News and Updates
Latest IT News
- A new service for faculty using Panopto on Blackboard (26/03/2021)
- Online Education Resources (13/03/2020)
- Air Gapping (05/02/2020)
- Identity and Password Management Upgrade (part 2) (16/07/2019)
- Identity and Password Management Upgrade (part 1) (04/07/2019)
Latest Tips
Online Education Resources
Due to the Coronavirus COVID-19 outbreak in the country, the university is shifting to provide online education to our students.
Growth Hacking
An approach to driving product adoption, usage and sales by experimental, innovative and low-cost means. The term was coined in a 2010 blog post by Sean Ellis entitled “Find a Growth Hacker for Your Startup.” Ellis’ idea was that a startup needs to hire someone whose sole job focus is to find scalable, repeatable and sustainable ways to increase revenue and grow the organization.
Growth hacking is outcome-oriented and there is no proven or prescriptive methodology to achieve growth. Instead, growth hackers are free to seek whatever means are necessary to achieve repeatable, desired business outcomes. Some practitioners hold the job title of “growth hacker,” while others implement the methodologies under a different, but related title such as Chief Development Officer.
Growth hackers have the potential to grow companies from zero to millions of users in a very short period of time. Companies known to have capitalized on growth hacking methods include Pinterest, Zynga, Groupon, Instagram and Dropbox.
Growth hackers tend to hold a combination of technical and marketing knowledge because they’re often responsible for producing and completing ideas from start to finish. They must also be comfortable working with business intelligence dashboards because growth hacking use data-driven analytics to quantify the outcome of methods and inform decisions about future tactics.
Software Installation and Upgrade
Users must not install or upgrade software on their personal computers except if needed for business use and after obtaining approval of the concerned supervisor. All software listed on this pageare supported by the IT department.
CIA triad
To change your LAU webmail password
To find out how to change your LAU webmail password, follow this link.