%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250712181046+00'00') /ModDate (D:20250712181046+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4137 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 195.458 521.469 551.276 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 195.833 520.719 550.526 re S 0.773 0.773 0.773 rg 61.016 211.208 m 550.984 211.208 l 550.984 211.958 l 61.016 211.958 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(INFORMATION SECURITY AWARENESS TRAINING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Part of living in a connected world is understanding that our )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(private information is more vulnerable. ID theft and data breaches )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(are no longer isolated incidents, they happen every single day.)] TJ ET BT 61.016 595.453 Td /F1 9.0 Tf [(So why would a university be targeted?)] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(Universities hold a great deal of information that could be )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(exploited if it gets into the wrong hands. This information includes )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(personal details and research data.)] TJ ET BT 61.016 533.497 Td /F1 9.0 Tf [(Consequences and why it matters:)] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(Though not all data security incidents will lead to the loss or theft )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(of information, they will expose information to unwanted risk.)] TJ ET BT 61.016 480.730 Td /F4 9.0 Tf [(A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious )] TJ ET BT 61.016 469.741 Td /F4 9.0 Tf [(incident. Any data security incident could potentially be disastrous for both you and the institution.)] TJ ET BT 61.016 449.752 Td /F4 9.0 Tf [(In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information )] TJ ET BT 61.016 438.763 Td /F4 9.0 Tf [(Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by )] TJ ET BT 61.016 427.774 Td /F4 9.0 Tf [(no means a programme that you will need to have a pass record. This course is strictly informational so that you will have )] TJ ET BT 61.016 416.785 Td /F4 9.0 Tf [(the necessary tools when it comes to Information Security.)] TJ ET BT 61.016 396.796 Td /F4 9.0 Tf [(To access the course, go to)] TJ ET 0.373 0.169 0.255 rg BT 174.074 396.796 Td /F4 9.0 Tf [(https://learn.sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 174.074 395.645 m 262.121 395.645 l S 0.153 0.153 0.153 rg BT 