As part of the Enabling Technology work, the provision of IT support across the University is being merged to create a new central IT function providing support across a range of systems and services to all parts of the University. Continue reading
On 22 April, IT Services will start using a new Service Management Tool, supplied by TOPdesk. This system is a Software as a Service offering and is accessed via your browser from anywhere, making a real change to how staff and students can access services supplied and supported by IT Services. Continue reading
A centrally-funded project has been approved which will improve and update the data network infrastructure at the Greenlands site, and within a number of buildings on the main Whiteknights campus. Continue reading
We have had a mail sent to University staff this morning which is another scam. Continue reading
In early 2013, the Technology Enhanced Learning Strategy Group (TELSG) proposed the expansion of centrally managed Wi-Fi services across the University. Continue reading
During the Christmas vacation, there will be no access to the Palmer GO9 PC Lab due to electrical works. Alternative facilities are available at Meteorology GL68 for this period.
Access is as normal via Campus Card or Student Card permissions
We are advising that you beware fake e-mails such as ones pretending to be either from Voicemail, HMRC, image scanners, courier deliveries, company complaints etc, containing small “Zip” attachments.
Early in October, the multimedia giant Adobe admitted to having suffered a data breach of significant proportions, with initial estimates from Adobe numbering it at 2.9 million compromised accounts. Just how significant is now becoming clearer as the count of those compromised is still increasing. Continue reading
On 2 December 2013, there will be changes to how you connect to the Wi-Fi at the University of Reading. In order to keep in line with the recommendations of the Eduroam Federation, we will be changing the eduroam network to no longer support WPA-Enterprise encryption. Continue reading