Free Essay

Symantec Paper

In:

Submitted By jataya
Words 1333
Pages 6
Princess Productions is an entertainment company that produces special events and tradeshows. Princess Productions is a small business with approximately 10 employees with a network of about 15 computers. Since this is a small business, all of the decisions on technology software, hardware and networking decisions are made by the company president.
Symantec Backup Exec
Symantec Backup Exec provides continuous backup and recovery protection from the server to the desktop. The software protects the company’s data while providing the opportunity to reduce storage costs and improve backup performance through integrated deduplication and archiving technology. (Symantec 3, 2010) Symantec Backup Exec was chosen due to Symantec’s reputation for producing quality products along with the outstanding technical support that the company provides. The Backup Exec software is one of the leading software packages available and includes some of the best features when compared to other backup and recovery software options.
About Symantec
“Symantec was founded in 1982 by visionary computer scientists. The company has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. Symantec provides security, storage and systems management solutions to help their customers – from consumers and small businesses to the largest global organizations – secure and manage their information-driven world against more risks at more points, more completely and efficiently than any other company.” (Symantec 2, 2011)
Specifications
* Market leading data protection for physical and virtual server environments from desktop to servers * Integrated and adaptable deduplication * Unified archiving * First-to-market granular recovery for virtual applications * Patent-pending Granular Recovery Technology (GRT) recovers critical Microsoft application data in seconds * Centralized 3-tier set-up, reporting and patch management * Scalable heterogeneous support through remote Agents and Options. * Continuous data protection for Exchange, file Servers, SQL servers and desktop data * Innovative multi-product integration with market leading technologies
(Symantec 4, 2011)
Product Cost & Maintenance
The cost of Symantec Backup Exec varies depending upon company needs. Symantec offers two standard packages, the essential maintenance package and the basic maintenance package. The only real difference between the two packages is the hours of support. With the basic maintenance package a company is provided with support only during business hours and there can be only 2 designated callers from the company. With the essential maintenance package companies are provided with 24 hour support 7 days a week including holidays and there can be up to 6 designated callers from the company. The cost for the 1 Year Basic Maintenance Package is $1,115 and a 3 Year Basic Maintenance Package is $1,455. The cost for the 1 Year Essential Maintenance Package is $1,162 and the 3 Year Essential Maintenance Package is $1,597. Since there isn’t much of a cost difference between the Basic Maintenance Package and the Essential Maintenance Package, Princess Productions selected the Essential Maintenance Package for added peace of mind. It is also beneficial to purchase the 3 year plan over the 1 year plan in order to save nearly 80% per additional year.
Product Strengths * Protect more data while you reduce storage and management costs * Optimizing network utilization across physical and virtual environments with integrated deduplication technology * Easily automate storage and management savings with efficient archiving and backup through a single console * Eliminate redundant backups for Microsoft Exchange, Active Directory, and SQL in a virtual environment with integrated VMware and Hyper-V protection * Restore individual Exchange messages, SharePoint site items or documents, and Active Directory user preferences from a single-pass backup * Easily manage a local or distributed backup environment through a single console * Eliminate your backup window and help ensure recovery point objectives are easily met with continuous backup protection
(Symantec 4, 2011)

Product Limitations * The database size of Backup Exec has been known to cause the software to freeze. * Requires 1GB of memory in order to restore

Product Alternatives & Competitors
Symantec offers many other options for recovery and backup software including Net Backup, Norton 360, and Norton Ghost. Some of the leading competitors that offer similar proprietary software include Microsoft, IBM and Quest Software. Microsoft backup software includes NTBackup, System Center Data Protection Manager, SyncToy, Windows Home Server Computer Backup, Windows Backup and Restore Center, and Windows Live OneCare. There are also numerous free options for backup and recovery software. Bacula, Memopal, rdiff-backup, and BackupPC are a few of the leading free versions of backup and recovery software available.
Company & Product Support
Symantec Technical Support
Services for Backup Exec
Backup Exec Forums
System Recovery Forums

