%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 15 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 14 0 R /I2 17 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250707090106+00'00') /ModDate (D:20250707090106+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4494 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 91.769 521.469 654.965 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 91.769 l 565.984 91.769 l 565.984 745.984 l f 45.266 746.734 m 45.266 91.769 l 46.016 91.769 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(MICROSOFT TEAMS PERFORMANCE TIPS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(June 07,2021)] TJ ET BT 160.079 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 174.587 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Many SU staff members have experienced lost connections during a Teams meeting or sometimes have technical glitches )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(such as poor or broken voice connections. With this short article, we provide some tips to ensure that your next Teams )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(meeting has minimum disruptions. The tips are split into three categories:)] TJ ET BT 78.360 595.469 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 595.453 Td /F4 9.0 Tf [(Good practices)] TJ ET BT 78.360 584.480 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 584.464 Td /F4 9.0 Tf [(Preparing for a trouble-free meeting)] TJ ET BT 78.360 573.491 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 573.475 Td /F4 9.0 Tf [(Steps to take if you experience a poor connection)] TJ ET BT 61.016 553.486 Td /F1 9.0 Tf [(The good practices include:)] TJ ET BT 78.360 533.513 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 533.497 Td /F4 9.0 Tf [(Regularly shut down and restart your PC at least once a day. The shut down and restart cleans the PC of )] TJ ET BT 91.016 522.508 Td /F4 9.0 Tf [(processes taking up resources. A good habit is to shut down at the end of the workday, and start fresh in the )] TJ ET BT 91.016 511.519 Td /F4 9.0 Tf [(morning.)] TJ ET BT 78.360 500.546 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 500.530 Td /F4 9.0 Tf [(Regularly run updates, ensuring that the operating system and applications are up to date. This should happen )] TJ ET BT 91.016 489.541 Td /F4 9.0 Tf [(almost automatically on University owned PCs.)] TJ ET BT 78.360 478.568 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 478.552 Td /F4 9.0 