262.121 396.796 Td /F4 9.0 Tf [(. When the SUNLearn main page opens, click on the "Information )] TJ ET BT 61.016 385.807 Td /F4 9.0 Tf [(Security Awareness Training" link and log in with your network username and password. If you're successfully logged in, )] TJ ET BT 61.016 374.818 Td /F4 9.0 Tf [(scroll down and click on the "Enrol me" button to enrol yourself for the course and to access the training material.)] TJ ET BT 61.016 354.829 Td /F4 9.0 Tf [(If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and )] TJ ET BT 61.016 343.840 Td /F4 9.0 Tf [(active, please log a request via)] TJ ET 0.373 0.169 0.255 rg BT 187.079 343.840 Td /F4 9.0 Tf [(https://learnhelp.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 187.079 342.689 m 292.136 342.689 l S 0.153 0.153 0.153 rg BT 292.136 343.840 Td /F4 9.0 Tf [(for SUNLearn support.)] TJ ET BT 61.016 323.851 Td /F4 9.0 Tf [()] TJ ET BT 61.016 303.862 Td /F4 9.0 Tf [()] TJ ET BT 61.016 283.873 Td /F4 9.0 Tf [()] TJ ET BT 61.016 263.884 Td /F4 9.0 Tf [()] TJ ET BT 61.016 243.895 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 225.406 Td /F2 9.0 Tf [(Posted in:News,Notices,Security,Training | | With 0 comments)] TJ ET q 225.000 0 0 150.000 325.984 496.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 174.0737 395.9632 262.1207 405.1207 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://learn.sun.ac.za/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 187.0787 343.0072 292.1357 352.1647 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://learnhelp.sun.ac.za/) >> endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 200 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 17392>> stream JFIF``BExifMM*J PiZ >SONYSLT-A99V '  (00004 0 2015:04:09 14:56:522015:04:09 14:56:52250mm F1.4 }http://ns.adobe.com/xap/1.0/ 2015-04-09T14:56:522015-04-10T13:14:47 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"N !1AQa"2q#BCR$Sbr%34DETsU&6c,!1AQ#"aq2 ?ʣ#橴) E 8H~Cph3sFUk&Ap efui'IO <غ9(5xK,X홢H8wfz6(J%oG7g%OJ#s{W [pK쾔 _".i>u뵱EID@@0ް.=_8HP*?SR-T^eTnpN9+m CC͑И K`xVlkc͏ k^ީ5_LRmL:wf+cG''^SūsOʓ'Z+N<&| 槩) #U Yu#-f҆O7*-q2$.1b U+ep\y!u7Hahqj+GfJ{BѵHt˷-[w$m#SNڊ3ЌɰU׮wk>`~<>״)H~\D|^E4eѧ5(=vm=ZO$ULn)❧) iKA[女ݢ%B^4dQnoU0_ (U쥠hՔtCƘAJ!ùFXridv)E/Ih= N 훸?SN\Ɔ BzIW|l\ unTݟ!(זZ{y릤]҇FCT+_Ltڅ=,ɇMHRƜ׈ZKjZOna{0*[Q3ALL BM tn(t)yD&DkJM!yv)GN"jn@xǿ"eoW>e1~*N/lY?ho?m H0۩7;D]wS'&)0oHAo1R˿eh'j-f*ʻxK=lշ6ɡ:M@ta^ZG勯D5QͶRtaV)ȭ3ҟt$ zCL*];gNЈ)$okB :Zú6T˰3y~Vgn[jX̵XuX|Ni#ZeE]qں|w&{5on w+\1v*|Zeb] plnГQ/+EDZ2{P3|)zOc W;F%A^2i-tEEqfjY[i&Nл[8@L;fJTxoSWrQ|R˃q[XՕJy6dAɞc_7s> yh--hkĢA&վ e7- R4 C6vED=|c*Bnwh6-Z6#xyÊ繥Ҕ=M.ii'tR ZqM0sTrƑ[mnBu93(I(oCɤV]mMI@XMnK!