Details? Click Status at top of page
RESSRV14 moved to new chassis
New address is: 172.24.220.241
You can use the Partners helpdesk phone line to report anything that is broken, whether it's your Mac, one of our servers, or a piece of software.
If what you are calling about is not an emergency, or you are calling about other DFCI Research Computing services, please submit a web ticket through the Partners Online Help Desk page.
Keep the request simple -- the web page is not designed for detailed explanations. If we need further clarification or if the request is complex, one of our staff will get back in touch with you. Please indicate how and when we can reach you. We are actively investigating alternative methods for you to request service, but for now, this is a viable way for us to all know what's been requested.
New license for Graphpad/PRISM, provided by DFCI Research Computing
Installation and update instructions are on our KACE server
You will find the instructions via the following link:
When you connect to the KACE server, you will be prompted for your Partner's login ID and Password.
Research Computing has deployed a new set of 7 servers, built around the ZFS file system.
These servers are large -- most are at least 200 Terabytes.
Lab shares will be moved from the older RESSRVxx servers to these new servers in an orderly way,
or through an on-demand basis if your lab has needs greater storage needs than the partitioning
scheme on our old servers allow.
Each lab will have what ZFS calls a "filesystem." Unlike partitions, the filesystems have no inherent
size, and can grow as needed.
Our CrashPlan server has been upgraded to version 184.108.40.206. This upgrade includes a client upgrade. The next time your computer connnects to the CrashPlan server, your client will automatically be upgraded to version 3.6.4, which fixes a compatibility issue with Mac OSX Yosemite. No user intervention is required.
As a result of the enormous number of destructive zip files that have been sent to Partners users in the last few days, they have decided to block all attached zip files. We hope that in the future there can be a little more granularity to this process, such as blocking messages if an attached zip file contains a destructive file of type ".scr" or ".exe" To send a zip file to a user, you can use transfer.dfci.harvard.edu, which will securely send the zip attachment for you.
Starting some time around 9:00 this morning we lost connectivity with two major subnets in the 20 Overland data center --
172.24.220.X and 172.24.224.X. Those subnets contain the majority of our storage servers ... it's a very long list.
We are reaching network engineering to to resolve. Systems came back on line approximately 9:55.
The cause was a tripped circuit breaker which killed the power to several racks in one of the rows of servers.
If you receive an email with the subject “your documen” it will have a
malicious zip file attached. ... DO NOT OPEN this email.
[ IF YOU HAVE ALREADY OPENED THE ATTACHMENT
(not just the email but the actual attachment), please call the helpdesk immediately.
Disconnect your computer from the network. ]
Again, what you should do is this: Just delete the email. Click "READ MORE" FOR DETAILS