Yoal Peguero joined BUMC IT in January as our newest Client Support Specialist. Yoal graduated from BU in 2013 earning his BS in Health Science with a minor in Public Health. While a student at BU he worked in CAS IT as a computer assistant. Our colleagues at CAS IT spoke highly of Yoal and his work. Yoal worked at Brigham and Women’s Hospital in alumni communications where, among other things, he oversaw their website. Most recently, he worked down the street at Boston Public Health Commission as a program coordinator.
Yoal fills the position vacated by Lloyd Rolles who was promoted to Computer Support Specialist. Lloyd filled the position vacated by James Lau who is now a Systems Application Administrator.
IS&T teams have resolved the incident with vendor assistance.
Please note: The feature used for scheduling recordings remains unavailable while IS&T teams and the vendor are determining the root cause of this issue.
Echo360 service is intermittently degraded or unavailable. Clients will be unable to schedule recordings and may have difficulty viewing existing recordings. Please check TechWeb for updates.
What is the Y-drive? The Y-drive is a general purpose, shared storage resource available to all BUMC faculty and staff to conduct University-related activities. It was created as a shared campus resource over 15 years ago at 50GB. Today it is nearly 25TB.
Are there disk quotas on the Y-drive? Generally, the Y-drive has not had any quotas established. We have relied on the community to be good stewards of this service. By and large, this policy has been successful.
Can I store personal files on the Y-drive? No. The Y-drive is not intended for personal data storage.
How does BUMC/IT know what I have on the Y-drive? BUMC IT does not actively police the use of the Y-drive unless automated monitors indicate a resource threshold has been reached. Recently, on several occasions, available storage on the Y-drive has been under pressure. Automated reports of top storage users have revealed examples of potentially inappropriate personal use of the Y-drive including the following examples:
- personal iTunes libraries
- (likely) copyrighted material such as software, movies and television programs
- personal photo libraries
- computer backups
- other personal files
While we have contacted these top users for remediation, we have not explored all suspected personal use cases. We ask you to review your current Y-drive usage to ensure you are only storing work-related files.
Does that mean that BUMC IT is snooping around in my files? No. The aforementioned reports only list general file-system information about the file such as its name, size, creation date, etc. We do not “snoop” into the contents of any files on the Y-drive.
I’ve looked through my files on the Y-drive and found some that you list above. I want to keep these files. What are my alternatives?
Citing the examples above:
- iTunes and other music libraries for personal use should be stored on your personal computer.
- Copyrighted material should never be illegally maintained. You should immediately delete it.
- Photos can be stored on any number of consumer photo sharing sites (e.g., Flickr, Google+, Skydrive, etc.)
- It is unnecessary to back up your personal computer to the Y-drive. The University has a site license for CrashPlan that will accomplish this goal in a more sustainable fashion.
- You should store these files on a consumer file service — e.g.,
Google Drive, Microsoft Skydrive, Amazon Cloud Drive, etc.
But I have a lot of data sets that I need to preserve, what are my options? The University has a high-capacity Data Archiving service for the storage of infrequently used data. This service is available to all faculty, researchers, staff and departments.
If you need assistance with managing your files and directories, contact the BUMC IT Service Desk at 638-5914or email@example.com.
BUMC IT Client Services is proud to welcome Scott Wilson starting as a Computer Support Specialist today. Scott graduated from Wentworth Institute of Technology with a BS in Computer Networking in 2012 and recently worked for TMNG Global as a Network and Desktop Support Specialist. Scott brings extensive Windows and Mac experience to our team.
As described last week in a BU Today article, members of the BU community were recently victims of phishing; and IS&T has again received several reports of a phishing message being received by members of our community like the one below.
We believe the scammers are trying to use the fact that they were successful last time to continue and extend their crime. The message to watch out for claims to be from BU Security and talks about protecting you from the evils of phishing. You can tell the message is a fake because it claims to be from BU, and even uses the BU logo, but it is pointing you to a link that is not a bu.edu link.
A real BU link will always have “ .bu.edu/ ” in it. There is always a dot before bu and a slash after edu, as shown below.
Other things to watch out for:
- If you are prompted to Web Login, make sure it is the authentic BU Web Login page which begins with https://weblogin.bu.edu/something
- Remember that BU will NEVER ask you for your password or ask you to “verify” it; nor would any other legitimate business or institution. It is important that you safeguard your passwords and never give them to anyone.
