Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (3): 87-89    DOI: 10.11925/infotech.1003-3513.2004.03.25
Current Issue | Archive | Adv Search |
Study on Application of Symantec Ghost in Network Management
Xiang Yu   Wang Jin
(The Library of Central South University,Changsha 410083, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

The Symantec Ghost 7.5 which have a seventy percent market share in the worldwide can support long distance control management with lots kinds of missions, such as PC deployment、network clone、change installed selections、customer transplant、backup、disc image instauration and so on ,which simplify and augment the efficiency of network PC system management. This paper strongly analyzes the network clone function of Symantec Ghost system, in addition,it gives a simple description in other aspects of this system.

Key wordsNetwork management      Ghost      Clone     
Received: 15 September 2003      Published: 25 March 2004
: 

G433

 
Corresponding Authors: Xiang Yu     E-mail: xiangyuh@mail.csu.edu.cn
About author:: Xiang Yu,Wang Jin

Cite this article:

Xiang Yu,Wang Jin. Study on Application of Symantec Ghost in Network Management. New Technology of Library and Information Service, 2004, 20(3): 87-89.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.03.25     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I3/87

1朱莉娟,张翠芳.巧妙实现网络PC的软件部署.微电脑世界,2002(1)
2大庆.关于Ghost的一点补充. January,9,2000.http://www.ax888.com/jszl/ghostbc.htm(Accessed Jan.10,2003)
3赛门铁克公司.企业级产品Symantec Ghost 7.5. January,13,2000.http://www.Symantec.com(Accessed Sep.8,2003)
4小玉哥.GHOST的一些异常情况分析. October,23, 2001.http://study.mesky.net/infoview/Article1883.html(Accessed Sep.20,2003)
5黑马.系统克隆实战之Ghost篇. August,28,2001.http://wxstar.51.net. (Accessed Sep.28,2003)

[1] Guo Shu. Research on Author Name Disambiguation Algorithm in the Literature Database[J]. 现代图书情报技术, 2013, 29(7/8): 69-74.
[2] Lin Yunsen,Song Tianhua . Maintenance and Management of Library Electronic Reading Room and Public Computer Room[J]. 现代图书情报技术, 2006, 1(8): 80-85.
[3] Lu Juemin,Zheng Yu. A Study on Software Protection of Browser in Opening  Network Management of Library[J]. 现代图书情报技术, 2005, 21(2): 94-95.
[4] Gong Linli. Discussion on Windows 2000 Server System Partition is Cloned by Norton Ghost[J]. 现代图书情报技术, 2005, 21(1): 89-91.
[5] He Donghong,Guo Xinhua. The Design and Implementation of the Library Network Management System Based on JSP/Servlet and JavaBeans[J]. 现代图书情报技术, 2004, 20(9): 98-100.
[6] Zhang Jiping,Xu Quanli,Mu Ming. The Security Techniques for Library Networks[J]. 现代图书情报技术, 2004, 20(3): 56-59.
[7] Zhang Bilan. Study on Application of Ghost in Electronic Readin Room[J]. 现代图书情报技术, 2003, 19(2): 86-87.
[8] Wu Jing. Network Accounting System Base on Flux of Communication in Library[J]. 现代图书情报技术, 2001, 17(1): 75-77.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn