Callpilot Meridian Mail to Callpilot Migration Utility Guide

Total Page:16

File Type:pdf, Size:1020Kb

Callpilot Meridian Mail to Callpilot Migration Utility Guide 555-7101-801 555-7101-801 CallPilot Meridian Mail to CallPilot Migration Utility Guide Product release 2.x Standard 2.0 May 2004 CallPilot Meridian Mail to CallPilot Migration Utility Guide Publication number: 555-7101-801 Product release: 2.x Document release: Standard 2.0 Date: May 2004 Copyright © 2004 Nortel Networks, All Rights Reserved Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. The process of transmitting data and call messaging between the CallPilot server and the switch or system is proprietary to Nortel Networks. Any other use of the data and the transmission process is a violation of the user license unless specifically authorized in writing by Nortel Networks prior to such use. Violations of the license by alternative usage of any portion of this process or the related hardware constitutes grounds for an immediate termination of the license and Nortel Networks reserves the right to seek all allowable remedies for such breach. This page and the following page are considered the title page, and contain Nortel Networks and third-party trademarks. Nortel Networks, the Nortel Networks logo, the Globemark, and Unified Networks, BNR, CallPilot, DMS, DMS-100, DMS-250, DMS-MTX, DMS-SCP, DPN, Dualmode, Helmsman, IVR, MAP, Meridian, Meridian 1, Meridian Link, Meridian Mail, Norstar, SL-1, SL-100, Succession, Supernode, Symposium, Telesis, and Unity are trademarks of Nortel Networks. 3COM is a trademark of 3Com Corporation. ACCENT is a trademark of Accent Software International Ltd. ADOBE is a trademark of Adobe Systems Incorporated. AMDEK is a trademark of Amdek Corporation. AT&T is a trademark of American Telephone and Telegraph Corporation. ATLAS is a trademark of Quantum Corporation. ATRIA is a trademark of Pure Atria Corporation. CASEWARE is a trademark of Caseware International, Inc. CONTINUUS is a trademark of Continuus Software Corporation. CRYSTAL REPORTS is a trademark of Seagate Software Inc. DEFINITY is a trademark of Avaya Inc. DIALOGIC, INTEL and VOICEBRIDGE are trademarks of Intel Corporation. DIVX is a trademark of DivXNetworks, Inc. EUDORA and QUALCOMM are trademarks of Qualcomm, Inc. eTrust and InoculateIT are trademarks of Computer Associates Think Inc. DIRECTX, EXCHANGE.NET, FRONTPAGE, INTERNET EXPLORER, LINKEXCHANGE, MICROSOFT, MICROSOFT EXCHANGE SERVER, MS-DOS, NETMEETING, OUTLOOK, POWERPOINT, VISUAL STUDIO, WINDOWS, WINDOWS MEDIA, and WINDOWS NT are trademarks of Microsoft Corporation. GROUPWISE and NOVELL are trademarks of Novell Inc. HITACHI is a trademark of Hitachi Limited. LOGITECH is a trademark of Logitech, Inc. LUCENT is a trademark of Lucent Technologies, Inc. MATRA is a trademark of Matra Hachette. MCAFFEE and NETSHIELD are trademarks of McAfee Associates, Inc. MYLEX is a trademark of Mylex Corporation. NET2PHONE is a trademark of Net2Phone, Inc. NETOPIA is a trademark of Netopia, Inc. NETSCAPE COMMUNICATOR is a trademark of Netscape Communications Corporation. NOTES is a trademark of Lotus Development Corporation. NORTON ANTIVIRUS and PCANYWHERE are trademarks of Symantec Corporation. POWERQUEST is a trademark of PowerQuest Corporation. PROMARK and RHOBOT are trademarks of DMI Promark, Inc. QUICKTIME is a trademark of Apple Computer, In. RADISYS is a trademark of Radisys Corporation. ROLM is a trademark of Siemens ROLM Communications Inc. SLR4, SLR5, and TANDBERG are trademarks of Tandberg Data ASA. SONY is a trademark of Sony Corporation. SYBASE is a trademark of Sybase, Inc. TEAC is a trademark of TEAC Corporation. UNIX is a trademark of X/Open Company Limited. U.S. ROBOTICS, the U.S. ROBOTICS logo, and SPORTSTER are trademarks of U.S. Robotics. WINAMP is a trademark of Nullsoft, Inc. WINRUNNER is a trademark of Mercury Interactive Corporation. WINZIP is a trademark of Nico Mark Computing, Inc. Meridian Mail to CallPilot Migration Utility Guide v Publication history Standard 2.0 Publication history May 2004 Standard 2.0 of the Meridian Mail to CallPilot Migration Utility Guide for CallPilot 2.x is released for general availability. vi CallPilot Contents 1 Understanding the migration process 9 Overview. 10 Migration task flow. 13 Migration limitations . 16 Reference documents . 18 2 Planning a Meridian Mail data collection 23 Meridian Mail releases and platforms that can be migrated. 24 Data that can or cannot be migrated . 25 Meridian Mail system size . 28 Types of data collection . 30 Time estimates . 32 Collecting data in a single session . 33 Collecting data in multiple sessions . 35 Meridian Mail data collection check list. 41 3 Collecting Meridian Mail data 45 Installing the data collection utility . 46 Soft keys . 50 Launching the data collection utility . 51 Collecting Meridian Mail data . 54 Collecting Symposium Call Center Server data . 61 Reviewing the Meridian Mail migration log . 68 4 Migrating Meridian Mail data to CallPilot 71 Hardware, software, and media requirements . 72 Staging area. 74 Stopping the migration . 76 CallPilot migration check list . 77 Migration sequence. 79 Migrating a system with many voice segments or fax items . 81 Meridian Mail to CallPilot Migration Utility Guide vii Contents Standard 2.0 Migrating Meridian Mail data. 82 Migrating Symposium Call Center Server data . 87 Reviewing the migration log and summary . 93 Rerunning the migration . 102 Using Application Builder to complete the migration of voice services . 104 5 Performing postmigration tasks 115 Disconnecting the tape drive. 116 Verifying CallPilot system configuration. 117 Verifying CallPilot network database. 121 Replacing Meridian Mail with CallPilot. 127 Running Meridian Mail and CallPilot at the same time . 129 6 Troubleshooting 143 Migration problems. 144 Correcting pre-check inconsistencies . 146 Troubleshooting tools . 153 Meridian Mail data collection error messages . 155 CallPilot migration error messages. 158 A Meridian Mail and CallPilot comparison 175 Overview. 176 CallPilot system setup. 179 Comparing switch and server configuration. 186 Comparing call routing . 194 Comparing networking solutions . 200 Comparing Symposium Call Center Server voice services . 201 Comparing Meridian Mail and CallPilot terminology . 204 Index 209 viii CallPilot Chapter 1 Understanding the migration process In this chapter Overview 10 Migration task flow 13 Migration limitations 16 Reference documents 18 Meridian Mail to CallPilot Migration Utility Guide 9 Understanding the migration process Standard 2.0 Overview About this guide This guide provides guidelines and detailed information for the migration of a Meridian Mail system to a CallPilot system. You must have a good knowledge of the Meridian Mail and CallPilot systems to be able to perform a migration. For a comparison of Meridian Mail and CallPilot, refer to Appendix A. Introduction to the migration process A migration from Meridian Mail to CallPilot consists of two major steps: ! collection of Meridian Mail data on tape ! transfer of the collected data from tape to CallPilot The number of tapes necessary for a migration depends on the size of the Meridian Mail system. During a migration from Meridian Mail to CallPilot, both systems must be out of service for a variable period of time. The length of this period depends on the system size, data volume and number of users that must be migrated. The Meridian Mail system still accepts calls and messages after the data collection. 