 2'ѹq.=5TOԒHl=jG[y:YQT6hGrmx>ʋ9iV<';_*gtދ?@K5猁汤XB湱C\Cs[xgn]1ßʴ/!Y \=; #o[ZUNJ3?=dעQFO #WMpvGaM*K6pd#q,VЏP>17.GxYp .,o<2+>Sn3\$X]SbU>J`bqf|qZ[P6#亂nϸ%c;41rFZ?==ߧf9VΘaT;cje!ɤJR^kM=:ݹMSqQ8pk9]XsNViI;f>7-xAue\ !ܶՂwseD@DDD@DDD@DDD@DD' VJm_.]|c/uY[\VҵQ 2(enq )M9;עq a SاsbWBbwt`.e%+g'g8' mU;?u)㥘:6y`YE|쬵2UO3'i9AgM/4 ښڗ"zK/ uqϓWӝhU$ c8ȎoSBa׶)$O q-WbS6\e彎P~BYmx7v]J 3[]AR%,;Р)Y4m9,A|oX'Y*˷߬|ۇ8sVeik+aXYUKG,w|zIvwQm穾x_XYn|H e7]acw? h=mM/8 nc yFFFOOj*_OSjM2ZN;mC$isCe}$drV3Gu;>+o_BRr@^GS8y(o|3SA΀Okn"+EEepa-c#أE$,hVwn\ї=0twS!&*inc' Ĩ+U. K 8d|qy1ӻ9f 26}MB7d/CjX੊ccËO5{XZᐩ@Whsw;{+\*3A ¬lP+P=m}{WYūg d$,H[2}{&'{Z0ҷ]XnT4Յ敷A+= ({iKVxUiBAxޭT10 G&gf?pߊFhGZ;VZOw5 ̢%20pwhzJttYVyܝ]=m#\;8fslVy2ϭ50tUc:9YcprF-+ LYJdF7 j2tR\঑DE|nY6x*|G* QǗ[k,w'淐!TF"AX_ڿZ҃Nbg?ڷi^iAn:F!U` 1GeoҚQ?S#끓Ug%U7Bxv+/i*ne|s7R@DDD@DDEoFlj]1_|G.kjϪ\wngrbG.gN+{{M-qi*x^al{{ji[4҃VҶiM(5M+'ap0ѡTfѼ+5*ژIJ=n8$0gX^B0Z*'޴E%E_"GwI%["4$-P+49ӿpxNț6+3] ˧ '\)i?F<_#˱k`ع96 DGj|۴ Ճ{`V]y:c-k7q }e h- )8p] gE}$qSkm*c-SCd\זU5[jKG";8ߐ\aS=f!JTf 8\+鄄apQ@DDD@QFIQFY/q;cۧ^A(=2hRjCopH^jMH0>_HZgw͟/۩_u4ӳ=*eO?H1zm録&wg|BũlmOkUt]H mO\*=I#WXaKn"zr[eªԲUkKDEpIy^9rwÆu8gJVC<xqw%j\;i(1<9mSč< 滷nf%U&|'I Oh_eKxwZA_p).T ,+tNTiH۫dtSAt_8$;qV]XpwqU 6Fzi{0>Čjh*cT:Va) Jm:6wY%r,<+~m=ƲeE۪Inv|aUj&Tgfc\={Z2I]rMJebL"퉄dxjSP|=hqX)(D`d-`1 6i {\BHZkMW; {Or6ݟ{-x\I|t4=LL`!7-ݽbv,I38Ij6vj*Y4o.S2Zqi]<텾:1miݻyNВ"T,SNl-o(Q4d5r(~(m6֌9,PDDD@^ajrZsObܮn dQK++ƌq5Ti*{i5 ))"xx-s{W^Ol ੗UAr tgO wLrO,Y^ 0V(gVշ3vpW^zG?9A׫;T#dݞ* > startxref 14748 %%EOF Notices « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Notices

Learning Technologies: How, what and where?

Thursday, August 8th, 2019

Over the years you may have heard many terms, including computer-assisted learning, e-learning, blended learning, and technology enabled learning, to name a few. The common denominator being learning. Educational Technologies/ Learning Technologies refers to the “broad range of communication, information, and related technologies that can be used to support learning, teaching and assessment.”[1] These also include the systems, networks and databases required to support the various forms of technology that are used by lecturers and students on a daily basis.

In the Stellenbosch University context, the support and delivery of effective Learning Technology Systems requires the collaborative effort of a number of individuals who work across Faculties and Support services. We realise that as a lecturer, administrative officer or student, what you really want to know is who to contact when you need help, and what the help is that you may ask for.

