July 22, 2016 | Vas Vasiliadis

The certificate used by Globus Connect Personal endpoints to securely connect to Globus expires on August 9, 2016. We released updated packages with new certificates a few weeks ago. If you have not yet updated your Globus Connect Personal installation, you must do so before August 9th so that your endpoint continues to work.

July 17, 2016 | Vas Vasiliadis

Late last year we deprecated the scp command in the Globus command line interface (CLI), and provided features in the transfer command for parity. In the nine months since it was deprecated, most users have moved to using the transfer command and there is little use of the scp command.

May 26, 2016 | Vas Vasiliadis

The certificate authority used to issue service certificates for Globus Connect Server installations will expire on August 9, 2016. We have released an updated version of Globus Connect Server that contains the new certificate authority. Please update your installation prior to August 9th for uninterrupted use of your Globus endpoint(s). Click here for instructions on updating your endpoint.

March 14, 2016 | Argonne Today

Argonne researchers and staff now have access to the Globus data management service. A number of storage systems at the lab are already enabled for Globus use, including Mira, Vesta and the tape archive at the Argonne Leadership Computing Facility (LCF); various systems at the Laboratory Computing Resource Center (LCRC) and Center for Nanoscience Materials (CNM); and several beamlines at the Advanced Photon Source (APS). Argonne researchers have used Globus for many years to replace cumbersome and error-prone file transfer mechanisms such as sftp and rsync.

February 22, 2016 | Scientific Computing World

In an Analysis and Opinion piece, Tom Wilkie considers how the cloud will change computing for science. Globus is highlighted in one of the case studies about eMedLab, a consortium of seven academic research institutions.

February 17, 2016 | Vas Vasiliadis

On February 16, 2016 a new critical vulnerability CVE-2015-7547 - "glibc getaddrinfo() stack-based buffer overflow" was announced. We have reviewed the severity and impact to Globus services, partner services and users, and posted details of our findings in a new security bulletin. We recommend corrective action for users who are operating Globus endpoints on Linux systems - please read the security bulletin for further details.

February 11, 2016 | Vas Vasiliadis

We’re excited to announce changes to the way users access Globus that removes a lot of the “friction” currently associated with signing up and using the service. On February 13th, 2016, we will be upgrading the Globus authentication and authorization mechanisms so that users can access the service with their institutional username and password. This provides a familiar login experience and no longer requires users to create a separate Globus username and password just to use the service.

February 10, 2016 | Vas Vasiliadis

Recently, a new vulnerability was discovered in the Sparkle Updater framework on Mac OS, that is used by Globus Connect Personal to check for, and install, updates. All Mac users who have Globus Connect Personal installed should immediately update to the latest version so they are no longer vulnerable.

December 10, 2015 | Vas Vasiliadis

Note: This downtime was previously scheduled for January 30, 2016 and is now scheduled for February 13, 2016. We're delaying our release plans at the request of customers who would like additional time to test their systems' integration with new Globus functionality.

December 8, 2015 | Rachana Ananthakrishnan

The number of endpoints available in Globus has increased significantly, motivating a better solution for users to find the endpoints they need and use on a regular basis. With our latest release, we have improved the ability to discover endpoints by allowing users to search for an endpoint using attributes such as name and organization, and to bookmark frequently-used endpoints.