High-Availability Clustering with Novell Open Enterprise Server 2–Part 2 of 2
In this 11-minute demo, we continue our exploration of fault tolerance and high availability with a look at the actual process for installing Novell Cluster Services 1.8 and setting up Novell Open Enterprise Server 2 Linux clusters.
We know Mac lovers. They live here, too. Finally, you can show your Mac users the love by adopting Novell Kanaka, the best way to integrate Mac workstations into your enterprise network. Kanaka gives users single log-in functionality to all the Open Enterprise Server network resources, just like PCs get. Only now you don't have to pay extra for it.
Join us to discuss options for high availability and disaster recovery for Open Enterprise Server and GroupWise. Topics will include Novell Cluster Services, Business Continuity Clustering (along with exciting pricing changes) and PlateSpin Forge and Protect.
Product Marketing Manager Sophia Germanides demos Novell Open Enterprise Server with Engineers Glen Davis and Ted Tronson, focusing on three cool new ways that iPrint will continue to serve you and reduce printing headaches.
Data growth can be hard to control and the spiraling cost of new disk storage capacity needs to be controlled, without hurting the productivity of users. See how Novell Dynamic File Services can solve this problem by getting the most out of your existing hardware, while at the same time getting maximum value for your primary storage investment. All without users changing the way they work.
This demo of Novell Teaming beta code gives you a sneak peek into features of the highly anticipated upcoming release, like a new relevancy dashboard, robust search, custom forms, video tutorials, content and user tracking capabilities, and social networking features like miniblogs, tagging, sharing and more.
Check out this demo of the most exciting new features in GroupWise 8, including Home View innovations, integration with Novell Teaming, enhanced task management capabilities, a robust new contact management interface, and new tools to make your calendar more effective than ever before.
If you're concerned about reducing downtime, preserving data integrity, and ensuring disaster recovery, tune in to this 16-minute technical overview of the fault tolerance and high-availability capabilities available through Novell Open Enterprise Server 2 and Novell Cluster Services 1.8.
In this engineer-to-engineer session, you'll explore Novell iFolder 3.7 capabilities, including creating, sharing, and merging folders and resolving file conflicts. You'll also see the Web admin console and learn how to provision and manage users, create policies and balance server loads.
Watch this session to see a demonstration of the correlation and identity injection capabilities in Novell Sentinel. With these capabilities, you'll always know who is accessing what, when they're doing it and if they're authorized.
ZENworks Application Virtualization lets you convert applications that run on Microsoft Windows into self-contained virtual applications without having to modify your registry files. By applying ZENworks Application Virtualization you automatically increase user productivity in your organization and create a secure desktop environment.
ZENworks Configuration Management lets you remotely manage devices from a Web-based console without having your IT administrator visit every workstation or branch office allowing your business to reduce travel costs and focus more on business objectives.
ZENworks Configuration Management provides enterprise customers the fastest return on investment by saving time and resources every step of the migration process by maintaining and managing user-based applications and system settings.
ZENworks Configuration Management lets you create bundles to automate the distribution of applications, patches and operating system upgrades ensuring devices are always up-to-date. By applying the ZENworks bundle feature you allow your organization to reduce administrative effort and lower your total cost of managing desktops.
ZENworks Configuration Management policy features offers you a unique policy-based approach to automate software updates, endpoint security and migration. Through Policy-Driven automation you will be able to optimize the value of your IT assets and control IT costs.
Learn about the top two innovations delivered with Open Enterprise Server, neither of which is available anywhere else. Domain Services for Windows allows you to use your eDirectory users and group preferences for authentication against Active Directory applications - without a Novell Client or synching. Dynamic Storage Technology can manage your file systems to improve utilization of storage resources and backup windows.
While we've made moving from NetWare to Open Enterprise Server more like an upgrade than a migration, there are some differences from the way you've always managed your NetWare upgrades in the past. In this hour, you will get a basis for planning and executing the upgrade, review upgrade methods and options, and see a demo using the new Migration GUI Tool.
Join Chris Neal as he walks through setting up storage volumes on OES Linux using the NSS file system. He also explains the relationship between the various components of NSS and Linux file systems and volume managers.
With just 60 IT professionals to support the organization's 10,000 users and network infrastructure, the California Highway Patrol constantly seeks new ways to operate more efficiently and drive down technology costs. Novell ZENworks Configuration Management has streamlined desktop and system management, while Novell Open Enterprise Server has contributed to the organization's server consolidation initiative.
This Novell Storage Manager demonstration illustrates how to get existing storage under control and managed by policy. It also shows how to seamlessly migrate user and group storage from a NetWare server to an Open Enterprise Server (Linux) server.
This Novell Storage Manager demonstration illustrates how to automate the full lifecycle of user and group storage. It shows the process of provisioning and de-provisioning storage based on a user's role within the organization.
