- User Services
- Group Services
- Scientific Computing
- Copy Services
Message from BlueJeans:
To ensure a consistent, reliable, and first-class Primetime experience, event moderators and presenters will be required to join through the BlueJeans App after 9/10. Attendees can still join through preferred browser options.
Over time, browser plugins have proven to be more insecure than browsers themselves. Consequently, browsers such as Firefox, Internet Explorer, and Chrome are phasing out plugins. Instead, features historically offered through plugins are now being introduced in the form of built-in browser features.
With that being said, BlueJeans will stop development for their plugin on September 10, 2016. BlueJeans now recommends using their BlueJeans App instead. The BlueJeans App works on the following operating systems:
- Windows 10, 8, 7, and Vista
- Mac OS X 10.7 and above
- Linux - RHEL 7 and above and Fedora 22 (not available until 09/10/2016)
For a full list of BlueJeans App downloads, please visit the BlueJeans Download Our App webpage. Once you have the BlueJeans App installed, please select the 'SIGN INTO MY ACCOUNT' option. This should forward you to the MIS Portal webpage where you would use your JLab username and password to start the BlueJeans App.
If you have any questions or concerns regarding this change, please contact the IT Division Help Desk.
Submitted by firstname.lastname@example.org on Mon, 08/22/2016 - 10:17
If you use a Smart Card to logon to your desktop, or other Windows systems at JLab, a small change is being made at 5:00PM on Wednesday, August 24, 2016. In order to support some required enhancements to our Smart Card system, a new text field will be visible on the logon screen where users enter their Smart Card PIN. The field is labeled "Username hint" and will appear just below the "PIN" entry text box. The good news - for most Smart Card users, this field can be left blank. You will simply enter your PIN in the box above it as
08/23/2016 8:00 am
Jefferson Lab (JLab) uses several automated protection systems to scan web traffic for malware and viruses. The protection provided by these scans has become increasingly limited by the expanding use of encryption for web traffic on the Internet. To provide continued security for JLab systems, JLab will begin decrypting some web traffic. Please see the table below for the schedule of network changes in the coming weeks.
|DATE OF CHANGE||NETWORK NAME(S)|
|August 23, 2016||Desktop 1 and Business Services|
|September 7, 2016||Desktop 2, DOE Site Office, and JLab Internal Wireless (not guest wireless)|
|September 13, 2016||SENS Domain, All Central Networks, VDI Infrastructure|
|October 4, 2016||All remaining networks; except guest|
This change will allow the automated processes that the lab has in place to scan traffic and remove identified viruses and malware. Traffic from known medical and financial institutions, however, will be exempted from being decrypted, as these are generally not sites from which malware and viruses are deployed.
The CNI group is held two, one-hour informational meetings on Thursday, August 18th, and Friday, August 19th, in CEBAF Center room F113 at 11:30AM. If you have any additional questions about this process, contact the IT Division Help Desk (email@example.com or x7155).
JLab Server Certificate Renewals -- possible connection problems for browsers, subversion clients, etc.Submitted by firstname.lastname@example.org on Tue, 07/12/2016 - 10:39
TLS/SSL certificates for JLab internal web servers, including those hosting subversion and other services are being renewed. As a result, users may see warnings or failures to connect (depending on the configuration of the client application being used). To avoid these warnings, users must install the JLab PKI "root" certificate. Additional information regarding this issue and the root certificate and instructions for installing it are available at http://www.jlab.org/PKI .
Subversion Client Warnings
Several users have raised questions regarding the server certificates used on subversion servers in the past few days. If the root Certificate is not installed in your subversion configuration, the subversion client generates a warning upon attempting to connect, and asks you if you wish to accept the certificate being used, either temporarily or permanently. To help you confirm that you are
06/21/2016 8:00 am
During the upcoming monthly maintenance period on Tuesday, June 21, 2016, the IT Division will release Office 2016 to the site. However, the IT Division will not be installing Office 2016 on JLab-owned systems automatically. After this maintenance period, Office 2016 will be available for installation from Add/Remove programs on JLab-owned Windows systems. For JLab-owned Macintosh systems, Office 2016 will be available in the Self Service application. NOTE: Starting Wednesday, June 22, 2016, Office 2016 will be the version of Office installed on all central terminal servers (jlabts) and new desktop builds. As time allows, Office 2016 will be installed on conference room machines too.
Apple has stopped supporting their Quicktime for Windows product. At this time, there are several remote vulnerabilities in this software, therefore, you should remove Quicktime from your Windows desktop immediately. If you need the functionality that Apple Quicktime was providing, use Windows Media Player instead. Those running Quicktime on Apple devices do not need to take any action at this time. This message is only for Quicktime on Windows devices.
Please contact the IT Division Help Desk (email@example.com or x7155) with any questions or concerns.