This collaborative team incorporates 4 levels of support and includes a range of services, systems and platforms including, but not limited to:

  1. The Learning Management System (SUNLearn)
  2. SUNStream
  3. Project management for new system development
  4. Microsoft Teams for educational purposes
  5. SUNOnline (the short course Learning Management System)
  6. Student feedback system
  7. E-Portfolios

[1] https://www.alt.ac.uk/about-alt/what-learning-technology

Level

Groups

Support type

Contact

0

Blended learning coordinator
Computer User Area Staff

  • Advisory / hands-on training for staff
  • Direct CUA support

Contact directly via email

1

 

Centre for Learning Technologies

  • Staff and student queries for Learning technologies via a support desk
  • Staff training for specific Learning Technologies
  • Training material development
  • Instructional design support

learn@sun.ac.za
021 808-2222

Student Feedback Office

  • Student feedback system

stv@sun.ac.za
021 808 3717

2

Academic ICT: Learning Technology Systems

  • Relationship management between Faculties and ICT
  • Project advice and management for learning technology projects in Faculties
  • Management of Learning Technology Systems
  • Advisory service

ICT Partner portal:
https://servicedesk.sun.ac.za

 

Short Course Division

  • SUNOnline, Short course applications, registration and payment

shortcourse@sun.ac.za

3

ICT Operations and Institutional Software Teams

  • Architecture, development, maintenance, security, priority incident management

ICT Partner Portal
https://servicedesk.sun.ac.za

Windows 10 upgrades currently ongoing

Thursday, August 8th, 2019

Information Technology’s support team identified computers on the university network which is running an outdated version of Windows 10 and could possibly pose a network security risk. To rectify the situation technicians will be performing an in-place upgrade of outdated computers to the latest stable version of Windows 10. Before we proceed with the upgrade, you will be sent an email to explain the situation, as well as a few minor instructions.

The upgrade will happen after hours @19h00 to minimise the impact it will have on your daily tasks, but you will always receive an email beforehand to notify you. For this reason we ask that you save and close all open documents and close all open software on your computer before you leave work in the afternoon. If you have a laptop, please secure it to your desk. 

The desktop/laptop will not need to come to IT for the upgrade since the upgrade will be initiated remotely. No data or software will be removed from the computer.

If you have any enquiries regarding this upgrade, please contact the IT Service Desk.

IT Emergency maintenance: Saturday, 13 July

Thursday, July 11th, 2019

Essential emergency maintenance will be taking place this Saturday, 13 July, from 07:00 to 12:00.

During this time a large number of functions and applications will temporarily be unavailable. This includes, among others, HR services, Financial services, Student information, SUNLearn, Short Courses and COB payments. Internet and email will not be impacted by this maintenance.

Due to the extent of this maintenance and the necessity for thorough testing of systems and applications the possibility exists for continued interruptions into the new week.

Please rest assured that we will try our best to limit interruptions to a minimum. For inquiries please contact the IT Service Desk at 021 808 4367 or log a request on the ICT Partner Portal.

Filesender – a secure service for sharing large files

Tuesday, February 5th, 2019

SANReN has implemented the latest version of Filesender, a web-based application that allows authenticated users to securely and easily send web-based large files to other users. 

Below are the guidelines for accessing the service and what values it adds to your day to day operations.

What problem does the service solve?

You need to send a file larger than a couple of megabytes to someone and the e-mail comes back: “attachment too big” or “mailbox too full”, that’s where FileSender comes in handy.

How do I use the service?

Upon logging in, you are presented with a user-friendly interface. You can set the file to be available for download for a certain period so that it automatically gets removed when the file reaches its expiry date. You have an option to drag and drop your file when uploading it to the application. You also have an option to get a link to the file after uploading it or send it to a recipient as an e-mail.

The service is integrated with the South African Identity Federation (https://safire.ac.za/), which provides a pool of institutions you can authenticate from to use the service. If your institution is not registered on SAFIRE as yet, you can log in with a social media account if you are from an eligible institution.

Where do I access the service?

You can access the service on https://filesender.sanren.ac.za

Drop us an e-mail on sysadmin@sanren.ac.za for any queries regarding the service.

Use of sun email for commercial purposes

Tuesday, February 5th, 2019

As staff and students of the University, we use our sun emails every day. But did you know that every year when you reactivate your account, you also agree to the Electronic Communication Policy? 

The ECP explains the acceptable and unacceptable use of the University’s electronic communication facilities, which include the internet and email. (read the full ECP policy here) According to the ECP, point 3.1.3: “The User shall be responsible for using the Facilities only for the purpose for which the User has been authorised.” 

IT facilities and resources are provided to advance the mission of the University. This includes learning, teaching, research, knowledge transfer, public outreach, the commercial activities of the University, or the administration necessary to support all of the above.

The email system is to be used for legitimate institutional purposes only, therefore the use of IT facilities for non-University commercial purposes, or for personal gain, is a violation of this policy.  You may not use the IT Facilities to advertise any trade, service or profession not endorsed by the University. 

Unfortunately, it’s come under our attention that some staff use their sun email address to distribute information regarding beauty products, Tupperware, etc. and acting as agent for the sale of these products. Any bulk unsolicited mail or commercial advertising of other businesses are not allowed on the University network.

If you need to send personal emails, rather consider getting a free email account, for example, Gmail. Separating your business and personal activities is also better security practice in the long run and will protect you and the University network. However, if you use your sun address for personal activities, keep in mind that the University owns any communication sent via email. If needed, University management has the right to access any material in your email or on your computer.  

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.