10 CallPilot May 2004 Understanding the migration process Meridian Mail data Two types of Meridian Mail data can be migrated to CallPilot: ! system data ! user data (including voice greetings) ! system profiles ! networking data ! voice services—voice menus, voice services, and announcements ! message data—voice messages (the Symposium Call Center Server prompts are also considered to be message data) The CallPilot migration utility allows you to migrate all the Meridian Mail information to CallPilot or to perform a selective migration. In a selective migration, you can migrate each of the following data sets individually: ! messages ! messages and Symposium Call Center Server prompts ! Symposium Call Center Server prompts only ! system data ! system and customer profiles ! networking data ! restriction/permission lists (RPL) ! classes of service (COS) ! users ! voice services (Application Builder applications on CallPilot) ! voice menus ! voice services ! announcements ! system distribution lists (SDL) ! personal distribution lists (PDL) Meridian Mail to CallPilot Migration Utility Guide 11 Understanding the migration process Standard 2.0 Migration rules Follow these general migration rules to minimize system down time: ! Perform the data collection during one or more off-hour periods. ! Do the following after collecting Meridian Mail data on tape: ! freeze Meridian Mail configuration changes ! freeze changes to users, RPLs, COSs, networking data, voice menus, voice announcements, and any data that has to be migrated ! warn users to stop making changes to mailboxes Note: Changes made after collecting the Meridian Mail data are not migrated to CallPilot. ! Verify that the data has been migrated to CallPilot. ! Perform the switchover to CallPilot so that CallPilot accepts calls and new messages, and inform users that they must check the CallPilot mailboxes for messages. Before switching the service to CallPilot, take into consideration the following issues: ! After the switchover, Meridian Mail no longer answers calls and takes new messages.
Recommended publications
  • Desktop Messaging for Internet Clients
    CallPilotTM Release 2.5 Desktop Messaging User Guide for Internet Clients Updates to the Desktop Messaging User Guides Internet Clients Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported. Page 8 About this guide The Internet mail clients that are supported are: • Microsoft Outlook 2000 (Internet mail mode) • Microsoft Outlook 2002 (XP) (Internet mail mode) • Microsoft Outlook 2003 (Internet mail mode) • Microsoft Outlook Express - 5.x and 6.x • Netscape Messenger (Netscape Communicator) - 6.2x • Netscape Mail - 7.0x • Qualcomm Eudora Pro - 6.1.2 Citrix (Terminal server) functionality is supported. Page 11 CallPilot Player The Call the sender button is not available. Page 11 To select your telephone or computer to play voice messages If your telephone is call forwarded to voicemail, cancel this feature before you access your messages from CallPilot Player. Page 29 Linking to My CallPilot Linking to My CallPilot is not supported. About forwarding Desktop Messaging messages Do not use the right-click menu to forward a Desktop Messaging message. To forward a message, either: • open the message and forward it from the CallPilot window or • for Outlook, select the message in the Outlook Inbox and forward it from the Outlook toolbar. Business Communications Manager & CallPilot 100/150 Outlook, Lotus Notes, GroupWise Page 7 Call the sender of a message Call the sender of a message is not supported. Page 7 Access web-based My CallPilot to view user information and change your feature settings My CallPilot is not supported.
