As part of the Enabling Technology work, the provision of IT support across the University is being merged to create a new central IT function providing support across a range of systems and services to all parts of the University. Read the rest of this entry »
You are currently browsing articles tagged IT Supporters.
We have had a mail sent to University staff this morning which is another scam. Read the rest of this entry »
In early 2013, the Technology Enhanced Learning Strategy Group (TELSG) proposed the expansion of centrally managed Wi-Fi services across the University. Read the rest of this entry »
We are advising that you beware fake e-mails such as ones pretending to be either from Voicemail, HMRC, image scanners, courier deliveries, company complaints etc, containing small “Zip” attachments.
Read the rest of this entry »
On 2 December 2013, there will be changes to how you connect to the Wi-Fi at the University of Reading. In order to keep in line with the recommendations of the Eduroam Federation, we will be changing the eduroam network to no longer support WPA-Enterprise encryption. Read the rest of this entry »
The end of Windows XP and Office 2003 support from Microsoft is now only 6 months away. As in our previous news item, from April 2014, there will no longer be any operating system or security updates made available from Microsoft. Read the rest of this entry »
AppGrad is not approved for use with University of Reading IT Systems and should not be used. It is not associated with the University of Reading. Read the rest of this entry »
Version 10.3 of Sophos Endpoint Security client for Windows is coming early in October. This version adds support for the Sophos Client Firewall on Windows 8 workstations as well as an updated threat engine. Read the rest of this entry »
Following Microsoft’s currently aggressive pricing on the Surface Tablet, particularly the Windows 8RT version, here are some pros and cons for this Operating system Read the rest of this entry »
A few days ago somebody “responsibly” published proof-of-concept code for vulnerabilities in Java and as a result there are now exploits starting to appear in drive-by-download exploit kits. Read the rest of this entry »