Preview

Emcee Script 1

Satisfactory Essays
Open Document
Open Document
522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Emcee Script 1
Emcee Script for Enterprise Data Management Seminar

Time
Activity
8.55am
<To get cue from Event Manager>

<Housekeeping note>
Ladies and gentlemen, as we are about to begin, please be seated.

I have a few housekeeping notes to make before we begin today’s program.

Firstly, I would like to seek your cooperation in completing the Evaluation Form, which is available in your conference folder. Kindly submit the completed form at the Registration Counter at the end of the seminar.

Kindly switch your mobile phones and pagers to the silent mode.

Thank you for your kind cooperation and attention.

9.00am
Good morning ladies and gentlemen. On behalf of Symantec Corporation and [partner], I would like to extend a very warm welcome to all of you. We appreciate you taking time off your busy schedules to join us today. We hope you will find the program we have lined-up for you to be fruitful and engaging.

To kick-off this morning’s program, we are pleased to have Mr. ______, (designation) of (company), to deliver the Welcome address.

Mr ________, please.

9.10 am
Thank you, Mr _______.

Its now time for us to share with you the strategic direction of Symantec’s latest technology. We will demonstrate how our products, NetBackup and Enterprise Vault can help you address your enterprise data management challenges you face today and be ready for the challenges of tomorrow.

I would like to invite _________, _______________ of ________, to deliver the keynote address, Ultimate Makeover: Data Management Edition.

__________, please.

9:40 am
Thank you, _______, for the insightful presentation.

You can now enjoy industrial strength backup and recovery with the launch of VERITAS NetBackup 6! The new NetBackup 6 gives you the power of next generation management.

Before I reveal too much, ladies and gentlemen, its my pleasure to invite _________, _________________ to share with us the new features and benefits of “VERITAS NetBackup 6.”.

Ladies and Gentlemen, ________.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    This will create a fault tolerant environment and a backup server in the event of a failure in Server##.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Problem Set 1

    • 116 Words
    • 1 Page

    distributed cache mode ____H___ 5. volume shadow copies ___D____ 6. incremental backup ____I___ 7. Windows RE ___C____ 8. hosted cache mode ____G___ 9.…

    • 116 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    SANS - Information Security Resources | Information Security Policy Templates |. (n.d.). Retrieved from http://www.sans.org/security-resources/policies/…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    The final pieces to the network hardware puzzle included an upgrade to Category 6 cabling, multiple cable drops to move all of my desktop machines to cable versus wireless connections and the installation of a HD Homerun Ethernet TV tuner to decode the content received from the over-the-air via antenna. I determined that my existing backup solution was still viable so no changes in that area were…

    • 5620 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    3. The backup site does not have to do with the temperature of the site. It has to do with the crucial effort used to do operations.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1110

    • 335 Words
    • 2 Pages

    • Network-attached storage (NAS) is hard disk storage that is set up with its own network address rather than being attached to the department computer that is serving applications to a network 's workstation users. By removing storage access and its management from the department server, both application programming and files can be served faster because they are not competing for the same processor resources. The network-attached storage device is attached to a local area network (typically, an Ethernet network) and assigned an IP Address. File requests are mapped by the main server to the NAS file server. (Nerwork Attached Stroage)…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Enterprise technology solutions tightly integrate hardware, software, and services to address enterprise-wide issues that are not only of strategic importance to Baderman Island’s businesses, but also affect their data centers and networking environments. The following proposed solution sets will aid Baderman Island to assess their current environments, and then design, deploy, and manage the next generation integrated infrastructure to help them maximize the value of their IT infrastructure.…

    • 1483 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    The all-in-one computer security systems are effective in a way that it protects one’s computer from all the threats previously mentioned, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically scan for any threats and notify the user of any threats are detected. These all-in-one security systems are automatically updated without the user having to worry whether or not they have the latest information. An included feature that the Norton 360 comes with that are beneficial for individual users is the identify protection that securely keeps login and personal information safe, “guards against…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NGEN Personal Statement

    • 614 Words
    • 3 Pages

    In support of Continual Service Improvements (CSI) process, my team collaborated with N6 in the development of the Joint N3/N6 User Alert Bulletin SOP and by collaborating with the Joint Management Team in the development of N313 Joint Regional Security Stack (JRSS) ASI Migration SOP.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cmgt/441 Week 3

    • 768 Words
    • 4 Pages

    Symantec, Initials. (n.d.). Cyber attacks increasingly target home users for financial gain . Retrieved from http://complianceandprivacy.com/News-Symantec-report-home-users.asp…

    • 768 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    nsa essay

    • 252 Words
    • 2 Pages

    This paper is going to talk about the What is a NAS device? What is the speed of the network adapter available on a NAS device? What is the capacity range? Is there any fault tolerance built into a NAS device? And are management features available? Also it will talk about why a user would want to use a NAS.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Design

    • 378 Words
    • 2 Pages

    You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Netapp Company Reivew

    • 2079 Words
    • 9 Pages

    NetApp was started in 1992 in Sunnyvale California and was originally named Network Appliance. The company originally focused on network attached storage devices and has since broadened its presence in the larger enterprise storage market. Its major products are focused on enterprise data storage and filer systems (CBR, 2010). These software and hardware packages allow data management, and security which can increase a company’s performance, profitability, and productivity. NetApp is part of the data storage device industry where a few companies control a majority of the market share. The main competitor of NetApp is EMC; which is a larger more established company with a diverse portfolio of products. There is heavy competition due to the size of these companies; innovation and R&D are a major driving factor in this industry (Egge, 2010).…

    • 2079 Words
    • 9 Pages
    Powerful Essays