    [Show full text]
  • Symantec Software Datasheet
    Data Sheet: Endpoint Management Altiris™ Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Overview The suite delivers tools that are based on the IT The cost of a PC is only a small part of its total cost. Infrastructure Library (ITIL) to help align processes with Nearly 80 percent of the total cost of owning a client industry best practices so you can more efficiently system goes toward the support and maintenance of manage your client systems. the PC. Altiris™ Client Management Suite from Symantec automates time-consuming and redundant tasks to reduce the effort and costs associated with deploying, managing, securing, and troubleshooting client systems so organizations can gain control of their IT environments. Client Management Suite Delivers Client Management Suite ushers in a new generation of systems management by bringing end users, administrators, and key business decision makers Altiris Client Management Suite deploys, manages, secures, and together. The suite helps you align with organizational troubleshoots systems through the entire IT lifecycle. You can manage more technologies, with greater efficiency, on more objectives by providing easy-to-use self-service tools to platforms. users, powerful management tools to IT administrators, and custom dashboards to decision makers. Client Management Suite provides complete visibility into your organization's client systems so you can see Finding extra time is challenging, yet that's what Client what you have, where it's located, and what state it's in. Management Suite is designed to do. Now you can focus The suite's flexible and actionable reporting tools not on key initiatives that can help your business grow.
    [Show full text]
  • Comprehensive Protection for Windows®
    Solutions for Small and Mid-Sized Businesses October 2007 Product Comprehensive Catalog Protection for Windows® As companies increasingly rely on sophisticated technologies to support their objectives, the risks to business operations grow. The complexity of managing IT systems increases, as do the costs. And, if your company is like most, its IT staff and resources are limited and continually called on to justify their costs. Under these conditions, it’s difficult for companies to keep the Microsoft® Windows® environments they depend on to run their business secure, available, and well-managed. Symantec is uniquely qualified to address the challenge. That’s because Symantec delivers an unparalleled combination of leading technologies and services to help ensure the highest level of protection across your Microsoft Windows environment. Symantec offers comprehensive and affordable, best-in-class solutions that help protect Microsoft Windows environments by keeping data, systems, and applications secure, available, and well-managed at all times. Our world-class support programs and partners offer guidance to help you implement comprehensive solutions that will maximize your investment as they protect your IT environment. As you will see on the following pages, Symantec offers industry-leading solutions delivering enterprise-class performance without unnecessary cost or complexity. With a proven track record spanning several decades, Symantec knows how to help you keep your business up, running, and growing—no matter what happens. Symantec Product Catalog—October 2007 Comprehensive Protection for Windows® Contents Security . 2 Client, Server, and Network Security. 3 Symantec Endpoint Protection . 3 Symantec Network Access Control . 4 Symantec Multi-Tier Protection. 4 Symantec Mail Security for SMTP.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Manual Norton Partition Magic 8.0 Full Version for Windows 7
    Manual Norton Partition Magic 8.0 Full Version For Windows 7 Norton Partition Magic is an application used to manage hard disks on your computer, that has a If you are a moderator please see our troubleshooting guide. A familiar layout with disk map plus a full User Manual and lots of Help resources From EaseUS: As Partition Magic alternative, EaseUS Partition Master Home and GUID partition table (GPT) disk under Windows 2000/XP/Vista/7/8/8.1/10. If you have a Windows 8/8.1 system, DO NOT manage your partition with this. Supported OS: Windows 10/7/8/vista/XP and Windows Server 2003/2008/2012 Guide & Tips. How to extend system partition But Windows 8 is not supported by Norton Partition Magic), or can not be boot from a bootable CD/DVD. Partition. How to backup photos from iphone4 to icloud server backup windows server 2008 · Ipad compatible backup camera symantec netbackup 7.5 error code 58 Dodge grand caravan everyone the key NTFS partitions, made Source manually copy two components to users whose machines almost completely dead HDD. Magic EaseUS Partition Master is totally free partition manager for home users. Guide & Tips Say, create a new partition to install Windows 7, or extend the full system partition manager software for Windows 7 32 bit and 64 bit and Windows 8. Partition Magic ® is a registered trademark of Symantec Corporation. filemaker pro 12 crack norton partitionmagic 8.05 serial number keylogger for windows Camtasia studio 8 free download for windows 7 32bit vray 3ds max 2010 64 with Powerdvd 10 ultra 3d free download full version sony architect pro 5.2 photoshop lightroom mac serial windows 8 the missing manual captivate 4.