Tf [(Regularly run virus checks.)] TJ ET BT 61.016 458.563 Td /F1 9.0 Tf [(Preparing for a trouble-free meeting - especially important if you are the host or presenter for a meeting:)] TJ ET BT 78.360 438.590 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 438.574 Td /F4 9.0 Tf [(Close all unnecessary applications.)] TJ ET BT 78.360 427.601 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 427.585 Td /F4 9.0 Tf [(Test if you have sufficient Internet bandwidth available. You can do this by running an Internet bandwidth test at )] TJ ET 0.373 0.169 0.255 rg BT 91.016 416.596 Td /F4 9.0 Tf [(Speedtest by Ookla - The Global Broadband Speed Test)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 91.016 415.445 m 316.637 415.445 l S 0.153 0.153 0.153 rg BT 316.637 416.596 Td /F4 9.0 Tf [(. )] TJ ET BT 91.016 405.607 Td /F4 9.0 Tf [(For voice only and sharing images you need less than one MB/second. For sharing applications and using your )] TJ ET BT 91.016 394.618 Td /F4 9.0 Tf [(webcam, you need between 1 and 2 MB/s. )] TJ ET BT 91.016 383.629 Td /F4 9.0 Tf [(For video you preferably need 2 MB/s.)] TJ ET BT 78.360 372.656 Td /F4 9.0 Tf [(3.)] TJ ET BT 91.016 372.640 Td /F4 9.0 Tf [(Test if your PC has sufficient resources.)] TJ ET BT 91.016 361.651 Td /F4 9.0 Tf [(For Windows 10 press Ctrl + Shift + Esc. )] TJ ET BT 91.016 350.662 Td /F4 9.0 Tf [(For a Mac the equivalent is the Activity Monitor: Press Command+Spacebar to get the Spotlight search field.)] TJ ET BT 91.016 339.673 Td /F4 9.0 Tf [(Start typing Activity Monitor. )] TJ ET BT 91.016 328.684 Td /F4 9.0 Tf [(The CPU usage percentage should be under 50% and memory usage below 60% before you start MS Teams.)] TJ ET BT 78.360 317.711 Td /F4 9.0 Tf [(4.)] TJ ET BT 91.016 317.695 Td /F4 9.0 Tf [(If your MS Teams app was open before a meeting, quit and start MS Teams again at least 10 minutes before your )] TJ ET BT 91.016 306.706 Td /F4 9.0 Tf [(meeting.)] TJ ET BT 91.016 295.717 Td /F4 9.0 Tf [(To do this right click the Teams icon on the task bar and Quit, then start again.)] TJ ET q 149.250 0 0 183.750 61.016 100.769 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 91.0157 415.7632 316.6367 424.9207 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www.speedtest.net/) >> endobj 14 0 obj << /Type /XObject /Subtype /Image /Width 199 /Height 245 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 18054>> stream Adobed  !1AQaq"2BR b#3r$%!1"QaAq2B ? .N.JwȿA_䅰A!thsw^:9E7^E@/4#8?7*g΁erSsG@MU {d@Iq;E Qn0 qR(6JY2 tCHql t$aZK=Y;h6@Xy r-F6Ky&\$ed=A7aWn|_AY.0G;#@D$|'D]KUN+\DA9 HjmkݰvLC&U:Lޔ8i eUՊ~~暦1!