Configuring Redis High Availability
This article describes how to configure active-passive high availability(HA) for a group of Redis instances. I avoid using cluster because Redis Cluster is the mechanism to distribute shards to...
View ArticleBackup up individual folders/files via NDMP on an Isilon Cluster
Here is a tutorial on how to Backup up individual folders/files via NDMP on an Isilon Clusterhttps://www-secure.symantec.com/connect/forums/ndm...
View ArticleIs your phone’s gyroscope snooping on your conversations?
Researchers show how a smartphone’s gyroscope can be used as a microphone.続きを読む...
View ArticleEpidigitalogy: Digital Disease Control (Part V)
Trust in our Digital Cities Trust In Our Digital Cities During Dr. Snow’s time the general belief was that cities were unhealthy, and humanity was not destined to live there due to the prevalence...
View ArticleEpidigitalogy: Digital Disease Control (Part VI)
Samples and References Survey Study Tools The following tables, graphs and visualizations are examples of tools for performing continuous surveying of digital populations.Cohort Study A...
View ArticleVMWorld 2014 - Day 2
"And... here, we, go." “And… here, we, go.” – (Heath Ledger’s immortal performance as Joker)The opening reception was actually as expected, it was bigger than ever; at least it seemed that way, looking...
View ArticleCannot access Process Manager portal
When trying to access Process Manager portal the browser states "Page Cannot Be Displayed"You may see these kinds of errors in the Windows Event Logs:computer | Error | 10/27/2008 2:56:05 PM |...
View ArticleTrojan Backoff: A new point-of-sale threat emerges
US businesses are being warned about Trojan Backoff, a new point-of-sale malware capable of stealing credit and debit card information.続きを読む...
View ArticleWhen Your Business’ Data is on the Line, Hope is NOT a Strategy
Surveys have proven that the majority of small businesses do not have a disaster recovery plan in place, yet something as simple as an IT manager spilling a cup of coffee on a system could destroy a...
View ArticlePhishers use glamour model images as bait, steal Facebook user logins
New phishing campaigns mimic Facebook’s branding and display images of glamour models to lure victims.続きを読む...
View ArticleVMWorld 2014 - Day 3
Virtualize with confidence. One of my favorite things about VMWorld is the attendee mindset. People come here to have fun and socialize, and San Francisco is a great town, but they are here first and...
View ArticleLet’ not Talk About PHI for a Moment, let’s Talk about Intellectual Property
Why this post?Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was...
View ArticleTrojan Backoff: POS システムを狙う新たな脅威
米国の企業に対して、店頭レジ端末(POS)を狙う新たなマルウェア Trojan.Backoff に関する勧告が発行されています。このマルウェアは、クレジットカードやデビットカードの情報を盗み出す機能を備えています。続きを読む...
View ArticleITMS 7.5 SP1 HF2 is now available
ITMS 7.5 SP1 HF2 is available through SIM. It has fixes for the following components:Symantec Management PlatformDeployment SolutionInventory SolutionYou can access the ITMS 7.5 SP1 HF2 release notes...
View ArticleSymantec Endpoint Protection release details
This blog contains all the versions of SEP and SEPM (Symantec Endpoint Protection Manager) which were released since the first version of SEP in Sep 2007.It contains the Enterprise Editions (EE) and...
View ArticleVMWorld 2014 - Day 4
Wrap-up, Closing Thoughts, and Till Next Time... It’s one of the highlights of the year, and this year not only didn’t disappoint, it was the best one yet. While the conference is officially ending...
View ArticleResponding to Data Breaches in the Healthcare Industry
The healthcare industry has for years been the number one industry in reported data breaches. But this dubious honor has been driven in some part because healthcare has the most stringent reporting...
View ArticleSustainability Spotlight – EMEA Welcomes New Corporate Responsibility Manager...
From climate change to cyber security to employee diversity, corporate responsibility (CR) and sustainability touches every aspect of Symantec’s business. We’ve defined our strategy and are continually...
View ArticleU.S. Banks Breached in Cyberattack: What Bankers Should Do To Stay Protected
At least five U.S. banks have been targeted in a sophisticated cyberattack this month. New York Times reported that hackers breached the network and stole gigabytes of sensitive information, including...
View Article