    [Show full text]
  • Callpilot 4.0 Desktop Messaging User Guide for My Callpilot (En)
    C a l l P i l o t TM Release 4.0 - Standard 1.02 Desktop Messaging User Guide for My CallPilot CallPilot Desktop Messaging User Guide for My CallPilot Product releases: 4.0 Document release: Standard 1.02 Date: July 2005 Copyright © Nortel Networks Limited. All rights reserved. Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. The process of transmitting data and call messaging between CallPilot and its servers, switches or system is proprietary to Nortel Networks. Any other use of the data and the transmission process is a violation of the user license unless specifically authorized in writing by Nortel Networks prior to such use. Violations of the license by alternative usage of any portion of this process or the related hardware constitutes grounds for an immediate termination of the license and Nortel Networks reserves the right to seek all allowable remedies for such breach. Nortel Networks and third-party trademarks appear on the following pages: 2 *Nortel Networks, the Nortel Networks logo, the Globemark, and Unified Networks, BNR, CallPilot, DMS, DMS-100, DMS-250, DMS-MTX, DMS-SCP, DPN, Dualmode, Helmsman, IVR, MAP, Meridian, Meridian 1, Meridian Link, Meridian Mail, Norstar, SL-1, SL-100, Succession, Supernode, Symposium, Telesis, and Unity are trademarks of Nortel Networks. 3COM is a trademark of 3Com Corporation. ACCENT is a trademark of Accent Software International Ltd. ADOBE is a trademark of Adobe Systems Incorporated. AMDEK is a trademark of Amdek Corporation.
    [Show full text]
  • Product Releases Dec 02
    Historical Product Releases Dec-02 Symantec ManHunt 2.2 Symantec ManTrap 3.0 Symantec Host Intrusion Detection 4.0 Symantec NetRecon 3.6 Symantec Event Manager for Antivirus 1.0 Symantec Event Manager for Client Security 1.0 Symantec Event Collector for NET ePO Symantec Event Relay Tivoli Symantec Incident Manager 1.0 Symantec AntiVirus Corporate Edition 8.0 EMC Symantec AntiVirus Scan Engine 4.0 Symantec AntiVirus 4.0 for ISA Symantec AntiVirus 4.0 for NetApp Filer Symantec AntiVirus for NetApp NetCache Symantec AntiVirus Filtering for Domino W2NT v 3.1 Norton Internet Security Professional 2003 Sep-02 Enterprise Security Manager for Databases 3.0 Enterprise Security Manager for Firewall 2.0 Enterprise Security Manager for HIPAA 1.0 Symantec AntiVirus for SMTP Gateways 3.0 Symantec AntiVirus Gateway Solution 3.0 Symantec AntiVirus Enterprise Edition 8.5 Symantec Client Security Norton AntiVirus 2003 Norton AntiVirus Professional 2003 Norton Ghost 2003 Norton Internet Security 2003 Norton Personal Firewall 2003 Norton SystemWorks 2003 Norton SystemWorks Professional 2003 Jun-02 Symantec Web Security 2.5 Syamantec Gateway Security (models 5100, 5200, 5300) VelociRaptor 1.5 (models 1100, 1200, 1300) Net Prowler 3.5.1 Symantec AntiVirus Gateway Solution Symantec AntiVirus Scan Engine 3.0 Symantec AntiVirus for Inktomi Traffic Edge 3.0 Symantec AntiVirus for Network Appliances filer/NetCache 3.0 Norton AntiVirus for Lotus Notes/Domino on Linux Mar-02 Symantec Gateway Security RK4 ESM - Best Practice Policies Firewall 1.0 ESM - Best Practice
    [Show full text]
  • Overview of Client Management Suite 7.1 Hands-On Lab
    Overview of Client Management Suite 7.1 Hands-On Lab Description If you are new to Altiris Client Management Suite, this lab is an excellent place to start. This introduction lab provides a hands-on overview of the suite going through many steps of IT lifecycle management. It includes the basics on software and patch management, deployment, migration, remote assistance, and more to start you on your path to effective client management. At the end of this lab, • Create an inventory policy and run reports to view the you should be able to collected data • Describe the available methods for delivering and metering software within a real-world environment • Describe the process of staging and deploying patches to systems and applications within a network environment • Use Deployment Solution 7.1 to perform an OS Migration Notes . The lab will be directed and will provide you with step-by- step walkthroughs of key features. Feel free to follow along with the instructor, or you may optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session. Introduction Altiris® Client Management Suite™ reduces the total cost of owning client systems by automating time-consuming and redundant tasks. By minimizing the efforts and costs associated with deploying, managing, securing and troubleshooting client systems, organizations can gain control of their environments. This easy-to-use, integrated suite of solution software for Windows, Mac and Linux is designed to address IT management needs for desktop and notebook computers throughout their entire IT lifecycle.
