Sobre Nós
- Gabinete para as Tecnologias de Informação e Comunicação (ICTO)
- Secção de Informática Pedagógica e Serviços Técnicos (ACTS)
- Secção para a Gestão de Informação (IMS)
- Secção de Infra-estruturas Informáticas e Serviços aos Utilizadores (IUS)
- Equipa de Segurança Informática (IST)
- História e Acontecimentos Importantes
- Comunicação
- Indicadores de Desempenho
- Contate-nos
Nossos serviços
- Instalações de Informática Pedagógica
- Conta & Acesso
- Sistemas de Informação Administrativa
- Cartão Do Campus
- Comunicação & Colaboração
- Partilha & Armazenamento de Dados
- Segurança Informática
- Aplicações Móveis
- Rede
- Equipamento Informático de Escritório
- Impressão
- Software
- Ensino, Aprendizagem & Investigação
- Alojamento de Sites




Core Switch Upgrade
/in Key Projects /by nicolaho Ho Ka ManUMMoodle Training (For AITSAG Members/ Faculty representatives)
/in Training Event /by jeffreychoi Choi Io TengIn response to the support of distance learning, ICTO arranged online training related to UMMoodle for all the AITSAG members and faculty representatives on 5 February 2020. The training introduced basic features related to teaching materials sharing, assignments, and quizzes of UMMoodle.
N21, N22 & N23 Buildings Network Refreshment Project
/in Key Projects /by Laura ChiangThe network equipment of N21, N22 and N23 was deployed seven years ago since the construction of the Hengqin Campus in 2013. The original design of the network system was for administrative and clerical works, it is not suitable for research work which requires a faster network. Furthermore, the network equipment will reach its end-of-support […]
Provision of Mac
/in Key Projects /by Laura ChiangUrgent Notice: Phishing Email which seems to be sent by UM staff is spreading!
/in Security Bulletin /by patrickchiu Chiu Chi ChongHow much do you know about Information Security?
/in InfoSec Tips /by jeffwai Wai Chi FongIn recent years, Advanced Persistent Threat (APT) is a common threat on the Internet. Intruders will try to break into a target network. They often lurk in the network for months to collect cues until they obtained any valuable information, and some would even stay hidden in the network for long-term monitoring. Usually, an intruder would try […]
Virtual Desktop Service (VDS)
/in Key Projects /by jeffreychoi Choi Io TengFriendly Reminder: Beware of suspicious emails with intimidating contents!
/in Security Bulletin /by patrickchiu Chiu Chi ChongUrgent Notice: Beware of Phishing Email Looks like sent by "HR and Finance Department"!
/in Security Bulletin /by patrickchiu Chiu Chi ChongBeware of Fake News. Avoid Spreading Rumors!
/in InfoSec Tips /by jeffwai Wai Chi FongAt the end of 2019, an outbreak of COVID-19 pneumonia occurred in Mainland. In Macao, the first case was also confirmed in January 2020, which caused widespread concern. According to previous experience, when a critical incidence such as epidemic, serious natural disaster, accident, or social event occurs, there will be relevant fake news disseminated in […]