^D<~ /wNW% aY]K!#rz6m>5q+bU1-:r}-5Е9h^1 n@}"ot$4ph% =J?bR],pG {p4H<,Ӑ 7 PP\ q*؄=ʪ<4E k'@4]8al4 ^W%4 dUſ@͔^䪖R@'UHܩ΂NJ% [@pFP@.99T(xD@T}4?ȹE)A]WɄh2dy>bXCXKadfL7f)Dz'ҳ,20eSz,5PѺrg0ra%p:@,"nd%-DMDk[l;eZ}uK.}'!ڕب#%JzC ;t=4b̂U,jckÂma ,) lbr2|vMD<S-0,зsȸ, d3k8*.k;h~)p#m :BK߱ƂYP2;9L+ݒӒȹ[D4 otTą\Ƃ T'!>V#\e8Tdl&O2tMc :q{ (kbd$|[A ')͔Pp4 I ?5t,_h>!ۥc@ɲ*B SsJ,4 @WN~]t)^W'mʓsk5[} $.nP.qŀc?t (! z{o >Dn{[خhPV[8M{:EQ8 9h);4S"['%/>-I!_gI>W(V䕜- NN"ȩYcy$_QS`˗P3?'G?Dvw$O{c} Bj>GXd8 h#d)MVEШ#[$'-`l[rAMTN>/Ͼ#|[! AxWf'1uWiFW0mi?H8N4[w.RI$?o}1wua1ӗ>;|_>-hn5O~5?'75N;k?kGu7ZZ*z{t栟"fy[lQM~!A=,2e]':?5uc,8:DVϕsr_7+$׼ͭigPO'TORӓ8-AOM`' Թ2iԪ-|i/ᇮ[1U)[u6&*>3z򰀭G0*$htYSDAD>.Gm\LMrB&==./.m[lA͐hr6` dȷ˾*7>^ u t >`{4`E9FSn]A>PN䒷>1 @B"t*Ą}@,Eӌ?m[ x/T9FQO@/PBPo)`oh"-ud( >"q`t'Dd/?M0$q͈tExN|@mbF4HR-IM[X#F2sy.ȈYEB@x$/$8 .|_Ay%gJu\S} =$tq8I @cA'j"\: 3ao?<@%|s}t(# sYOCv4\SL@`6\z2OHk읖*Ha EMo?HzY#_ 2=a8'S9dDABBay˷Nľr=ZQ[!jN*m oZNIXSQtƘ6ʜfL=؉{Oh٣ 眒Zu;Ȝ=eDu'|9CK>x(nܼ -R!IUo5*%'[9IeB'3; 5EXE@*Z>[4E2T,1F4MLq=nbDIJ u ;&ד7Y:>U3Ѳ8׮r<@-zg@mF*x ."jɭ/\Ⱦ`t{}J:ØW6LfM[mGmmW'Rjo$}WZ ?nYNihIy3?] K4ulX-Ҟ{3Q;'ک^OӉlE󺂞N8eM.S7 e-9v?eLTb=}S<96;`h("ָ 8 ů`Đ :P D z2&J.>DD2ؓvMYkh.GO`W련l\q@$[>[~.W(ٺ9Lk m4.b\t4e9aIQ2}تvzSb4US(_ZӍڡfu=9cnc@HU03J_xk-o ؙq-Jم.t4Z #KX^zyA|`'\zJs$.pEpP ͔ hnE@*xEF=< o@@SI…9:*` ^_>nnNTتb% 2@""'e p!0Jde:B\Y P9p2.G#@vy]b5[p5sAxuD΀lHE[sƂ@(9S%0Ef7ݴ EH}  rmt)(="cA]pN`Vtp8AA{-D*A6@RM9#$~UU ͳ#_#Pwx&R4N@K4@UY $3 Ҍ2TXԛc;ܙ$Hds͎W'FN&ۗ*⤉ H-G wa]r:ose;6BȢe5e@ꐖTA<{Q-{MRMDGQK)@Vdo}C$Y+{Ȅh` m _tHAtON’2m MQ&eA~td^2p ln.@ =ALgVi[7N%nh;H07{]X%QO~boNT[=Q1`e[FVo)8e&{+2D3oaHbOVuq G^n%}joNL(9DtST^7:$T ټix9sGy!CMS2>vM92qP¹e7Yv/[meZ h:!ߏJ0ꂷ():ƛjzžٙdw$$LQk9 rg18U0̡Op3ظȐo:*gG;$U|l^}X\mlΛg-/ QJ1rY1:W$N&t=HșjV5|_2z}3i O-5:GZ^gqNZ~Zt-kzi6{o(ԞwOUҽڭm] O%(Y.gĉ,tDX$mmY1I9UԱ{*S \9:q"9,2㷑@BC=inYe,׎S nou>4sdBbvT%4 WE:qdK#JWPR­B {M@.?HKe:M]2H`PexK#r*.A#@ELw|E:eKO[v)/X~K 4;taCCH|b"׽‹~%JMǶ.,zx!{=Ag@_[r[SW-e t ؔ+ ! *t]Kf:U~t RdmY@. 4 rpOCd6 6Dk+4"eN=΀!@YIs2?#>Z HtC,i*&k)9JS4]K_DBƼ)[PnX|_!NoiT4F$QUH a6)t/xQLӳ)+H"!T\&.l ٹ$e@( C̄E1rH u8l/ |(HiP㓃` ] |%| mrrϹk@[AǍ@7(^p ]/͐h"m`}2n|]W@6%%{"A6rPZ+: J QpI#΀ !*},G&]|[؞|@O8\ X?B!KomT>/IN\bb.(!GNizuS+T楖ΥPc]RNv; AJkm; U10j"Rbi;pꚊe#CKyh_")5 @A4Ӥz~K?c[:gxMOV=Z sPmsG鏫gTtɇT(| H۪:pW1ugB0v1eS/bmoxh}*荚" %~ 轲q '&om:jV0r a(?Lw}[,BӬ䦄ۭ$5J%j(cGR|ci]B3e;tQKԕ/ơ%zmܖ}ёӔfN \c)&Ԝؘ:r_=ej:UQb%Q1̥-/'ayKa^2_bGCot7"n$ YE΁"=͇Hs 4 J@4Lߔd*S7!