Video Screencast Help

Search

Search results

If you have a need for software that is not included in Linux PE this is a guide on how you can add it dynamacly when needed. 1 Build enviroment To build packages you need to have a linux RHEL 5.5 where you can create the packages. 2 ...
Article by Mikael Ulvesjö | 10 Jun 2015 | 0 comments
Trends in Trust on the internet of Things We are all happy with how technology is making our lives easier and fulfilling. Most of the internet population is however not aware that the moment you turn on a device connected to internet or ...
Article by dion_alken | 22 Apr 2015 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how NetBackup ...
Article by GFK | 22 Jan 2015 | 0 comments
Red Hat and Symantec together offer enterprise IT organizations a highly available and highly scalable virtualization infrastructure for traditional and cloud-enabled applications. Red Hat Enterprise Virtualization provides an enterprise-ready ...
Article by Patric Uebele | 11 Dec 2014 | 0 comments
With the release of 12.1.5337.5003 you can now manage the Linux client from the Symantec Endpoint Protection Manager (SEPM). You are now able to configure these exclusions from the SEP Manager, via an Exceptions policy. However if you still need to use ...
Article by DSOLO | 04 Dec 2014 | 0 comments
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints". These Blueprints are designed to show backup and recovery challenges around specific technologies or functions and how Backup Exec ...
Article by GFK | 07 Nov 2014 | 0 comments
Data Center Architecture In data centers like Cisco's UCS (Unified Computing System), every server be it blade or rack-mount, is provisioned through a Service Profile. Just the way a SIM card holds an identity of a mobile phone, the ...
Article by Kshitij_Korde | 31 Oct 2014 | 1 comment
A Full Unix/Linux client recovery from a backup image requires setting up a recovery environment on the target client hardware specifically for the activity. Overwriting system files on a running system will cause it to crash and leave it in a non-boot ...
Article by Jaime_Vazquez | 15 Jul 2014 | 0 comments
Let me start off by saying, this was done to reduce the need for loading network drivers on the WinPE discs and so far has worked for most systems without issue, with that being said, we have had a few machines that have displayed issues with the GPT ...
Article by bl_fowler | 18 Mar 2014 | 0 comments
Cena comum no departamento de TI de praticamente qualquer empresa: Precisamos comprar um novo Storage! Seja porque o Storage atual está próximo a ficar sem garantia, ou não suporta mais a performance dos ambientes a que serve, ou mesmo a necessidade ...
Article by RAPHAEL F CARVALHO | 06 Mar 2014 | 0 comments