One thing my pointy haired boss has long held close to his chest is BE. He brought it with him from another department here, and has been doing all of the scheduling/monitoring etc since then.
Me, I'm a dinosaur. Give me FDR please. Or if you can't then at least give me something that works and makes sense.
I've got real issues with pretty much any non-mainframe product I've been exposed to.
But the boss is like a senior director now and somebody has to pry BE from his fingers and that somebody is me.
So I'm looking at what he is doing and I'm not liking what I see.
Todays example is a job which is duplicating a backupset from a disk folder on an EMC AX4 to a LTO3 tape drive. Both devices are attached via 4Gb fibre, and neither is getting beat on by anyone else.
The duplication job is running below 300MB/minute...What?
If moving the data was the constraint I'd expect a bare minimum of 10-15 time that.
Does this POS bottleneck on its database or something? Even a quick look at task manager shows that the CPU is running in the single digits, and commit charge is less that 25% of real memory.
Symantec doesn't seem to have a lot to say about performance other than buffering. Can his setup be this far out of whack?
I asked him, and he is not an idiot. What he told me is that anecdotally if the transfer rate was low during the initial backup then he sees a similar rate during the duplication run.
Can I get some hints or at least a bit of sympathy?

  1. Symantec Scsi & Raid Devices Driver Download 64-bit
This content has been archived, and is no longer maintained by Indiana University. Information here may no longer be accurate, and links may no longer be available or reliable.

Adaptec AHA-151X/AHA-152X or AIC-6260/AIC-6360 SCSI Host Adapter (non-pnp). SCSI drives are nothing but external hot swappable USB drives. Reference: How to block USB Thumb Drives and USB Hard Drives, but allow specific USB Drives in the Application and Device Control Policy in Symantec Endpoint Protection. Integrated Adaptec AIC-7892 SCSI controller (BIOS version 3.10) Fujitsu 18GB Ultra160 SCSI hard drive (known good) this system has always booted to this controller and drive Symptoms: Symantec Enterprise Ghost 8.0 hangs with only the mouse pointer for about 20-30 seconds before displaying it's splash screen. DRIVER ADAPTEC 7856T WINDOWS XP. Raid manager command line utility. Operating systems secure, ask ubuntu download adaptec. Review, adaptec 29160 scsi card. Adaptec storage manager. Hardware reporter adaptec, microsoft windows server, hba microsoft windows, driver red hat. Jeff field hardware reporter adaptec. Insert linux distribution. Command line interface, adaptec medical devices.

Symantec Endpoint Protection for Macintosh and Windows, availablevia IUware, combines technologies from previous Symantecproducts:

SymantecDownload
  • Antivirus and antispyware: Antivirus and antispyware scans detect viruses and other security risks, including spyware, adware, and other files, that can put a computer or a network at risk.
  • Personal firewall: The Symantec Endpoint Protection firewall provides a barrier between the computer and the Internet, preventing unauthorized users from accessing the computers and networks. It detects possible hacker attacks, protects personal information, and eliminates unwanted sources of network traffic.
  • Intrusion prevention: The intrusion prevention system (IPS) is the Symantec Endpoint Protection client's second layer of defense after the firewall. The intrusion prevention system is a network-based system. If a known attack is detected, one or more intrusion prevention technologies can automatically block it.
  • Proactive threat scanning: Proactive threat scanning uses heuristics to detect unknown threats. Heuristic process scanning analyzes the behavior of an application or process to determine if it exhibits characteristics of threats, such as Trojan horses, worms, or keyloggers. This type of protection is sometimes referred to as zero-day protection.
  • Device and application control: Device-level control is implemented using rule sets that block or allow access from devices, such as USB, infrared, FireWire, SCSI, serial ports, and parallel ports. Application-level control is implemented using rule sets that block or allow applications that try to access system resources.
  • Kernel-level rootkit protection: Symantec Endpoint Protections expands rootkit protection to detect and repair kernel-level rootkits. Rootkits are programs that hide from a computer's operating system and can be used for malicious purposes.
  • Role-based administration: Different administrators can access different levels of the management system based on their roles and responsibilities.
  • Group update provider: Symantec Endpoint Protection clients can be configured to provide signature and content updates to clients in a group. When clients are configured this way, they are called group update providers. Group update providers do not have to be in the group or groups that they update.
  • Location awareness: Symantec Endpoint Protection expands location awareness support to the group level. Each group can be divided into multiple locations, and when a client is in that location, policies can be applied to that location.
  • Policy-based settings: Policies control most client settings, and can be applied down to the location level.
  • Domains: Domains let you create additional global groups. This feature is advanced and should be used only if necessary.
  • Failover and load balancing: If you have a large network and need the ability to conserve bandwidth consumption, you can configure additional management servers in a load-balanced configuration. If you have a large network and need the ability to configure redundancy, you can configure additional management servers in a failover configuration.
  • SQL database support: Symantec Endpoint Protection stores client information in a database on the management server. Where legacy products stored information in the registry, Symantec Endpoint Protection Manager now stores all information about client computers in a SQL database (either the embedded database or a Microsoft SQL database).
  • Enhanced LiveUpdate: LiveUpdate now supports the downloading and installation of a wide variety of content, including definitions, signatures, whitelists to prevent false positives, engines, and product updates.
Device

Symantec Scsi & Raid Devices Driver Download 64-bit

Further information