؄Jf_<}fRl:^CD{ -B*܇&Z'{OT=O)JZ̢Q:vJu0;/^ƚ t,4,鯁Z,i= m(n2,3a]L4]gj-2]-2!Pm$0.V@0ř` %$Bmd!6+pl S4 A %>7 ~ +P) <*K]R/(>ZL6AlXhGxumiU-0|x{&=^" NlHPT%-R(ة^ dàP(g@V`&Ƞ!sTh ,?W@X(v0tĀ=(:9 _ƂH@nI2>ZM ;4TB Q~-ਸ<[ArL"a}{ KLAJt y WƂlyY>k|sAP[w,WKx=@+(rU %ʹ(T{7Ӟ=S@TKB@N;tѲݷVC?imn*_@1!)ꡆB6Qy[ Fj@3Qsbk9dA{\aG7RSPT2 Y}O㞼mA^6h&ZcZմ/lT dPqQep^vD/潂\EϹ ־*H$V켕9ƂM&c$Vd"w hapyZN &t p&"*t S(_A<Jn;2YZ=ٙ, S֪=uQn\^Ҳf!Q4MK%0츗ǭ?v+޻ &QmVв]GI 1,֕5!\Ҳ9*I/j hЙ=iۈهpX dDC>{xwr|~ l4aAd,[ S|TDmh ˜nDS=˘n>GDi mWSNdy<-D[ÙaيyX曇2*nIU)At@nwݺAtJ,˷ L^[Q-:}7注yl$Lc4aҘhD9 Xu.en˷` =EƂ/H(PO(9:Ң*QO-hH d ] Sk$۸.\rnoʔ=h|PS=X &o`SA+7+d4 (6R !Wm{E6w ,<D(,nmbo| Bh E*AYvL Ŋ4@"cY r-WDKƁ\^'hpBKR(39.D@U-"8>r~ l-ox+@llx&~' ߷Ps'@`2T*_]Rn~'}tP h@Pݼ~UI;.4'nōmAP'ab#@y Z]%Es`@'E~qE(P ΁T*4f#I)k 9@ r0/b<$ %RhP8NB (PN! G *7b,a{܄QLpThPM{*1k{!Rq:\.{+L|\oP=7'!T(A!>Z>@!qtʹ RdB  &P[@)_976h 't'ܠ;pm:H)kXg" \Sp1AKح=}+'S)< 2i6D@:n*:6)Gp΃O^iMvR5kIk6s:qhuXSWN:kXdr-;=>}^S/7T}5g;8<|8(*_&\x[998iݯ~?Xĉ)U=5&~bNca٤O1((WøxfC MtܴZ$y/g0Ý= Ǜ&)9f^bߍ|)31?w%]%ݽ(e1$)[VrLJdT|6zkn Pr1l6kg!mvgxܙUa2:Y ORo~͗lVB_H_To) qMhsXS6"A V2ڥ;@02c{`:Jv:TV2MعDۭtę݆ۄt:F/ICHxEzd\]m59vO ʭoQTg'@S9KLMXo|򉃣>L_RU#TIܺ+Y(nO,)q}-/ @2Oe#;/3K 6mSۭU*.PEW!jf2a8%OLK#(rP-Fۺa1їɣ)0ЍKjyNvq7*c &d$D=I1Ƽ1qD~0Oг's(6JWfG qcS:*'jdFi:nG*(b҉8 0i1.]",nqT }t"@P>IEKe*G2 SkvV[Psƀ@5`[)9T8 bւ@RD B$n|H$]^l(ApTꎜCdO]Czftq,EĻh ]Ӟ'Ss.u+5UZMmR՝Gb&50qprN'1U:?j!ӈ,9tB@KݹC::a@N_}a۷+''m}ZR+5mQQQ1mrqQ/Zu ]Côh;cVAD/N7 y ܁@`!^@]zlp[RJP%`>Gr14'JV`\44ђr24XC|A=׋6$ZU=!IKfGk*kwn6ve>=VZq"SoH o8|LHKvPuv7NS.(:k`p=?HvB+aNL)AUJCO0Cka3MNjfE44q.Y<hb6L?9D|)#1S(YsqCZtgfMͧ+qI^I2TDGñN T/DSg%aܾmbǍt]*{DCBT?8jEQOjWNLQqpUFn\t񦥑Q#Èg!"0E4[TT5lSu=~-0w${/7 ^% Zu$z&M¼F\Iz XS]+,ncm4cMFrlѳJ}ԑ\4VM#%qsW0.XtQfP fpPId!+DzimV>[-mOa<,Zah><@ ,A9E[-Z)t{ \..P/ eD@=Fx!E' @͓(䌨+Bҹ(>V@!@@eA$=VR-{po΂A u. _R(T tߟc:0{J+϶?ᒥЏ8(mM5\Euƃi&})DG 78zb*9x!rw&ё{\RUD]QT}Y>Hg;ϥsɴ:>"6q.}Q-Kd_Al&s/xØDo^>WaOa DðL4 P؝aFn-{YĢٻsb7& 5<܊{v ,y `ꗂp,.qL=J6o"YmsvwJQT\)1-MyS^KtE1##ɔ(knvӧ2[\>ajHʾW0Q0k=+'m0۪E$$3Zb+nd90j>?j|߷ټVU3(ձ [tuASMm'/NkjFs2/E°oޙprzu]T VLJfaYn6[XIu]M>v?-Ν2a$6=zCQ;aܱa۶a,IV ==+" d",ST!y;" ŭHSh:I̓Gmb@TʹgdËR{Ys;{e?+s $%{M6 d 5^ r}UH7773\e@!߂j3E(GSwTJ;x \srt@eض5 ktQ\HO@eK u!"/ؑEBmC@+'濙<tPl%t[{h%PXZonA% kd{'7]:AXy':)A9ReBxз7(АUl]nC4P=AB:Bdc{[؄a( ,O${]`cL'~l,_7B+fE6'EMvuKW]a)̀MmngD>q{1.D5u;28ѻF`"'of_8b6툨s (' ؘjVp3b27x()$;>M"B!_HY KNZ~-6nXBLD<P6ZzJ]RUsqrh  h>m}E̻S\[/XzKnM8X$R&Q\c )^~'fi صi] u2:J<G=YO[9fK3ij> :fq2LKD}f Y.h7&U='QB:R&1 7PMDurJ<|߲%@[rDBm32)Uc1_LS$U}8%I[K DՇn6l:GYnM 12 3Vl:M>nM'lź} F?} ~tul|QPq .y  %/;|᧐ܽe2L4AYh܊7+qk|6nGBfAe67t(T#?_R`)nR]7!tU8 |m7''Q[!<3r!Rxkq{|6lzM=M4Cb xM&vRI%%만D8LZ#'ṭet۷NᇏʙH⛅ <m5#ޣ~=TGQT/jL򣔚Hv;WL󷛃۩4Axa"][-2MHnu;p76pNʾyRxIJ>5r3톜I$8u ;(!xx;w}U(HB!qlL5|dL/vLCa Xp~E8"ġ@E$h$T!sň?eo}*!Y~t_̕7c)p`Qoy&nRW)];U!