ぜ>wN(UaP vfَ骨:aΓP8aXXrXCm:y2&baxtawG[YM⚇F)N]K*;'ٲG? +)ۭ)ƞfVMܺesᒷz, (SgbN*X~Z2ء>{aqY7<i3FnI2xR &0d$II0:-%Yxͷ5@=(>*4jGYݫ`10r WݗP#OT42/bC#wyZo,:0W_e[eCh.Ϋ&%cl >^Omi+ߩ~H᙮*KG2 qW( SF^6x^\hJ+ ۬[κ(ۜ3Q8(2D^d*JlX ‰5#,+E(t7;ڎJ0U$=,rVhwX\B=> E: I`G"жŃPA[ nR|cTo0uc)y]LZdm1UI~M')a}`ܦPlOL;zG3J'oR}qMlG6a;+*\|V1TRB@ w{ts╹{Bi"1UcR kpo{Lgnٿ_sOe4ysnrIZ +e*Ta0:,Jhw=:iz.+ϗtKQWJ vF*JFntiPmH惣&mum%c ߍNʥmR\gPCY#FIeu?[_.vc@St{8#/ߑNa,9>6@SWJ0 ~5VAI!/hij.r [V䳶CRΪ4t*Tu1DkZr7-)ʔKA-ƻpc ȫMm9cO>N[hat3 JutѶ?!{"Kρ6nkCw@al &WGlW<Uko//һkyIq]ظe\wnv~lIz~ ?}꥟LZd H8\^>,O DaTćeE1ݔ] Nn#L)6[P?eo17i5eRA ;8 S_5Uhm24ӄζX%dLM.왢TRi٧'3Pu ssz=9mwQ<{!Se|8Fkv[kxYjX%EG%D g2g o% r촻S -`n^X)ќHܽZ[CK+᜜JhT׎)䠈Qm5pH!MMƀxȘH0 jeuϡv㾻hj V*0 wwv`9/c2;u_' &тxZ)}K[ⷀ/Di|C,kTXk`; mUt8ppM\jM\7B\%d\R(Ğ 𶊺u 끌+}Xoٽ\SIh*$N0պFђye Y. Z$kOjdӵ0 ܨvV7kbWGa$2t!/x@0y"C/qCWM2XrJ80O0/[qIa+n}kZ֗h*j?D aP[csF:nM?RZqhhHM1=(fVD'kgn!}4! l( ,ci*?Q/U_k*(5PN?A섯Ɔ3hF򅦆J7׼e7ߑ9qՕh"d/]KLx<?HUk <Σ2Ѻh\0< Wr$ te ƈ;fؚ;0AܻOX`2a81ハI6k-j߄dL598c^WK;ѣMtp h+ga[ pGհ4k{J}MN%vg'՛;?F(ѿ~)hv sO0#uIэ%n0,Xny.zog(-r֣*Sp&CSvcՌ.wkz\I9% 1JCK |g[3[ޕuG) nWDR^g 1y֨Vkwzj _Z5'ԷjX#:xm kG Y.>[А7^խ+<,2Ǵ3Nc=[waNCZio~J_7> QG4 $(+9 3EPAdm+L9[Si%̐cyom#qOKp4ÙSnkˈEC.׊8 \ZMB3y㙿7O`.hʝ$ -7S_ kqڜnGwO n,kq#3nۿoa$3K98,DutuS޳V#ވG%K ϳ[ o8(L޾dBc7vt}oNԘP1ҟ~+˅.tW ?ZS4w۹fU 2>KMH}gJ>tT*i(m-.S6tpAL~K-pu搯k~ Ck>v76^e5E8ɛ!%r48]O*߂6.뭒%p3FLo兘e2Qx,U#~Gw24 sa ${u3L܁)X? oQ,[;fPٶ,S<#tݽHMlE]!Ckj7{ža*WQJb؝lҥ$`c `ќ~e}3ƑU>+:XnQ*.j e}‡B0*OJ6SŕCPBԏ5;zJn\ghC'c9j:L٩trO61\S<"Qjn .=GdKd?EG5S";]s J6]rNأ nNHkQJp3&/KT 3V؍YMIۛ:odRy7tL8P{AFZI|X;~?4QxM+h6žrҾ 9QڳmU[2GZ2Zqy)n~tK LdfQ4Q! [ĬkժS`4;6m:آL K׊Gى$wzӢ[E=;[+w nU59Mlékwqκ"hYQU-^qt u4(sxy3nJmDovrO*M-#fcnԦ-ߖC(mr&8M.4ժg;0w)`_w[P>U{3FԳӢ^qZgz]]qS7 Mun[~!ve8 `[[e2I##w=TI㭤x#GgTsc29)#2 +.n5UV=3tb<04o rלIe+δ}WYE1(xXʑSmрVJۭuq~ॶS5c+c '*Ƒ,w:XA{4 +BXD1c)%`[k$ ΰjӪ 6ݨ$2[jᇘWS* Nvs*XVzJ'ccuK; F۔ts '5~8}6]vZȃV+J2S~JZ8 mcf8O[%>Z噠V޺i|(\_A]O*ӎOZM-|6|dUz8Kޤ4Z cӄr?FI6- =xKiSƪ5Lug/is909'z / (iTʧPSu;͓pd_s':*H2hzr$.F@l}nQ|Fw|pn°?i)dmUc'cUGV̝5F1r}a8kG`Ʒ5uR}X䀼;Ėcx瑪`2ь:hNI&!\]$8`oJjL?C0Se{{dPnQ.\DGY{W9`˓<\'kZ #˒|J(NٛyϐY\E /Qk6:H˓Y8!y=zt3kK DA}r.Vu1%h ɤ\xerc'ꊑiV f?\@TZFx%\Ѯ{``˓tx EPQp h=%`fMi%qQW;B=r8Qbޯc 5X\$0,*ձr3G˓@p ig)K80rhF5M88.\q4B/ endstream endobj xref 0 17 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000596 00000 n 0000004785 00000 n 0000004897 00000 n 0000005012 00000 n 0000005132 00000 n 0000005240 00000 n 0000005368 00000 n 0000005444 00000 n 0000005572 00000 n 0000005652 00000 n trailer << /Size 17 /Root 1 0 R /Info 5 0 R >> startxref 23213 %%EOF Training « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Training

