Quantcast
Channel: Symantec Connect - ブログエントリ
Browsing all 5094 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Configuring Redis High Availability

This article describes how to configure active-passive high availability(HA) for a group of Redis instances. I avoid using cluster because Redis Cluster is the mechanism to distribute shards to...

View Article


Backup up individual folders/files via NDMP on an Isilon Cluster

Here is a tutorial on how to Backup up individual folders/files via NDMP on an Isilon Clusterhttps://www-secure.symantec.com/connect/forums/ndm...

View Article


VMWorld 2014 - Day 1

A running blog about the VMWorld 2014 conference.続きを読む...

View Article

Is your phone’s gyroscope snooping on your conversations?

Researchers show how a smartphone’s gyroscope can be used as a microphone.続きを読む...

View Article

Epidigitalogy: Digital Disease Control (Part V)

Trust in our Digital Cities Trust In Our Digital Cities     During Dr. Snow’s time the general belief was that cities were unhealthy, and humanity was not destined to live there due to the prevalence...

View Article


Image may be NSFW.
Clik here to view.

Epidigitalogy: Digital Disease Control (Part VI)

Samples and References Survey Study Tools     The following tables, graphs and visualizations are examples of tools for performing continuous surveying of digital populations.Cohort Study      A...

View Article

VMWorld 2014 - Day 2

"And... here, we, go." “And… here, we, go.” – (Heath Ledger’s immortal performance as Joker)The opening reception was actually as expected, it was bigger than ever; at least it seemed that way, looking...

View Article

Cannot access Process Manager portal

When trying to access Process Manager portal the browser states "Page Cannot Be Displayed"You may see these kinds of errors in the Windows Event Logs:computer | Error | 10/27/2008 2:56:05 PM |...

View Article


Trojan Backoff: A new point-of-sale threat emerges

US businesses are being warned about Trojan Backoff, a new point-of-sale malware capable of stealing credit and debit card information.続きを読む...

View Article


When Your Business’ Data is on the Line, Hope is NOT a Strategy

Surveys have proven that the majority of small businesses do not have a disaster recovery plan in place, yet something as simple as an IT manager spilling a cup of coffee on a system could destroy a...

View Article

Phishers use glamour model images as bait, steal Facebook user logins

New phishing campaigns mimic Facebook’s branding and display images of glamour models to lure victims.続きを読む...

View Article

VMWorld 2014 - Day 3

Virtualize with confidence. One of my favorite things about VMWorld is the attendee mindset. People come here to have fun and socialize, and San Francisco is a great town, but they are here first and...

View Article

Let’ not Talk About PHI for a Moment, let’s Talk about Intellectual Property

Why this post?Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was...

View Article


Trojan Backoff: POS システムを狙う新たな脅威

米国の企業に対して、店頭レジ端末(POS)を狙う新たなマルウェア Trojan.Backoff に関する勧告が発行されています。このマルウェアは、クレジットカードやデビットカードの情報を盗み出す機能を備えています。続きを読む...

View Article

ITMS 7.5 SP1 HF2 is now available

ITMS 7.5 SP1 HF2 is available through SIM. It has fixes for the following components:Symantec Management PlatformDeployment SolutionInventory SolutionYou can access the ITMS 7.5 SP1 HF2 release notes...

View Article


Symantec Endpoint Protection release details

This blog contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in Sep 2007.It contains the Enterprise Editions (EE) and...

View Article

VMWorld 2014 - Day 4

Wrap-up, Closing Thoughts, and Till Next Time... It’s one of the highlights of the year, and this year not only didn’t disappoint, it was the best one yet. While the conference is officially ending...

View Article


Responding to Data Breaches in the Healthcare Industry

The healthcare industry has for years been the number one industry in reported data breaches.  But this dubious honor has been driven in some part because healthcare has the most stringent reporting...

View Article

Sustainability Spotlight – EMEA Welcomes New Corporate Responsibility Manager...

From climate change to cyber security to employee diversity, corporate responsibility (CR) and sustainability touches every aspect of Symantec’s business. We’ve defined our strategy and are continually...

View Article

Image may be NSFW.
Clik here to view.

U.S. Banks Breached in Cyberattack: What Bankers Should Do To Stay Protected

At least five U.S. banks have been targeted in a sophisticated cyberattack this month. New York Times reported that hackers breached the network and stole gigabytes of sensitive information, including...

View Article
Browsing all 5094 articles
Browse latest View live