111 EMC CONFIDENTIAL—INTERNAL USE ONLY Copyright © 2002 Legato Systems, Inc. Peter Booth 14July, 2005.

Slides:



Advertisements
Similar presentations
Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Advertisements

Business Development Suit Presented by Thomas Mathews.
Chapter 20 Oracle Secure Backup.
COMOS Mobile Solutions 1.0 Simplified global collaboration
Operating System.
29 Oded Moshe, Director of Product Management Beta Release May 3rd, 2010 Official Release May 24, 2010.
Copyright © 2002 Legato Systems, Inc. Legato Confidential.
DataGrid is a project funded by the European Union 22 September 2003 – n° 1 EDG WP4 Fabric Management: Fabric Monitoring and Fault Tolerance
Oracle 10g Database Administrator: Implementation and Administration
Requirements Preview Chutes&Ladders. Requirements The User Registration System manage all user access to the Application. System will allow the creation,
NETOP ONDEMAND What’s new in version 2.1? DECEMBER 09 NETOP ONDEMAND1.
Software Distribution in Microsoft System Center Configuration Manager v.Next: Part 1.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
The Right Choice for Call Recording OAISYS and ShoreTel: Call Recording Solution Configuration.
Installing and running COMSOL on a Windows HPCS2008(R2) cluster
QAD .Net UI: New Enhancements
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
Module 10 Configuring and Managing Storage Technologies.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 6: Windows File and Print Services.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Passive Monitoring with Nagios Jim Prins
1Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8 Reporting from Contract.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—2-1 Administering Cisco Unified Communications Manager Understanding Cisco Unified Communications.
CICS – Mainframe (LC) 2 Copyright © 2005, Infosys Technologies Ltd ER/CORP/CRS/TP01/003 Version No: 1.0 Course Schedule Day1 - Introduction to CICS Day2.
11 Copyright © 2005, Oracle. All rights reserved. Configuring the Oracle Network Environment.
5 Copyright © 2004, Oracle. All rights reserved. Using Recovery Manager.
1 © Copyright 2009 EMC Corporation. All rights reserved. ISIS and PixTools Toolkits Quickly Enabling Document Capture Solutions EMC Corporation.
Nightly Releases and Testing Alexander Undrus Atlas SW week, May
Module 7: Fundamentals of Administering Windows Server 2008.
111 EMC CONFIDENTIAL—INTERNAL USE ONLY NMC -- NW Administration NMC Team NetWorker 7.3 TOI July 28, 2005.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Chokchai Junchey Microsoft Product Specialist Certified Technical Training Center.
May l Washington, DC l Omni Shoreham Parallels Pro, H-Sphere and Helm Roadmap and Vision Speaker Name Speaker Title, Speaker Company.
Copyright © 2002 Legato Systems, Inc. AlphaStor 3.1 Support in NW Dan Gajanovic Legato Confidential.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
1. Test Information Distribution Engine (TIDE) 2.
11 BACKING UP AND RESTORING SYSTEMS AND DATA Chapter 15.
Copyright © 2002 Legato Systems, Inc. Version: 1.0 Author: Shu-na Chu Doc d1795 Version: 1.0 Author: Shu-na Chu Doc d1795 8/11/2005 Legato Confidential.
Linux Kernel Management. Module 9 – Kernel Administration ♦ Overview The innermost layer of Linux operating system is the kernel, which is a thin layer.
DAT 332 SQL Server 2000 Data Transformation Services (DTS) Best Practices Euan Garden Product Unit Manager SQL Server Development Microsoft Corporation.
A Technical Guide to ERMS Bill Manago, CRM. What You Need to Plan For Implementing an Electronic Records Management System Out of the Box What you should.
Copyright © 2002 Legato Systems, Inc.
Unicenter NSM Repository Bridge 3.1 -> r11. © 2005 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos.
WCL303 Business Desktop Deployment (BDD) 2007: Part 2, Deploying the 2007 Office system Michael Niehaus Systems Design Engineer Microsoft
User Choice compliance audit information session Training and Assessment evidence requirements July 2015 Drew Clark and Rod Harris.
3 Copyright © 2006, Oracle. All rights reserved. Using Recovery Manager.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
111 EMC CONFIDENTIAL—INTERNAL USE ONLY Mail Home Munira Manasawala NetWorker 7.3 TOI July 19, 2005.
To provide the world with a next generation storage platform for unstructured data, enabling deployment of mobile applications, virtualization solutions,
System Design for Home Automaton. Design Goals Performance Criteria – Server prioritizes client requests to provide quick response time to critical requests.
© 2002, Cisco Systems, Inc. All rights reserved..
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
Unit 1: IBM Tivoli Storage Manager 5.1 Overview. 2 Objectives Upon the completion of this unit, you will be able to: Identify the purpose of IBM Tivoli.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
4 Copyright © 2004, Oracle. All rights reserved. Managing the Oracle Instance.
Fundamental of Databases
Graphical Data Engineering
Developing IoT endpoints with mbed Client
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Direct Attached Storage and Introduction to SCSI
2018 Real Dell EMC E Exam Questions Killtest
Modular Object Scanning Technology (MOST)
Technical Capabilities
Backup Monitoring – EMC NetWorker
Backup Monitoring – EMC NetWorker
IBM Tivoli Storage Manager
OpenStack for the Enterprise
Presentation transcript:

111 EMC CONFIDENTIAL—INTERNAL USE ONLY Copyright © 2002 Legato Systems, Inc. Peter Booth 14July, 2005

22 EMC CONFIDENTIAL—INTERNAL USE ONLY Introduction  Overview of NetWorker 7.3 (Keystone) plan for Beta and Transfer of Information sessions (TOI’s)  Major new features (full TOI’s to be delivered)  Minor new features (Written summaries will be provided)  Other new features (Small, very minor changes, summarized in this session) and miscellaneous  Questions and Answers

33 EMC CONFIDENTIAL—INTERNAL USE ONLY Overview of NetWorker 7.3 (Keystone) plan for Beta and Transfer of Information sessions (TOI’s)  Many new features aimed at usability and stability and EDM conversions and TCE(Total Customer Experience).  Core feature TOI’s will be delivered over the next 4 weeks (15 separate days), generally 2 hours a day.  Unlike in past Beta’s, we will be utilizing an external eRoom for customers to log their issues. A process will be distributed.  Support attendees will also be participating in the Beta by monitoring the eroom for issues from customers. Support engineers and customers will be provided information regarding case handling prior to the beginning of beta.

44 EMC CONFIDENTIAL—INTERNAL USE ONLY Overview of NetWorker 7.3 (Keystone) plan for Beta and Transfer of Information sessions (TOI’s) cont’d  Written summaries for new features not requiring a full TOI will be provided over the next two weeks. (as they are completed and approved for distribution).  Recorded presentations will be available shortly after each presentation is completed.  Customer documentation (Admin Guides, Install Guides and Release Supplement) will be available when the beta begins. These should be reviewed for any limitations for the Beta and possibly for GA.

55 EMC CONFIDENTIAL—INTERNAL USE ONLY Features and TOI Schedule  Cloning and Browse Retention (7/19/05)  Mail Home (7/19/05)  NMC Install And Update(7/21/05)  NMC Usability (7/21/05)  NMC - Device Configuration & Volume Management (7/26/05)  NMC - Monitoring & Reporting (7/26/05)  Savesets and Jobs (7/28/05)  Authentication (8/2/05)  Nsrjb robustness and SN Affinity list (8/4/05)  Advanced File Type Devices (8/9/05)  SCSI Reserve/Release (8/9/05)  NSR Shutdown (8/11/05)  Threads (8/11/05)

66 EMC CONFIDENTIAL—INTERNAL USE ONLY Other Features Key4013Solaris Extended File Attributes Support Key4018Large Records in Media DB Key4032Windows platform option to disable/enable 8.3 filenames Key4033NW I18N Key4070Scanner “end silently” option to automate MDB rebuilds NoneUser Documentation Key7004New Features/functionality Performance Key8001Supported Operating Systems Key8007System Memory Requirements Key8003Supported File Systems, Volume Managers Key8400Supported Storage Networking Environments Key8500Supported VSS writers Key9301Disable Access Control Enablers in core NW LGTpa56256Device and Jukebox "server network interface" LGTpa56360Idle Device Unload LGTpa56367new attribute 'max parallelism' for pools LGTpa56358Don't save bootstrap if 'no index save' is set. CR47Mac ACL CR16 Allow pstclnsave to terminate itself when savegrp/savepnpc exits abnormally

77 EMC CONFIDENTIAL—INTERNAL USE ONLY Questions??  Any questions that have not been answered yet?  Thanks for attending  Questions after the session can be forwarded to until the end of beta.  Remember that we are striving for Total Customer Experience (TCE): TCE is EMC’s company-wide commitment to consistently exceed our customers’ expectations for quality, service, innovation, and interaction"

88 EMC CONFIDENTIAL—INTERNAL USE ONLY References  Where to learn more –Document repository numbers –Pointers to other documentation