Library items tagged:

The Vidyo HD40 and HD100 CODECs were evaluated during March 2015 Read the full evaluation report here Read the manufacturer's comments here
Organsiations can sign up to the Assent service by completing an application form, which includes nominating persons authorised to act on behalf of and manage the organsiation's Assent membership account. The Sign up form can be found here.
Service information about the Assent service launched on 25 March 2015. Jisc Assent is a ground-breaking service which will help manage access to protected digital services and e-infrastructures more efficiently and cost-effectively. Using Assent can give your staff and partners federated access to a wide range of digital services including cloud infrastructures, high performance computing, grid computing and commonly deployed services such as email, file store, remote access and instant messaging.
There are a number of different vulnerable service reports that we send out, these vary from services that can be exploited to be used within a Distributed Denial of Service (DDOS) attack to services that are exposed to leak information or allow them to be controlled. Some of these services can simply be firewalled off from the internet at your border without causing any issues, however, some require further configuration. Please see below for further information on these reports and configuration options.
If you are reading this page, it's most likely because you've received a malware report from us advising you to refer to this page should you require assistance. Why have you received this report?
Produced by eduroam(UK), contains screenshots specifically for eduroam(UK) - eduroam(UK) Microsoft NPS Configuration Guide The above is the newly released and comprehensively updated version with Windows Server 2016 screenshots that incorporates relevant material from the Geant / UUINETT (Norway) document. This is new the definitive all-in-one guide to deploying NPS for eduroam.
Desktop Videoconferencing Software Evaluations Skype™ 4.0 Introduction
The following examples have been chosen to accompany the System Administrator's Charter to indicate how the charter is intended to work in practical situations. As I receive enquiries about the charter I will try to update these examples, so if you find an interesting situation which is not covered here, or a case that makes the points better, then please let me know
This document has been prepared by Andrew Cormack, Chief Regulatory Adviser at Jisc Technologies. It is endorsed by the Universities and Colleges Information Systems Association (UCISA). Members of the UCISA Networking Group were closely consulted during the drafting process.