*h J{>h H[' Io w0ꋜwn3[Th7Jte<{ 2nE'1"}8xos\2FPWAI1l= endstream endobj 15 0 obj << /Type /Page /Parent 3 0 R /Contents 16 0 R >> endobj 16 0 obj << /Length 2440 >> stream 0.153 0.153 0.153 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 280.888 521.469 477.096 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 280.888 m 566.734 280.888 l 565.984 281.638 l 46.016 281.638 l f 566.734 757.984 m 566.734 280.888 l 565.984 281.638 l 565.984 757.984 l f 45.266 757.984 m 45.266 280.888 l 46.016 281.638 l 46.016 757.984 l f 61.016 296.638 m 550.984 296.638 l 550.984 297.388 l 61.016 297.388 l f 0.153 0.153 0.153 rg BT 61.016 740.193 Td /F4 9.0 Tf [(5. If you share your Internet with other users \(e.g. at home\), ensure that the others know and do not hog the Internet )] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(connection. \(e.g. do not play video, stream content, run updates\).)] TJ ET BT 61.016 718.215 Td /F4 9.0 Tf [(Turn the camera off and use audio only if the speed test or PC resources tests did show limitations.)] TJ ET BT 61.016 698.226 Td /F4 9.0 Tf [(6. If you are the host or presenter and have doubts about your Internet connection, rather work from your office on campus )] TJ ET BT 61.016 687.237 Td /F4 9.0 Tf [(where you are unlikely to run into limitations. Use Ethernet \(a cable connection to your router\) rather than Wi-Fi if you have )] TJ ET BT 61.016 676.248 Td /F4 9.0 Tf [(Ethernet available.)] TJ ET BT 61.016 656.259 Td /F4 9.0 Tf [(7. Have a second device with Microsoft Teams as a standby, e.g. a mobile phone with an LTE data connection. Practice )] TJ ET BT 61.016 645.270 Td /F4 9.0 Tf [(switching devices so that you are familiar with how it works before you host a meeting.)] TJ ET BT 61.016 625.281 Td /F1 9.0 Tf [(Steps to take if you experience a poor connection:)] TJ ET BT 78.360 605.308 Td /F4 9.0 Tf [(1.)] TJ ET BT 91.016 605.292 Td /F4 9.0 Tf [(Turn the camera off if it was on.)] TJ ET BT 78.360 594.319 Td /F4 9.0 Tf [(2.)] TJ ET BT 91.016 594.303 Td /F4 9.0 Tf [(Turn off incoming video: \(last item under the three dots menu\).)] TJ ET BT 91.016 583.314 Td /F4 9.0 Tf [(You will still be able to see shared screens and comments.)] TJ ET q 129.000 0 0 225.000 61.016 347.116 cm /I2 Do Q BT 61.016 329.325 Td /F4 9.0 Tf [(3. Switch to another device as a last resort, for example MS Teams on your mobile phone or tablet.)] TJ ET 0.400 0.400 0.400 rg BT 61.016 310.836 Td /F2 9.0 Tf [(Posted in:Communication,News,Tips,Training | | With 0 comments)] TJ ET endstream endobj 17 0 obj << /Type /XObject /Subtype /Image /Width 172 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 5993>> stream JFIFC    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,A!12AQqSa"BRTs#35$bdr/!RSaQ12"4qr ?