Public folders vs resource mailboxes

Friday, October 24th, 2014

If you have been using public folders up till now to organise meetings and events in your department, there may be an easier, more practical option available to you.

By sending an email to help@sun.ac.za you can request that the public folders you are using now be converted to resource mailboxes or to request the creation of new resource mailboxes.

But why should you use resource mailboxes instead of public folders?

  • If you send a meeting request to a resource mailbox, that resource mailbox will Accept or Decline the meeting request.
  • It happens automatically without any intervention of a human being
  • You do not have to worry about double bookings for the same date and time at the same venue.
  • You’re meeting request to a resource mailbox cannot be changed or deleted.
  • Only the owner of the resource mailbox can change  or delete meeting requests.

What are public folders?

A public folder is a feature of Microsoft Exchange Server that provides an effective way to collect, organize, and share information with others in an organization. Typically, public folders are used by project teams or user groups to share information on a common area of interest. When you are connected to your Exchange server, folders labelled “Public Folders” appear in the Microsoft Outlook Folder List in the Navigation Pane. You can manage these folders from Outlook. Public folders can contain any type of Outlook folder item such as messages, appointments, contacts, tasks, journal entries, notes, forms, files, and postings. You can also add a shortcut to any public folder to the Favorites folder under Public Folders. (http://office.microsoft.com)

Up till now this is what public folders in Outlook looked like:

1
2
What is a resource mailbox?

A resource mailbox is a mailbox that represents conference rooms and company equipment. Resource mailboxes can be included as resources in meeting requests, providing a simple and efficient way to manage the scheduling of resources for your organization.

Room mailboxes are assigned to a meeting location such as a conference room, auditorium, or training room. Equipment mailboxes are assigned to a resource that is not location specific, such as a portable computer projector, microphone, or company car. (http://blogs.technet.com)

This is what the new resource mailboxes look like: 

3
How do I add a resource mailbox in MS Outlook 2010?

Send an email to help@sun.ac.za and request that the public folders be converted to resource mailboxes. When you get confirmation that it has been done, follow the next steps:

Create a new meeting request

Select All Rooms in the Address Book

4
Scroll down to the Room you want to add as a resource mailbox
5
VERY IMPORTANT: Please Take note of the Alias (see the 7th step further down)
6
Click on File, Info, Account Settings
7
Select your email address and click on Change
8
Click on More Settings
9
Type the name of the resource mailbox that you want to add – remember that Alias of earlier – it is the name you have to type here
10
Click Apply, OK, Next Finish
11
Go back to the Home button and click on Folder List
12
The added Resource Mailbox will display
13
Click on Calendar to view the calendar of the resource mailbox.

SUNid flash sessions

Friday, October 10th, 2014

Since the implementation of SUNid (Read more on SUNid here) a few months back, it’s already being used for the registration and administration of external workers and visitors by quite a few SU staff. But, as with any new system, there’s always a learning curve to adapt to and that’s why training is of utmost importance.

Hence, IT will be presenting short flash sessions of 30 minutes each for the next few months. During this 30 minutes the basics of SUNid will be demonstrated in a practical manner, after which another 30 minutes will be made available for any questions.