This Novell SecureLogin demonstration illustrates how simple it is for users to begin enjoying single sign-on functionality across terminal, Web, Windows and Java-based applications. It also highlights how rapidly Novell SecureLogin can be deployed, and showcases a deployment scenario that enables fast user switching.
With Open Enterprise Server you can virtualize NetWare or Open Enterprise Server instances to gain efficiencies in your storage and print infrastructure. See how fast you can get a XEN VM up and running.
Check out the coolest new feature from Novell engineering! You can actually stop spinning up new Active Directory servers every time you add a business app. Leverage your existing infrastructure since DsfW makes eDirectory look like Active Directory!
The Access Governance Suite delivers user access certification and comprehensive roles management, allowing you to translate business processes into IT policies and entitlements that meet regulatory requirements.
The Roles Based Provisioning Module introduced RBAC features to Identity Manager. In this session, we will demonstrate how to combine this with the user access certification, role analytics and modeling of the Access Governance Suite.
The best-engineered and most interoperable Linux desktop is back–and in today's economy. Come learn about the latest applications, multimedia capabilities, and green IT enhancements of SUSE Linux Enterprise Desktop, and find out how this Linux desktop can help you lower costs in your environment.
Join experts from NTS to explore common deployment scenarios for SecureLogin. The presenters will highlight potential deployment problems and solutions for addressing them. The second session of this two-part series will cover SecureLogin deployments in “kiosk” mode.
Often called, "the Hummer of the IT industry," storage of unstructured data is a topic on everyone's minds. Speak to the team that developed Dynamic Storage Technology and hear about automated, policy-driven storage, and how you can put it to work in your environment.
If you're considering deploying Vista, or if you have to account for new Vista machines on your network, come hear from the experts that have made Open Enterprise Server Vista-ready. Common Internet Filing System (CIFS), Domain Services for Windows, and SAMBA will be discussed.
The clear trend in organizations is that more and more people are bringing their Macs to work. Can you connect them to your network reliably and securely? What about scalability and performance? Talk to the team that's developed the enhanced support for Apple Filing Protocol and hear the pros and cons of NetATalk.
With Open Enterprise Server 2 and the flexibility of Linux, a new question comes to mind: which file system will serve me best? Hear from the team that has worked with Novell Storage Services for decades, but what they have to say may surprise you. NTFS and Posix file systems will also be discussed.
In this session, participants will learn how to use the new Storage Manager 2.5 features for provisioning, managing network data, and creating and managing auxiliary storage policies. They'll also see the enhanced collaborative storage features, including file grooming, migrations and data archiving.
In this Webcast, Kent Erickson, Senior Vice President and General Manager of Novell Workgroup Solutions, and Ken Muir, Chief Technology and Strategy Officer for Novell Workgroup Solutions, outline Novell's view of collaboration market trends, our strategy for addressing them, and our unique ability to deliver collaboration solutions that drive innovation and growth for our customers.
Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. This presentation shows how to utilize Messaging Architects products with GroupWise 8.
The Scripting Driver can help you integrate unconnected systems, replace your current home-grown provisioning system, or utilize ready-to-deploy mixed-source solutions. In this session, you'll learn how to develop a simple syslog driver and see demonstrations of mixed-source solutions.
You've probably heard quite a bit about the next release of Teaming, but you may be looking for technical training to help get you started. Attend this session to equip yourself with the latest tools to ensure a fast, easy and problem-free deployment. You'll learn how to install the beta version of Novell Teaming. We will review pre-installation requirements, host and storage preparation, installation, integration with eDirectory and GroupWise, and configuration and customization best practices.
From low-cost, commodity hardware and consolidation opportunities to the wealth of open source software add ons, the benefits of Linux are significant. And because collaboration is an ideal platform for realizing these efficiencies, many customers are moving their back-end GroupWise systems to Linux. Join us to see how easy it can be, and get some expert advice on the best way to do so.
GroupWise 8 is the most user-focused release ever. With an emphasis on personal productivity, GroupWise 8 is full of features that help end users “get things done” wherever they are and whatever client platform they want to use. Attend this session to learn how to make the most of the latest Linux/Mac client enhancements and the best way to implement them in your organization.
Join experts from NTS to explore common deployment scenarios for SecureLogin. The presenters will highlight potential deployment problems and solutions for addressing them. The first session of this two-part series will cover Citrix deployments.
The Compliance Management Platform combines identity, access and security management technologies. This combination automates the process of granting users access to resources, while providing a real-time, holistic view of all network events enterprise wide.
See a demo of Novell Sentinel capabilities including real-time monitoring and remediation, IAM integration, combining attack and vulnerability data to prioritize a response, and out-of-the-box controls and customizable reports.