_+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?+?tLaa|6 oSAUG^٭v/5"慲N sV#A +q0(**gm7AH\H%̈́b4:Y*HACn:6At66 y hN\O nj>0bsAp#RCAa-1Ҙ!PW-p b"5-El킖 g1;Y  S YصM,Un~b[셁TWxӖ5aËEqJ+ #|p1͍\Xf-P3l7>S("b5l*HhZoѓhh@A?d{M>j1)`Jw׺ ssAUTSF衒B? öow:q fg - eߴ>kejP3 hus|o;~~~gUgΨ#:x3Ψ#:x3 44V=^7c9X]n=kq>OhSk4(1lF6- Xn T uf])RXwL|iP>](Z-?뿖euO2:AQ6xKA`qm=M~8br5*Xf5-K)a|I&RHXVLRKRȡnc,ִo"=i p͐0Y ; RL2,DNas.z}Īil5C$AMPˇTy85n4">k@P.zM|gYh,pds8-ptd\~Md$-6sÿ(=Jχ,=؃U6: qsXIԒY _*/_Ոÿ WbU|⪺vHME *A s[@O@N&RN GL/xNam 'Xmo5"[l9]s-= @@@@@@@@A"ݐzL#>r|,wn(8 ZؕMa1<ۃm,èZsqjuU3PGFvmk|AA)o`.}ݐyr$Qq {IkID5Ťn ؄:i^,^P4A!#=\PhoPa.7vAjبC\yZna&k^#IIS[쑄͙\ }Z)RSX+l ٚ#lli (`^o٦bX%11f /F6A=< @G潷t+j~ZIIC43"q$w}R @@@@@@@@A"ݐ^3((ڴt: MVWAN4BG{\0mA} sh'~v1౥m6c-Emqq{ sch..`IQg1`8PN56$=ѽiA A(˅4A 6a\mmG1zbUtՎg2ļoz j :S}AvUfX o ?iq8ev_6kr: I`2: QQ%TO3I![yAcܠ \ntJ2i㨖ϙlQn@믶O l*,ѯ˥0 *f103Fc뛑˒ > G8/ 68_K{ČF3Sw\:| v |kc " A(&[ub5fbbbbbboPa.7vAwAM_l8(Pê<䴍htf:W2wN\B=WM$C3_h+HwdG312Ge#ˋr71mPZ\Ѽ@Tr$QqKE笧|ulC~]jmƫ1s쑍6#3r\MDp)!vakuid;A CۂC@XCl~k4K ?hFXn] r A(^BBBBBBBBBBB A(kjYl6N#H&/avA4pAq&ɲ107}۽kHctcs;RԏVTucܠ \n L$\I$rNAE` @@@dacܠ \nIMP:ZgJK-A,f1qQM |Qr'oAhgfY=-fm7)$^j:x^*=ο>V%M,2C9 8ZZWgMaÙ$7yc7 {>3z@Ѿ L{ }Kd8X|q"s^6 Sb%ϩN` @I НU |,(3kCA[Oq~H*V? E/ J_3 E;r |اxl|tf73i[4@3Tó@q)!sEH7pEbS2 :60!8S:)\Ƿ-Ü76:{asL"-l4;&0qD/A[#Nj9: @@@@@@@@A"ݐ[tqxP泘cdeA5^+;t;v~3cg-`Fm01l@1eq.pͼr_c+gk\\H"s@n/6gDs#qA"m1fcCA{dk6w $GI#\+Hwd~˙O1o^.\WNKvó0h@9MJ㝖-%s(!Rj#a5kݴ{6L{O2?r&KI6#6Srnn@qAK'c 9YŠ{ r$QqNH%((((((((((+_HwdT"F)_{}]DF3c h:vA:M3gH pfb73('pM5 uS5qn>f?+JÙJp>[ܨ[Fe76ټ*0o%$ikWL駪kp,9t yOZgOZxl?/c"43^dSF=f}KdžYC2)#K] >%|Hes;1o<FE>$ika/>_/M꣥ Y$ s4"쥕évH }GGQbuA#<ؚr=$Lo6i6v>J8i5wc{ )6z:JR樑  \?El6)#u+vX뗐6r8ILi6 Ӧ{_6a85PUOE)f or7OtjpݘsbtXc497kw ^d!"م6AcܠU,x%(]BS|tƱrWf?O=_~M:~M:~M:~M:~M:/ix</ix<'ix</ix<'ixB9Ķ7zڧ3l}9R endstream endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000350 00000 n 0000000387 00000 n 0000000525 00000 n 0000000607 00000 n 0000005153 00000 n 0000005265 00000 n 0000005380 00000 n 0000005500 00000 n 0000005608 00000 n 0000005735 00000 n 0000005813 00000 n 0000024036 00000 n 0000024101 00000 n 0000026594 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 32755 %%EOF Training « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Training

