Predatar Knowledge Tracker - subscription
Predatar Knowledge Tracker is an ever growing resource. It currently holds over 700 quick fixes and these are being added to all the time by the global Predatar family of users.
These fixes come from actual experience and are based on our in-depth knowledge of all aspects of TSM.
Silverstring will run a one hour webex to demonstrate how Knowledge Tracker works.
Having Predatar Knowledge Tracker will give you access to a wealth of intellectual information that will help you make decisions based on events in your TSM environment. It will provide:
1. On the job training, not just theory
2. The training will be relevant to your infrastructure
3. Knowledge Tracker is always available and can be referenced online at any time.
TSM Operations Training – 2 day course
This training is based around the Predatar Operators Console and Predatar Client Reporting . This comprehensive training package will focus on the automation of TSM tasks relevant to the customers own backup and compliance regime. The training will include basic TSM fundamentals, training for tape management and production of client reporting.
After completion of this training your operations team will be able to effectively administer many common TSM problems and manage automated processes for client side events. The attendees will gain a better understanding of TSM server processes, KPI reporting, basic capacity management and tape movements.
Advanced TSM V6 - Bespoke training
This training is based on the customers’ need to make use of the new advanced functions of TSM V6. The training is held on Silverstring's premises and provides the opportunity for the attendees to get a real hands-on experience of the new commands and practical use of functions such as server and client de-duplication, node replication, virtual environment protection and simultaneous writes.
After completion of this training you will be able to take advantage of some of the new functionality TSM V6 has to offer including:
1. How to protect your virtual environment
2. De-duplication processing
3. Enhanced replication providing unified recovery
To find out more about these training courses or to request a call back simply email email@example.com