    [Show full text]
  • Historical Product Releases Jun-05 Symantec Client Security 3.0
    Historical Product Releases Jun-05 Symantec Client Security 3.0 Symantec Client Security for Small and Medium Business 3.0 Symantec Mobile Security 4.0 for Symbian Symantec AntiVirus Enterprise Edition 10.0 Symantec AntiVirus Corporate Edition 10.0 Symantec AntiVirus for Small and Medium Business 10.0 Symantec AntiVirus 4.3 for Messaging Symantec LiveState Patch Manager 6.0 Symantec Discovery 6.0 Symantec LiveState Delivery 6.0 Symantec LiveState Delivery Enterprise Manager 6.0 Symantec LiveState Client Management Suite Symantec Enterprise Security Manager Version 6.5 Managed Security Services Vulnerability Data Integration Norton AntiVirus Mac 10.0 Norton Internet Security 2005 AntiSpyware Edition Mar-05 Symantec AntiVirus 4.3 for Microsoft SharePoint Symantec Network Security 4.0 Symantec Mail Security Appliance Symantec Smart Agent for Dragon Symantec Smart Agent for Cisco Intrusion Detection System Symantec Smart Agent for Snort 2.0 Symantec LiveState Recovery Manager Dec-04 Symantec Enterprise Security Architecture 2.1 Symantec Gateway Security 400 Series Appliance Symantec Network Security Fiber Fail-Open Solution 1.0 Appliance Symantec Livestate Recovery Desktop 3.0 Symantec Livestate Recovery Desktop 3.0 Small & Medium Business Symantec Livestate Recovery Standard Server 3.0 Small & Medium Business Symantec Ghost Solution Suite 1.0 pcAnywhere 11.5 Symantec Mail Security 4.1 for Domino Symantec Mail Security for Domino Multi Platform Bundle Edition Symantec Mail Security for Microsft Exchange 4.6 Symantec Mail Security for SMTP
    [Show full text]
  • Optimization and Visualization of Strategies for Platforms
    Optimization and Visualization of Strategies for Platforms, Complements, and Services. by Richard B. LeVine BA, Psychology, State University of New York at Albany, 1980 MS, Computer Science, Union College, Schenectady New York, 1986 SUBMITTED TO THE ALFRED P. SLOAN SCHOOL OF MANAGEMENT IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTERS OF SCIENCE at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2003 ©2003 Richard B. LeVine. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author: Alfred P. Sloan School of Management May 8, 2003 Certified by: Professor James Utterback, Chair, Management of Technology Program Reader Certified by: Professor Michael Cusumano, Sloan Management Review Distinguished Professor of Management Thesis Supervisor Accepted by: David Weber Director, Management of Technology Program 1 of 160 Optimization and Visualization of Strategies for Platforms, Complements, and Services by Richard B. LeVine Submitted to the Alfred P. Sloan School of Management on May 8, 2003, in Partial Fulfillment of the Requirement for the Degree of Masters of Science. Abstract This thesis probes the causal elements of product platform strategies and the effects of platform strategy on a firm. Platform strategies may be driven by internal or external forces, and the lifecycle of a firm and of a platform strategy evolve over time in response to both the needs of the firm and the changes in the external environment. This external environment may consist of a “platform ecology,” in which the platform strategies of firms affect one another.