Computer Literacy and Digital Literacy – not the same thing

Wednesday, June 7th, 2023

Computer and Digital Literacy are two separate things, but they go together. For us to be effective, responsible technology users, we need to have both. In this article we explore the difference between these two concepts, and why it is important to develop digital literacy skills.

What is computer literacy?

Computer literacy is defined as the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from elementary use to computer programming and advanced problem solving. Those who are computer literate have the ability to perform basic tasks on the computer. For example, switching on your computer, knowing how to access the internet, navigating a browser, and operating software systems, and completing any other tasks that make it possible to do your job.

What is digital literacy?

Digital literacy is the ability to navigate our digital environment using reading, writing, critical thinking and technical skills. It’s about using technological devices such as a smartphone, laptop or tablet, to find, evaluate and communicate information. So, digital literacy goes beyond computer literacy because it gives individuals the power to connect around the world. 

Why is digital literacy important?

Digital literacy skills are essential for participating in the modern economy. Digital literacy can play a powerful role in helping people connect, learn, engage with their community, and create more promising futures. Simply reading articles online does not address digital literacy, so it is important for everyone to understand the variety of content and possibilities that are accessible online.

  • Efficient Communication: Digital literacy improves communication that creates a more efficient workflow. It allows employees to communicate with each other through various platforms, such as email, instant messaging, video conferencing, and social media.
  • Enhances Problem-Solving Skills: With digital literacy, employees can access vast amounts of information through the internet, which allows them to research solutions to complex problems, find relevant data, and make informed decisions.
  • Increases Efficiency: Digital tools such as automation, online collaboration platforms, and project management software can increase efficiency in the workplace.
  • Improves Creativity: Digital literacy can also foster creativity in employees by providing access to various digital tools that can unleash their creative potential and produce high-quality content.
  • Better Time Management: Digital literacy can help employees manage their time more effectively.
  • Online Security: Digital literacy skills help individuals understand the importance of securing their online information and the potential risks of cyber-attacks.
  • Artificial Intelligence (AI): Digital literacy skills are crucial for leveraging AI’s benefits.
  • Big Data: Digital literacy skills have become essential for individuals to interpret and analyse vast amounts of data effectively.
  • Social Media: Digital literacy skills are essential for using social media safely and responsibly. It enables individuals to identify potential risks associated with social media.

Start your digital literacy pathway

With the Microsoft Digital Literacy classes, you can gain skills needed to effectively explore the internet. 

Sources:

YOTTABYTE

LinkedIn

Microsoft

Futurelab

SU IT Digital Literacy in a nutshell

Information Security Awareness Training

Tuesday, October 5th, 2021

Part of living in a connected world is understanding that our private information is more vulnerable. ID theft and data breaches are no longer isolated incidents, they happen every single day.

So why would a university be targeted?

Universities hold a great deal of information that could be exploited if it gets into the wrong hands. This information includes personal details and research data.

Consequences and why it matters:

Though not all data security incidents will lead to the loss or theft of information, they will expose information to unwanted risk.

A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious incident. Any data security incident could potentially be disastrous for both you and the institution.

In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by no means a programme that you will need to have a pass record. This course is strictly informational so that you will have the necessary tools when it comes to Information Security.

To access the course, go to https://learn.sun.ac.za. When the SUNLearn main page opens, click on the “Information Security Awareness Training” link and log in with your network username and password. If you’re successfully logged in, scroll down and click on the “Enrol me” button to enrol yourself for the course and to access the training material.

If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and active, please log a request via https://learnhelp.sun.ac.za for SUNLearn support.

 

 

 

 

 

Why is cyber security important?

Tuesday, October 5th, 2021

Cyber security is the skill and ability of protecting networks, devices, and data from unlawful access or criminal use and the practice of guaranteeing confidentiality, integrity, and availability of information.

Communication, transportation, shopping, and medicine are just some of the things that rely on computers systems and the Internet now. Much of your personal information is stored either on your computer, smartphone, tablet or possibly on someone else’s system. Knowing how to protect the information that you have stored is of high importance not just for an individual but for an organisation and those in it.

