Amateur attackers can steal data from thousands of files in an IaaS cloud
We demonstrate how a relatively unskilled attacker could gain access to data from more than 11,000 files in unsecured IaaS cloud environments.続きを読む
View ArticleMind Your Back
Migrating from Windows 2003 Microsoft’s End of Support of Windows Server 2003 later this year has been much publicised. However for many organisations the true meaning of the tasks at-hand and the...
View ArticleNew! Veritas™ Capacity Assessment Tool
Quickly identify the amount of data to protect in an environment. We are excited to announce the NEW Veritas™ Capacity Assessment Tool. As partners and end users move to a simpler Capacity-base...
View ArticleThe Power of Go Channel
This article shows power of go channel, and goroutine with a leaky bucket implementation. 続きを読む
View ArticleMany Cultures, One Voice – Celebrating Asian-Pacific American Heritage Month
May is Asian-Pacific American Heritage Month in the United States, and we would like to take the opportunity to celebrate the generations of Asian Americans who have contributed to building the United...
View ArticleHow to delete the 7 months old catalog on Linux server
purge old catalog from Linux master server Hi all,one of our Symantec NetBackup master server indicating dis pools is full over 94%. we are having over nine old catalogs, each one is over 6 months...
View ArticleSymantec Unveils Cybersecurity Strategy at Interpol World Congress
Technology-driven security was right at the heart of the recent INTERPOL World Congress – with cybersecurity and Symantec’s leading solutions a key focus.A key message to come out of the event was...
View ArticleSymantec Workspace Virtualization & Streaming 7.6 Documentation
Symantec Workspace Virtualization & Streaming 7.6 contains the following products:Symantec Workspace StreamingSymantec Workspace VirtualizationSymantec Virtual ComposerThe following table lists the...
View ArticleBulk set custom location for packages on Package Server using SQL Query
Packages from Software Management Solution 7.xSometimes user wants to change location of packages on "Package Server" machine and don't want to use a C:\ system drive for package location.By default...
View ArticleBackup Exec Security Blogs
Enhanced Security for Backup Exec Database Backup software not only secures and protects your data, but it must also safeguard its own operating data. For Backup Exec, some sensitive data such as...
View ArticleCould The Empire Have Been Saved by Better Encryption?
Twitter カードのスタイル: summary I jumped at the opportunity to write this blog – as my son’s name is Luke and therefore, “Luke, I am your father”.Let’s remember that tense moment in Garbage Compactor...
View ArticleApril 2015: Most Popular Content in the Storage and Clustering Community
Check out what's trending in the community続きを読む
View ArticleBegun the cloud war has
Happy Star Wars Day - 12 posts on "begun the cloud war has"続きを読む
View ArticleToday is Silicon Valley Gives Day!
Symantec Matches the First $10,000 to Techbridge Girls Charity Today is Silicon Valley Gives Day, a 24-hour giving bonanza created to benefit charities throughout Silicon Valley. Last year, over 600...
View ArticleHow to use Horizon with Keystone V3
The V3 OpenStack Identity API has been available for a few years now. Although other services such as Nova and Glance have yet to implement V3 support, usage of V3 is gaining interest in the industry....
View ArticleSetting a Retention Category in Enterprise Vault
Setting up retention categories and applying them to archiving with Enterprise Vault can be quite a contentious issue. But, if you put that aside a question which comes up from time to time is how to...
View ArticleServiceDesk Workflows Modification Restricted
After the upgrade from ServiceDesk 7.1 to new version ServiceDesk 7.5 some Workflows that were able to modify now are restricted any change in version ServiceDesk 7.5.Following is the list of Workflows...
View ArticleInformation Security - Prevention is better than cure.
Training Your Employees on Information Security Awareness Protecting your company online begins with ensuring your employees are prepared to assist in keeping your computers and networks safe....
View ArticleGreat Resource
I would just like to say THANKS to Archiving and E-Discovery group. I work in a mid-size company and have to wear more that one hat. This group has been an invaluable resource to me. I can easily...
View ArticleCR in Action: Symantec’s FY15 Media Highlights
When a new year rolls around, people gather together to celebrate and reflect on the highlights of the past year. Symantec’s 2015 fiscal year wrapped up in March and we’ve got our sleeves rolled up and...
View Article