EV in the Snake Pit (Part III)
Doing things to EV with Python. Part III of III, full utility at the end続きを読む...The zip file contains the full scritp
View ArticleLGBT Pride Series - Sustainability Spotlight on Cass Averill
From employee diversity to climate change to cyber security, corporate responsibility (CR) and sustainability touches every aspect of Symantec’s business. We’ve defined our strategy and are continually...
View ArticleBackup Exec Install Blog (A Common SQL 2008 R2 Upgrade Failure)
The purpose of this blog is to add some detail behind the steps in http://www.symantec.com/docs/TECH216807. It is one of the more common failures seen when upgrading from earlier versions of Backup...
View ArticleNew Amendments to FRCP - part 1
Rule 26 The new rules are designed to force both parties to limit the amount of documents and scope to the essential parts that each party want to address. As these new rules are adopted by both...
View Article3 Tips to Connect and Rise above the Noise
Symantec's Vice President of Brand, Digital, and Advertising, Alix Hart, shares pro tips on how the Symantec brand effectively connects with its customers.続きを読む...
View ArticleNico Nico Users Redirected to Fake Flash Player
Some of the video site's users were sent to a Web page that delivers malware.続きを読む...
View ArticleMeet the Engineers – Manoj Chanchawat
Still remember the day when I joined Symantec almost 9+ years back. Started my career as a developer in Symantec Control Compliance Suite and it’s a long journey since then in Symantec, with current...
View ArticleMigrating to IT Management Suite 7.5 SP1
A migration is when you install the latest version of the IT Management Suite solutions on a new computer, and then migrate the data from the earlier ITMS solutions to the latest version of the...
View Article偽の Flash Player に誘導されるニコニコ動画ユーザー
一部の動画共有サイトのユーザーが、マルウェアを配布している Web サイトに誘導されています。続きを読む...
View ArticleDo You Believe In Magic?
Pop Quiz: The Enterprise Backup and Recovery software market is:DramaticControversialIn the Midst of an UpheavalAll of the AboveYep. This year the industry analysts are acknowledging the most...
View ArticleWhen Time = Money: A Lost Opportunity Cost Formula For Security Incident...
I’ve been involved in incident response for a long time; whether as a client, consultant or working for Symantec, and have seen something that has been pretty consistent over these many years: the time...
View Article3 Mistakes and Their Remedies Whilst Choosing Printer Dust Covers
Choosing Printer Dust Covers It is important to pick the right printer cover whilst giving contractor dust protection to your printing equipment from dust and moisture ravages. Significantly you’ll be...
View ArticleGetting Used to Enterprise Vault 11 Query Syntax
If you're lucky enough to have upgraded your production Enterprise Vault environment to Enterprise Vault 11, you will have started to get used to the new Enterprise Vault Search interface. Even if you...
View ArticleImportant update of the Symantec Knowledgebase for DLP and Data Insight...
The Knowledgebase has moved to a new location The following important changes are being made to the Symantec Data Loss Prevention (DLP) and Data Insight (DI) Knowledgebase.The content for both...
View ArticleScaling Your Data Horizontally On OpenStack
MagnetoDB: NoSQL Database As A Service You’re talking to one of your users about hosting a new application on your OpenStack deployment. One of the first questions they ask you is: “I’m running my...
View ArticleE-card Spam Claims to Help Users Get Rich Quick
The scam uses websites that pose as legitimate companies to trick people.続きを読む...
View ArticleIntegrated Appliances Reshaping the Backup Market
Integrated backup appliances did not exist in the minds of many backup administrators four years ago when Symantec brought an innovative approach to the backup appliance world: a customer-focused...
View ArticleBYOD vs. CYOD: What's Right For Your Business?
BYOD or CYOD? Find out how to determine which is best for your business, and how to keep your company data safe with an increasingly mobile workforce.続きを読む...
View ArticleSave the Date: Backup Exec Twitter Chat on June 27, 2014
Join Symantec Backup Exec experts for a Tweet Chat on Friday, June 27 at 11 a.m. PT / 2 p.m. ET to chat and learn more about Backup Exec 2014.Backup Exec 2014 released earlier this month brings in a...
View ArticleWebcast: Elevate your Security Profile with SDN/NFV and Security Orchestration
July 15, 2014 - Sponsored by Light Reading and Symantec Please join Light Reading and Symantec for a webcast titled Elevate your Security Profile with SDN/NFV and Security Orchestration on July 15,...
View Article