These sessions are a necessity if you are a SUNid user and will, in future, be compulsory for all staff requesting to be registered on the system.

The dates for training are scheduled during October and November on the Stellenbosch campus on the following days from 10h30-11h30:

16 October
22 October
28 October
6 November
13 November
20 November
27 November

Staff can register online via the SUN-e-HR option on the my.sun.ac.za. More information on training is available on the IT wiki.

IT can also facilitate one-on-one sessions with the “approvers” at departments or present information sessions at departmental meetings. To arrange this, please send us an e-mail at help@sun.ac.za .

Using a tablet for smarter learning (part 1)

Friday, August 22nd, 2014

Since tablets became mainstream in 2010, more and more students have started relying on these nifty gadgets to take their learning experience to the next level.

However, many students still are unaware or unconvinced of the advantages of tablet-based learning. In the following section, we’ll look at why exactly a tablet is a fantastic investment.

Why a tablet?

In short, there are four reasons:

1. The most obvious advantage of a tablet is the level of mobility it offers. As a student, you’ll most probably carry around at least a notepad, your prescribed books and your class notes. And, for many, a calculator, dictionary and diary/calendar are also indispensable. Carrying these items around all day long can quickly become a back-breaking burden – which is why most students simply leave their heavy books at home.

With a tablet, though, you can have all of these resources compacted into the size of an A5 notepad. No more forgetting books or notes at home – everything you need is but a few finger taps away. This is a killer feature in itself.

2. However, the true academic value of a tablet becomes evident when one looks at its potential as an in-class companion. Not only does a tablet keep everything you need at hand, it also allows you to manipulate these resources in useful ways. For example, you can add bookmarks, highlights and notes to your prescribed books and class notes while the lecturer is discussing them. You can also efficiently create rich notes of your own.

You’ll be able to combine typing and drawing on the screen to capture, for example, key points in a class discussion or diagrams and charts drawn by the lecturer. You’ll be able to neatly organise these notes in subject folders for future reference.

The biggest killer feature of a tablet in class, however, is the fact that it allows you to record what is said in class so that you can listen to these recordings while preparing for an exam. While it’s not practical to record every second of every class (because –let’s be honest –you’ll never listen to all of that again), this feature is extremely handy to record important bits of a lecturer’s explanation or a class discussion.

Lastly, a tablet also gives you quick access to handy reference material. Need to quickly look up a word’s definition or do a calculation? A tablet lets you do both at lightning speed, which means that you won’t lose track of the train of thought in class.

3. Tablets don’t only shine inside the classroom. Any student who’s had to scour stacks and stacks of paper notes to review specific content before an exam will testify to how frustrating, tedious and time-wasting this can be.

Having all of your own notes –and the slideshows or hand-outs provided by the lecturer –neatly organised on a single device, where it’s accessible with a few taps of the finger, eliminates the hassles of paper-based exam preparation and gives you more time to actually study.

4. An often-missed advantage of tablet-based learning is the fact that e-book versions of prescribed books and textbooks are usually cheaper than their print counterparts. While many books are not yet available in digital format, the savings on those that are can quickly compound to a substantial amount.

And, of course, using an e-book offers all of the advantages of digital learning, including such timesavers as being able to search for words and phrases, jump to specific pages and chapters, add multi-coloured highlights and make digital annotations.

Next time : Buying a tablet: The choices

[ARTICLE BY JOHANNES JONKER]

E-mail etiquette: do’s and don’ts

Friday, May 9th, 2014

If there’s one area the queen of etiquette Emsie Schoeman hasn’t commented on, it’s e-mail. But don’t think that gives you any reason to escape certain guidelines just because the electronic world seems to operate on a more informal level. Even with e-mail you can land into trouble if you don’t behave properly.

You’re probably wondering why e-mail etiquette even exists, in particular within the company milieu. There are three (very important) reasons, namely professionalism, efficiency and also protection against liability.

