How Ready Is Your Disaster Recovery Plan?
Disaster recovery testing is not always a favorite topic of IT professionals. For administrators it often requires late nights or weekend work and for managers it can be costly and disruptive to...
View ArticleNetbackup Error When Using UNC Path in Storage Unit in absolute Pathname
Hi One of our customer wants to give UNC Path in storage Unit in Netbackup,in absolute path name as shown in below screen shot.So after giving the UNC path for eg \\<server name>\<Folder...
View ArticleCustomer Success Story: Hubei Unicom Cuts Costs, Improves Availability with...
With nearly 12 million customers paying their bills each month, having 24x7 availability of its billing systems is paramount for Hubei Unicom. To ensure these systems are highly available, Hubei...
View ArticleSocial Scams - Part 1: Reusing Old Scams to Push Browser Extensions
Last year, we talked about scams and spam circulating on Facebook in our whitepaper. Social networking scammers often reuse common lures to trick users, such as offering free products or additional...
View ArticleSocial Scams - Part 2: How to Clean Up Your Browser and Facebook Timeline
During recent weeks, I have seen different scams on Facebook attempt to convince users to install Google Chrome extensions. I have noticed some conversations taking place around the scams; people not...
View ArticleIs Security a Myth?
Is it naïve of us to think we can ever be perfectly secure? Whether it’s physically or digitally there is always a risk that something bad is going to happen. To protect ourselves physically we install...
View ArticleNot What It Used To Be -- Endpoint Management evolves into a strategic...
Getting the right endpoint management solution in place is analogous to architecting and erecting a building. So where do you start? Read this interesting article by Patrick Spencer in the latest issue...
View ArticleConnect Dev Notes: 03 Apr 2013
User Facing: DesktopAdded a Workflow tab that authors can use to move their submissions through Connect's workflow states. This new feature also gives authors and Community Managers the ability to...
View Article: State University of New York (SUNY) Upstate Medical University Selects High...
SUNY’s Upstate Medical University is both a medical center and education institution. With a goal to improve its community through education, patient care, and research, the medical center’s 8,900...
View Articleソーシャル詐欺 - パート 2: ブラウザと Facebook のタイムラインを正常な状態に戻す方法
この数週間に、Google Chrome の拡張機能をインストールするようユーザーを誘う詐欺が Facebook 上でいくつも確認されています。このような詐欺は、あちこちで話題になっているようですが、詐欺師の投稿した写真を削除する方法や、詐欺の拡散を食い止める方法は知られていません。なかには、あきらめて Facebook...
View ArticleCyber Readiness Challenge - Paris
Le Cyber Readiness Challenge s’est déroulé à Paris le 27 mars dernier au Palais Maillot. L'évènement a été un succés et nous espèrons que vous vous êtes autant amusés, informés sur cet évènement que...
View ArticleUsing Symantec Protection Suite Enterprise Edition (SPS EE) to protect...
The increased use in the workplace of user-owned devices such as smartphones and tablets, often referred to as bring your own device (BYOD), provides businesses with significant productivity and cost...
View ArticleDeliver on Your Service Level Agreements at Vision
Vision Las Vegas is just around the corner, April 15-18. This year the Information Availability, Intelligence and Data Protection track focuses on business continuity, storage and solid state drives,...
View ArticleCustomer Success: Florida School District Centralizes Management & Security...
Hillsborough County Public Schools, located in Southwestern Florida, is one of the largest school districts in America, covering a total area roughly the size of Rhode Island. Over the last 10 years,...
View ArticleNetBackup Receives the Cisco UCS, VCE vBlock, and SAP HANA Stamp of Approval
Over the years I have talked to literally hundreds of customers about their backup needs. Besides reliability and performance, a key requirement is around flexibility of deployment. Customers don’t...
View ArticleHow to Implement a Successful Self-Service Strategy webcast - Recording now...
A recording of this webcast is now available here: http://bit.ly/10xFJQPLearn how to implement a successful Self-Service strategy that benefits both end-users and IT while fulfilling end-user...
View ArticleThe Java Virtual Machine has exited with a code of -1, the service is being...
I found an old thread titled "The Java Virtual Machine has exited with a code of -1, the service is being stopped." but it was closed and locked. So I'm posting this new info.Using SEP 12.1.2015.2015...
View ArticleHow to enable Windows firewall setting in Windows 7 machine in SEPM 12.1.2
How to enable Windows firewall setting in Windows 7 machine.Problem:SEP Client disabled Windows 7 firewall setting and showing error (This Setting are being managed by vendor application Symantec...
View ArticleShylock Beefing Up and Looking for New Business Opportunities
Shylock (a.k.a. The Merchant of Malice) is one of the most sophisticated banking Trojan horse programs presently occupying the financial fraud threat landscape. From its humble beginnings in 2011, it...
View Article