For more good ways to detect phishing, go to: www.bu.edu/infosec/howtos/how-to-detect-phishing/.
Additional information on phishing is provided by IS&T at www.bu.edu/tech/phishing.
Making your spam/phishing filter more effective
Mail that is clearly spam is filtered for you, automatically. However, one person’s spam might be another person’s research project, so other messages are simply tagged as suspicious and then allowed to go through. You can decide how to handle suspicious mail that does get through, following the tips for Managing Spam provided by IS&T at www.bu.edu/tech/comm/email/unwanted-email/spam/.
If you see a phishing message, please send it and full headers to firstname.lastname@example.org. For details on how to do this, see www.bu.edu/tech/comm/email/unwanted-email/report-abuse/.
Please join us in welcoming the newest member of our Service Desk Team, Lloyd Rolles. Lloyd graduated BU this May with a BS in Health Sciences from Sargent College. He was most recently working as a casual employee splitting his time between Student Health Services and the IT Help Center where he supported faculty, staff, and students on both the academic and clinical sides. He brings not only troubleshooting knowledge but also knowledge of BU systems as well as experience in the Service Now ticketing system.
Myriam Bikah joins BUMC IT today in the position of BI Developer II. Myriam joins BU after spending the past 5 years with the American Association of Community Colleges (AACC) in Washington, D.C., as a Data and Research Associate. There she helped colleges understand student achievement measures and trends, in part by developing MicroStrategy dashboards and OLAP reports, creating data dictionaries and training videos. Prior to the AACC, Myriam worked at the National Committee for Quality Assurance (NCQA) as a Heath Care Analyst, translating healthcare performance measures into SAS specifications, and performing extensive statistical analyses of healthcare data. She holds an MS in Industrial Engineering from the University of Nebraska – Lincoln, and a BS in Mathematics from UNC Charlotte. Her thesis work involved the design of a user-centered, portable, ergonomic, real-time, solid-state neutron detection device for Homeland Security applications (related work here). She’s as fluent in calculus as she is in French. Myriam is new not just to BU, but also to the city of Boston. Welcome, Myriam!
On July 25, 2013 we will be releasing an upgrade of the Cisco AnyConnect VPN clients for Windows, Mac, and Linux. After July 25 any login to VPN will automatically upgrade to the new version. The current version has vulnerabilities that could be exploited as well as an expired application certificate that might give errors during installation when new clients connect to the VPN for the first time. A few things to note about this upgrade:
- The Windows interface is unchanged and will look similar to the previous VPN client.
- The Mac version has changed and now mimics the Windows version. The functionality will be virtually the same, but the look and feel of the application interface has changed.
- The VPN client is now branded with BU logos within the user interface.
- For advanced VPN users, we have enabled population of VPN endpoints in the client’s drop down list. If you login to multiple groups to connect to several applications (for example work2.bumc.bu.edu/Slone), you will notice that the drop down list will automatically populate with the names of the different groups that you login to after you connect to them for the first time. From that point on you can select the group from the pull down instead of typing it in each time you connect.
If you have any questions or concerns about this VPN upgrade, please contact email The BUMC IT Helpdesk or call us at 617-638-5914.
Over the past few months BUMC Information Technology has been enrolling departments into a new support structure that is centrally funded by the schools, initiated by Provost Antman and Bobby Sprinkle, Executive Director, BUMC IT. Starting July 1 this new support structure officially begins for BU departments on the Medical Campus. As part of this process, we will be doing an inventory of computer equipment that has been purchased with BU funds (either departmental or grant). Once a department is fully inventoried it will no longer be charged for setups, hourly support, or annual support agreements, but will be centrally funded by Medical Campus schools. For more information about this program or questions feel free to visit or call BUMC IT http://www.bumc.bu.edu/it/support/subscription/centrally-funded-desktop-support/
BUMC IT and BU IS&T Information Security will be sponsoring a paper shredding day, Thursday, June 13 from 10am to 1pm along the Talbot Green. Bring any work related or personal documents that you would like to have securely shredded on site at the shredder truck. We will also have an area nearby where you can drop off computer equipment you would like recycled as well as hard drives you would like destroyed.