We consulted the internet and here are a few hints for meticulous e-mail users.

1. Be concise and to the point
Long e-mails are unnecessary and difficult to read. Avoid long sentences. Sentences should contain no more than 15 to 20 words.

2. Answer all questions and anticipate further questions
This will prevent a series of follow-up e-mails to get all the information and you won’t waste your and someone else’s time.

3. Spelling and language
Bad spelling and language create a bad impression and e-mail without capital letters or punctuation marks take effort to read.

4. Layout
Reading text on a screen is harder than written text and this makes layout in e-mails even more important. Use short paragraphs and adequate space between paragraphs.

5. Use a significant subject in the Subject line
Put the appropriate subject in the Subject line in order for the receiver to immediately know what the e-mail is about. It saves time, explaining and creates context.

6. Reply promptly
Immediately replying to an e-mail is generally expected. Don’t leave correspondence unanswered in your inbox for days when you could have answered it in a minute. Standard reply time for an e-mail is 24 hours, preferably the same working day. If you don’t have an immediate answer, just confirm you received the e-mail and will reply as soon as possible.

7. No large attachments
Don’t send unnecessary large attachments with your e-mails. Some mail servers can’t handle large e-mails.

8. Capital letters
Don’t use only capital letters. This implies that you are shouting at the recipient and can be interpreted as rude.

9. Re-read before you send
Don’t send an e-mail in haste. Other than potential spelling mistakes, it’s important to make sure if you message is clear and understandable. Remember that the recipient can easily misinterpret something when you’re not speaking face-to-face.

10. Don’t answer spam
Even if a spam e-mail claims you should reply to stop from receiving them, don’t reply. By replying to a spam e-mail, you are confirming your e-mail is active and more spam will be generated. Rather just delete the mail.

11. Don’t request delivery and read receipts
You will only irritate the receiver even before he’s read your message. Rather ask the person directly if necessary.

12. Don’t request messages to be recalled
The message has probably already been read and by recalling it, you’ll appear unprofessional. Send an e-mail explaining afterwards instead of recalling it.

13. Don’t forward chain mails or virus hoaxes
Microsoft will not send you money if you send it to 20 people – and neither will any other company. Most chain mails warning against viruses are also hoaxes. Ignore and delete them.

14. Avoid the high priority option
If you use this option to often, it will lose its efficiency. Your correspondence may also come across as pushy and aggressive. The same goes for terms like “URGENT” and “IMPORTANT”.

15. Be careful with emoticons and abbreviations
Try not to use abbreviations such as LOL and BTW. Emoticons like the smiley :) are also not appropriate in business e-mails.

SOURCE: http://www.emailreplies.com en http://www.businessemailetiquette.com

 

School for Public Leadership takes a leap into the future with IT

Friday, April 11th, 2014

The School for Public Leadership’s mixed learning project made a leap into the future at the end of February and at the same time highlighted the important role Information Technology plays in modern education and learning.

During the new honours students’ first contact session of the year for their course, they were surprised with notebook laptops, arranged by Joe Smit, Helmi Dreijer (IT) and Ilse de Kock (NARGA). Since this group of students is largely dependent on interactive telematic education and therefore needs to have access to a computer and internet wherever they are, a prepaid data package was also negotiated for them with Cell C.

In collaboration with Teaching and Learning Enrichment Johann Kistner and Marinda van Rooyen (IT) saw to it that SUNLearn was made available to students to ensure they have access to the University’s e-learning platforms.

Furthermore an e-book platform, Vitalsource was utilised with which students can sync their prescribed textbooks to notebook computers and mobile devices. Students’ highlighted text and notes will also be synchronised between devices. Ralph Pina (IT) and Le Roux Franken (IT Bellvillepark campus) managed this initiative with the assistance of Van Schaik. Le Roux was also responsible for technical logistics.

Read more on the SPL-project and the School for Public Leadership.

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.