Video Screencast Help

Search

Search results

I have recently been tasked with the establishment of an IT Disaster Recovery plan for my company, part of which was the best way of protecting our Small Business Server 2003 installation. Whilst I have been using Backup Exec in its various guises ...
Article by DR0701 | 06 Apr 2009 | 0 comments
If a catastrophic failure requires repair or replacement of your server, you can't afford for your systems to be down for an extended amount of time. Server downtime causes lost productivity and revenue, makes it difficult for internal employees to ...
Article by Swathi Turlapaty | 13 May 2009 | 1 comment
When you have to take your system offline because of a hardware problem or migration, you need to restore your operations as quickly and efficiently as possible so you can get back to business. The key to a successful system recovery is having a fully ...
Article by Swathi Turlapaty | 13 May 2009 | 0 comments
In Part 1 of this TechTip, we discussed why it is important to use a Symantec Recovery Disk (SRD) containing the correct drivers to ensure the success of a system restore operation. In Part 2, we will talk about how to create a customized SRD. From ...
Article by Swathi Turlapaty | 13 May 2009 | 2 comments
Recovering a system involves more than just booting up and reinstalling programs. You need to plan ahead to be sure that your recovery disk contains all the drivers that will be required by the hardware components of your system. You don't want to ...
Article by Swathi Turlapaty | 13 May 2009 | 4 comments
In Part 1 of this TechTip, we discussed the importance of regular backups and we also looked at the differences between a base backup and an incremental backup. In Part 2, we will talk about how to schedule both types of backups. When you schedule a ...
Article by Swathi Turlapaty | 03 Mar 2009 | 0 comments
Information is the lifeblood of modern business. Losing a system can result in loss of data, which can severely handicap a company or even put it out of business. Protecting critical data as well as the systems on which it is stored is of critical ...
Article by Swathi Turlapaty | 13 May 2009 | 2 comments