![]() |
| May, 2004 | ||||||||||||||||||||||||
|
Sometimes, the best indication that something is working well is that not much happens, like when you are inoculated against a disease – and then don’t get sick. That’s the type of approach the Lab's Computer Protection Program takes when it comes to protecting Lab computers from external viruses. A key part of this approach is regular checkups – the Computer Protection Program scans Windows systems on the Lab network to search for vulnerabilities. Tip of the Month: Don’t Forget to Take Out the (Email) Trash
To
empty the Trash folder, pull down the File menu and click on “Empty
Trash.” That’s it.
Linux clusters are playing an increasingly important computational science role in research across Lab divisions. For many projects, a cluster assembled from off-the-shelf hardware and open-source software is a cost-effective way to obtain a high-performance system. But cutting through the hype and making sense of all the competing systems can be a real challenge. Fortunately, expertise is at hand. Lab Offers Loaner Cell Phones for Summer Travel If your Lab or personal cell phone doesn’t provide international access and you’ll be traveling overseas on Lab business, you can arrange a short-term rental (up to 30 days) of an international cell phone from ITSD’s Telephone Service Center. Read more about this service. As with all Lab-issue cell phones, users are responsible for reimbursing the cost of personal calls. |
|||||||||||||||||||||||
| Protecting Your Computer | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
| Top | ||||||||||||||||||||||||