Skip to main content Start main content

Get Connected

All
01

IT workshops for students and instructors

IT workshops on using Gen AI tools and LEARN@PolyU basics for students have been scheduled from mid-August to early September for both existing and new students. For instructors, hands-on workshops on migrating course content to Ultra Course View and leveraging teaching venue AVIT facilities for in-class activities will be available from mid-August to early September. Students and instructors are encouraged to join at a convenient time slot.

30 Jul, 2025

01

New user interface of PolyU Gen AI app

The PolyU Gen AI app user interface has been enhanced to allow users to create their own Topics to group chat conversations.

30 Jul, 2025

01

Cloud Express II VPN service Mainland VPN portal address change

The Cloud Express II VPN service allows staff and research students in Mainland China to connect back to the PolyU campus and selected research cloud services via the Mainland cloud service provider infrastructure in Mainland China and the Hong Kong SAR. It offers multiple VPN portals in Mainland China to enable users to connect through the nearest entry point.

30 Jul, 2025

01

Upgraded database software version release for database as a service offering

To ensure compliance with security and platform stability, the database as a service will offer an upgraded version/release of the database software and will terminate the service offering for database software that has reached its end of support.

30 Jul, 2025

01

Essential Tips for Cleaning Up Your O365 Mailbox in Outlook

If your O365 Inbox, Sent Items, Calendars, Deleted Items or Conflicts folders contain a large volume of messages accumulated over a lengthy period, you may experience performance issues when synchronizing messages with your Outlook client on desktop or mobile devices.

30 Jul, 2025

01

Strengthening business admin application security access with one-time passcode

Cyber threats are on the rise, and in recent years, password-related breaches are becoming all too common. Weak, reused, or stolen passwords make it easy for cybercriminals to gain access to sensitive information.

30 Jul, 2025

Your browser is not the latest version. If you continue to browse our website, Some pages may not function properly.

You are recommended to upgrade to a newer version or switch to a different browser. A list of the web browsers that we support can be found here