    [Show full text]
  • SYMANTEC's NORTON UTILITIES VERSION 8.0! Norton Utilities 8.0 Read Me
    WELCOME TO SYMANTEC'S NORTON UTILITIES VERSION 8.0! Norton Utilities 8.0 Read Me Thank you for purchasing Symantec's Norton Utilities 8.0. Please read this file for important information including: * Hardware and Software Compatibility * Additional Material and Tips To print this file, change to your \NU directory and type: LP READ.ME /HEADER0 /L5 <ENTER> Please read the following before installation and review the Table of Contents for information on specific utilities. EMERGENCY STARTUP ----------------------------------------------------- If your system is damaged and you can't restart your computer from your hard disk, place the EMERGENCY DISK in drive A: and reboot. EMERGENCY UNERASE ----------------------------------------------------- Do not install Norton Utilities on a drive that needs repair or requires data recovery. To unerase an accidentally deleted file, insert the EMERGENCY DISK, change to the floppy drive, and type: UNERASE <ENTER> EMERGENCY REPAIR ----------------------------------------------------- If you can't access part of your hard drive or suspect damage, insert the EMERGENCY DISK, change to the floppy drive and type: NDD <ENTER> INSTALL REQUIREMENTS ----------------------------------------------------- Install requires at least 450K free conventional memory. If your normal configuration does not generate this amount, restart your computer loading only essential TSRs and device drivers. INSTALLATION ON COMPRESSED VOLUMES ----------------------------------------------------- Before installing Norton Utilities on a compressed drive, run Norton Disk Doctor /COMPLETE on both the host (non-compressed) and compressed volumes. If C: is your compressed volume, insert the EMERGENCY DISK, change to the floppy drive and type: NDD C: /C <ENTER> STARTUP PROGRAM OPTIONS ----------------------------------------------------- During installation, Norton Utilities allows you to configure your system to automatically load or run certain programs every time you start your system.
    [Show full text]
  • Delivering Today's Leading Security, Administration, and Data
    Delivering today’s leading security, administration, and data protection solutions for PC users, home offices, and small businesses. The right products at the right price: It’s the security and data protection small businesses and home PC users want and need. The Symantec System Builder Program offers today’s top security, administration, and backup and recovery solutions to partners building custom white boxes for PC users, home offices, and small businesses. Via a network of leading distributors, the program delivers software products to system builders looking to add value and differentiate their hardware solutions. Symantec delivers the solutions end-users and administrators want—at competitive OEM prices consumers and small businesses will appreciate. For the system builder, the program features popular Symantec software affordably priced and packaged for cost-effective inventory and installation on customer PCs and servers. Norton-branded solutions are available in convenient multi-packs of 3, 30, or 100 licenses, while server- and network-based solutions are sold in single packs. Symantec software must be bundled and sold with system hardware or a software operating system and cannot be sold as a stand-alone solution. The program is a smart and cost-effective way to provide customers with world-class security, productivity, and data protection, giving them peace of mind knowing their new systems are protected from Day One. And best of all, the products are from Symantec, the world leader in information security. Solutions for Home Users Viruses, hackers, and spam. Every day, home PCs and the valuable information on them are at risk. Symantec, the trusted name in online security, offers award-winning solutions to block viruses and hackers, protect confidential information, filter out spam and spyware, and protect families from online dangers: ¥ Norton Internet Security™ provides essential protection against viruses, hackers, spyware, and spam.
    [Show full text]