Did you know that:

  • As of 2021, there is a ransomware attack every 11 seconds, up from 39 seconds in 20191,2
  • 43% of cyber-attacks target of small businesses, and they have grown 400 percent since the outbreak began

More tips and resources can be found here

The US government’s Cybersecurity and Infrastructure Security Agency has made a collection of tip sheets available for use. These downloadable PDF documents contain all the information you need to protect yourself from cyber security risks in a convenient, compact format. 

More tips and resources can be found here

[SOURCE:  Cybersecurity and Infrastructure Security Agency, United States Government

Extra layer of security added to campus computers

Monday, August 2nd, 2021

Cyber crime is a constantly evolving field. Even though the majority of viruses were created as pranks, it’s essential to stay informed of the various risks that exist on the internet if you want to stay safe online. Here’s a breakdown of the basics: 

Malware, or malicious software, is a catch-all term for any type of malicious computer program. Malware is the most common type of online threat.

Ransomware is an emerging form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access.

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.

The world of cyber crime is very similar to that of technology. Every year, new trends, breakthroughs, and tools emerge.

You’ve probably noticed a Malwarebytes Threat Scan icon on your desktop or laptop (Figure 1). Don’t worry, this isn’t a brand-new type of malware. Stellenbosch University’s IT department has added an extra layer of security to campus computers.

Figure 1

Malwarebytes Incident Response is the trusted standard in automated endpoint remediation. Unfortunately, with the current environment, some malware will return after removal and Malwarebytes will prompt you to initiate a restart (Figure 2).

Figure 2

This is because the malware will sync to your browsers profile and will be synced back to your device after it has been removed.  If you are experiencing such daily prompts for restarts by Malwarebytes, we suggest that you log a request on the ICT Partner Portal for a technician to assist with further remediation.

[ARTICLE BY BRADLEY VAN DER VENTER]

Microsoft Teams performance tips

Tuesday, July 6th, 2021

Many SU staff members have experienced lost connections during a Teams meeting or sometimes have technical glitches such as poor or broken voice connections. With this short article, we provide some tips to ensure that your next Teams meeting has minimum disruptions. The tips are split into three categories:

  1. Good practices
  2. Preparing for a trouble-free meeting
  3. Steps to take if you experience a poor connection

The good practices include:

  1. Regularly shut down and restart your PC – at least once a day. The shut down and restart cleans the PC of processes taking up resources. A good habit is to shut down at the end of the workday, and start fresh in the morning.
  2. Regularly run updates, ensuring that the operating system and applications are up to date. This should happen almost automatically on University owned PCs.
  3. Regularly run virus checks.

Preparing for a trouble-free meeting – especially important if you are the host or presenter for a meeting:

  1. Close all unnecessary applications.
  2. Test if you have sufficient Internet bandwidth available. You can do this by running an Internet bandwidth test at Speedtest by Ookla – The Global Broadband Speed Test.
    For voice only and sharing images you need less than one MB/second. For sharing applications and using your webcam, you need between 1 and 2 MB/s.
    For video you preferably need 2 MB/s.
  3. Test if your PC has sufficient resources.
    For Windows 10 press Ctrl + Shift + Esc.
    For a Mac the equivalent is the Activity Monitor: Press Command+Spacebar to get the Spotlight search field. 
    Start typing “Activity Monitor.”
    The CPU usage percentage should be under 50% and memory usage below 60% before you start MS Teams.
  4. If your MS Teams app was open before a meeting, quit and start MS Teams again at least 10 minutes before your meeting.
    To do this right click the Teams icon on the task bar and Quit, then start again.

5. If you share your Internet with other users (e.g. at home), ensure that the others know and do not hog the Internet connection. (e.g. do not play video, stream content, run updates).
Turn the camera off and use audio only if  the speed test or PC resources tests did show limitations.

6. If you are the host or presenter and have doubts about your Internet connection, rather work from your office on campus where you are unlikely to run into limitations. Use Ethernet (a cable connection to your router) rather than Wi-Fi if you have Ethernet available.

7. Have a second device with Microsoft Teams as a standby, e.g. a mobile phone with an LTE data connection. Practice switching devices so that you are familiar with how it works before you host a meeting.

Steps to take if you experience a poor connection:

  1. Turn the camera off if it was on.
  2. Turn off incoming video: (last item under the three dots menu).
    You will still be able to see shared screens and comments.

3. Switch to another device as a last resort, for example MS Teams on your mobile phone or tablet.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.