Video Screencast Help

Search

Search results

*** THIS IS A TEST POST- PLEASE IGNORE *** Dear xyz Customer,         You will find here your BCS welcome pack that includes the following: - Quick Referrence Card - Kick Off presentation - BCS  Deliverables - MySymantec Guide ...
Article by Ziyad | 07 Oct 2013 | 0 comments
Microsoft SharePoint has become an increasingly powerful and popular tool for enterprise collaboration. While the main impetus behind SharePoint adoption is easy file sharing and collaborative document editing, the use of group calendaring, common lists, ...
Article by Swathi Turlapaty | 04 Sep 2009 | 0 comments
Companies risk billions of dollars in revenue and lost productivity each year due to loss of sensitive or confidential data. The primary sources for this loss are email systems, removable media, and mobile computers. Eliminating these damaging ...
Article by Swathi Turlapaty | 21 Aug 2009 | 2 comments
No two networks are alike. Because of this, every company should create its own backup strategy to provide the best possible data protection. The policy and template features in Symantec Backup Exec give you the ability to create specialized backup jobs ...
Article by Swathi Turlapaty | 20 Jul 2009 | 0 comments
The SRD is a collection of advanced diagnostic and recovery tools for Windows computers in one application. Putting the SRD on a USB flash drive gives you a convenient way to easily access these powerful tools whenever and wherever you need them. For ...
Article by Swathi Turlapaty | 22 Jun 2009 | 4 comments
For most companies Oracle database applications are critical to everyday business functions, therefore, regular, successful backup of Oracle data is a necessity. But not all Oracle installations are the same. The type of Oracle data, the frequency of ...
Article by Swathi Turlapaty | 22 Jun 2009 | 8 comments
To my knowledge Altiris Notification Server v6 (out of the box) does not allow you to collect information out of a text file. One of my clients needed to accomplish this and so I rolled it around in my head for a couple of days and came up with this ...
Article by Sean_Ebeling | 29 Apr 2009 | 3 comments
Like it or not, we’re living in an interconnected world. Wireless Internet is available in coffee houses, hotels and living rooms everywhere. Laptops that have logged on to these sometimes unsecured networks, and then log on to the company’s network pose ...
Article by Hear4U | 14 Apr 2009 | 2 comments
  With each high-profile data breach or new regulation, security attitudes seem to shift. Instead of the traditional “keep bad guys out” mentality, IT security concerns are increasingly focused on a more complex question: “What is going on here?” ...
Article by Hear4U | 14 Apr 2009 | 0 comments
Today's workforce is expanding and growing increasingly mobile with each passing year.  As recently as a decade ago, most of us were still sitting at desks typing on computers and answering landlines, and USB storage devices were nonexistent.  But ...
Article by Hear4U | 14 Apr 2009 | 1 comment