May 2006
UNIX Update;May2006, Vol. 17 Issue 5, p1
Trade Publication
The article focuses on the announcement by Syncsort Incorporated that Backup Express, its data protection product, has been YES! Certified with Novell SUSE LINUX Enterprise Server 9, Service Pack 1 and Open Enterprise Server Linux. Backup Express was the first solution to offer data protection for clustered OES environments and continues to provide the most reliable Linux support in the data protection market. It has strong support for all of Novell's products and the two companies are working together to create the next generation of integrated storage solutions. YES certification testing ensures that Novell customers can easily identify and purchase third-party hardware and software products that are proven to be compatible with the Novell product lines.


Related Articles

  • TWO DATA-SAVING SCENARIOS.  // Popular Science;Mar2005, Vol. 266 Issue 3, p74 

    Features several backup software and hardware. Maxtor OneTouch II; True Image; Hand Backup; Simpletech's Bonzai drives. INSET: [Backup Tips].

  • Threat trends: Symantec provides insight into Internet dangers.  // Finance Week;12/13/2004 Supp Platform, p42 

    The article focuses on the bi-annual Internet Security Threat Report provided by Symantec Corp., which is the world's foremost security software, hardware and services company. The report is an indication of the nefarious activities on the Internet including attacks, vulnerability and malicious...

  • XSGuard C-Series.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2005, p58 

    Evaluates XSGuard C-Series intrusion prevention system. Key features; Advantages and disadvantages.

  • Secure Instant Messages. Garza, Victor R.; McDonald, Anne B. // PCWorld;Nov2003, Vol. 21 Issue 11, p96 

    Reviews the IMsecure Pro software program from Zone Labs.

  • ASK THE EXPERT. Schulz, Greg // Storage Magazine;Nov2005, Vol. 4 Issue 9, p10 

    This article answers the question on whether the LUN can simultaneously be used by two or more servers and a common application. It can be used simultaneously if volume and/or file synchronization software is being used. Without the software, there is no way to coordinate access to changed data...

  • Information Assurance Technical Framework.  // Network Dictionary;2007, p243 

    An encyclopedia entry on the "Information Assurance Technical Framework" (IATF) is presented. The IATTF defines IATF as a set of guidelines for ensuring the security of information and information infrastructures. Moreover, the framework defines a process for developing a system with information...

  • Vulnerability Scanning.  // Network Dictionary;2007, p520 

    An encyclopedia entry for "Vulnerability Scanning" in computer security is presented. It refers to the process of using some software or hardware tools to identify vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened....

  • Security goes soft (ware). Hawley, Steve // Telephony;Oct2007 IPTV Supplement, Vol. 248, p24 

    The article focuses on the hardware- and software-based approaches to video content security. It is considered that hardware-based content security adds significant cost to the deployment. The author stresses that content protection systems offer interlocking capabilities such as encryption and...

  • Backup Tips.  // Sum News;Summer2006, Vol. 17 Issue 3, p31 

    The article provides tips for protecting computer back up systems. The back-up medium should be portable to facilitate offsite storage. Additional secondary back-up copy should be provided in when primary back-up medium problems occur. It is also necessary to use more tapes, rotated on a daily...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics