Video Screencast Help

Search

Search results

Introduction Inventory Solution provides hardware and software details on devices in your environment. Understanding how Inventory works, and how to troubleshoot problems, will give you the confidence needed to report accurate, relevant data. This is ...
Article by Joel Smith | 28 Apr 2014 | 1 comment
Introduction In previous versions of Inventory Solution Internet Explorer was well reported. By moving to the CIM (Common Information Model) Inventory lost some of the robust report of Internet Explorer. This article demonstrates how to setup ...
Article by Joel Smith | 26 Feb 2014 | 2 comments
About Symantec Software Resource Replicator The Symantec Software Resource Replicator utility is designed to migrate “logical” information for deliverable software resources from one Notification Server to another. Note that the utility does not ...
Download by Joel Smith | 06 Feb 2014 | 2 comments
Whether you need to create a custom report, or a custom network device filter based on Inventory Data in Inventory Solution for Network Devices 7.1, knowing the database schema is important.  If you are new to Inventory Solution in version 7.1, this ...
Article by Joel Smith | 10 Apr 2013 | 0 comments
Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.1, knowing the database schema is crucial. This document provides technical details on the data structure.  In Part 1 the Operating ...
Article by Joel Smith | 27 Mar 2013 | 0 comments
Note: Please refer to the attached document for the article contents and all live links contained in this article. This is Part 2 of a 2 part article series detailing the data classes for Inventory Pack for Servers 7.1, providing administrators ...
Article by Joel Smith | 12 Mar 2013 | 0 comments
Note: Please refer to the attached document for the article contents and all live links contained in this article. This is Part 1 of a 2 part article series detailing the data classes for Inventory Pack for Servers 7.1, providing administrators ...
Article by Joel Smith | 12 Mar 2013 | 0 comments
Issue: We have seen a variety of issues where data that is initially captured from an Inventory Policy is subsequently removed from the database. In most cases the first inventory capture works, but any subsequent ones send up blank data, stripping ...
Article by Joel Smith | 22 Aug 2012 | 12 comments
Recent news revealed source code theft from Symantec back in 2006. At the time this article was published, only one product still contained code that the source code revealed vulnerabilities: pcAnywhere. The current version of pcAnywhere is safe from ...
Article by Joel Smith | 03 Feb 2012 | 0 comments
The Software Management model stems from the Software Resource Model, or the SRM. The SRM is used by the Platform and many Solutions, tying together the sometimes disparate frameworks different Solutions use to manage or otherwise track Software. This ...
Article by Joel Smith | 01 Feb 2012 | 2 comments