Subscribe

IT Perspective, Uncategorized
The Veritas Volume Replicator (VVR) Option provides organizations with a foundation for continuous data replication, enabling rapid and reliable recovery of critical applications at remote recovery sites. As an option to Veritas Storage Foundation by Symantec, Volume Replicator enables efficient replication of data over IP networks, giving organizations an extremely flexible, high-performance alternative to traditional array-based replication architectures.
Digital Design
Have you ever seen a drawing file you created with Civil 3D balloon in file size? Has this caused performance to take a nose dive? The following steps should help you get some improvement on getting smaller file size, and hopefully better performance:
Data & Storage, Uncategorized
How to utilize multiple data streams and multiplexing with Veritas NetBackup   Since the time of my last blog on tuning NetBackup, there have been several advances on how to utilize cloud storage in your overall data protection strategy.
Cloud Computing, Uncategorized
There’s lots of talk these days about how government technology innovation is being held back by legacy environments, so it’s refreshing to hear that cloud adoption by government agencies is set to “skyrocket”. That’s according to a new report by Forbes Insights.
Cybersecurity, Uncategorized
Earlier this spring, Symantec released its 2015 Internet Security Threat Report and as you can imagine the findings were pretty scary (if you don’t want to download the entire report, you can read the summary here).
Cybersecurity, Uncategorized
The IRS breach was exceedingly low-tech: it’s at the other end of the spectrum from the infamous and sophisticated Chinese hacking operations. This was just a bunch of bad actors who stole – or bought on the black market – personally identifiable information (PII) on a large number of American taxpayers. They accessed the IRS “Get Transcript” application, and provided answers (or educated guesses) in response to personal questions about their victims. This allowed them to access tax returns and other filings, facilitating lucrative identity thefts in the future.