Symantec Endpoint Protection
Symantec Endpoint Protection Small Business Edition protects computers and servers with the most effective antivirus, anti-malware technologies available in a single, integrated solution. The software does not slow down computers or swallow up system resources. (Symantec 5, 2011) The Symantec Endpoint Protection software was selected because Princess Productions wanted to stick with a trusted brand.
Specifications
* Symantec Insight and SONAR technologies detect new and rapidly mutating malware stopping malicious behavior, including new and previously unknown threats. * Protects against viruses, worms, Trojans, spyware, bots, zero-day threats and root kits. * Rules-based firewall engine, Browser Protection and Generic Exploit Blocking (GEB) shields systems from drive-by downloads and from network based attacks. * Centrally manages servers, PCs and Macs; consolidates antivirus, antispyware, desktop firewall, and Intrusion Prevention on a single agent.
(Symantec 5, 2011)
Product Costs & Maintenance
Symantec offers the same two maintenance packages for the Endpoint software as it does for Backup Exec. The cost for the 1 Year Basic Management Package is $35 and the cost for the 3 Year Basic Management Package is $64. The cost for the 1 Year Essential Management Package is $37 and the cost for the 3 Year Essential Management Package is $67. The cost for each package is for one license. A license is needed for each computer on the network. Symantec does offer discounts after a certain amount of licenses are purchased; however, since Princess Productions is a very small business the software discount would not apply. Since the cost of the Essential Management Package was only a few dollars more than the Basic Package, the 3 Year Essential Management Package for 15 computers was purchased.
Product Strengths * Fastest - Increase productivity with the security software that won’t slow you down, get in your way, or swallow up system resources. * Most Effective - Protect your business with the most-effective threat detection technology so you can focus your attention on growing your business. * Simple - Save time and costs with a single console that manages security for all your computers and servers.
(Symantec 5, 2011)
Product Limitations * Interface is not user friendly * Very complex program

Product Alternatives & Competitors
Symantec is the leader in antivirus software and offers many alternatives. Critical System Protection, Multi-tier Protection, Scan Engine and Protection Center are just a few of Symantec’s leading antivirus packages. There are many competitors offering Antivirus protection including Sophos, McAfee and Trend. AVG offers a pretty good free version of Antivirus protection along with Clam and PC Tools.
Company and Product Support Symantec Technical Support
Symantec Endpoint Protection Support

Resources
Wikipedia. (2011, December 17). List of Backup Software. Retrieved from http://en.wikipedia.org/wiki/List_of_backup_software
1 Symantec. (2011). Symantec Corporate Fact Sheet. Retrieved from http://www.symantec.com/content/en/us/about/media/Symantec_Corporate_Fact_Sheet.pdf
2 Symantec. (2011). Corporate Profile. Retrieved from http://www.symantec.com/about/profile/
3 Symantec. (2010). Data Sheet: Data Protection. Symantec Backup Exec 2010. Reliable Backup and Recovery Designed for Your Growing Business. Retrieved from http://eval.symantec.com/mktginfo/enterprise/fact_sheets/b-backup_exec_2010_DS_20962742.en-us.pdf
4 Symantec. (2011). Symantec Backup Exec. Retrieved from http://www.symantec.com/business/backup-exec-for-windows-servers
5 Symantec. (2011). Symantec Endpoint Protection Small Business Edition. Retrieved from http://www.symantec.com/business/endpoint-protection-small-business-edition
Soto, C., (2009, August 4). Government Computer News. Symantec Endpoint Protection 11.0. Retrieved from http://gcn.com/Articles/2009/08/10/GCN-Lab-Review-Symantec-Endpoint-Protection-11.0.aspx

Similar Documents

Premium Essay

Symantec Corporation - Mergers and Acquisitions

...| Symantec Corporation | Mergers and Acquisitions | | Chris Miller | 11/9/2011 Dan SalmApplied Microeconomic Theory | | * Introduction * This research paper attempts to give a view of the traditional theory relating to Symantec Corporation and their acquisitions and mergers in an attempt to gain market control. Mergers and acquisitions correspond to change within a business looking to gain market power. No other experience is harder to attain for a company, represents more of a challenge, or as hectic as an acquisition or merger. It is vital that the management understands the methods required to perform acquisitions and mergers and that they have a clear understanding of how the procedure works. A corporate merger is the amalgamation of two company’s liabilities and assets developing into a single business element. Acquisitions occur when a large company, typically in a monopolistically competitive market, encompasses a smaller company giving the larger company a monopolistic advantage. A merger occurs when the amalgamation of liabilities and assets is depicted to be between companies of equal market standing. Within a company merger of estimated equals, there is typically an exchange of company stocks where one business distributes new shares to the shareholders of the other company at a specified percentage. * “Those who boast of their commonsense approach to management are very probably just following the ill-formed, half-forgotten, pseudo-scientific nostrum...

Words: 2655 - Pages: 11

Free Essay

Symantec

...Symantec Corporation and the Device-Centric Strategy BA 301 Final Term Paper 3/17/14 Table of Contents Executive Summary……………………………………………………………………………… 3 Position…………………………………………………………………………………………... 4 Sense…………………………………………………………………………………………....... 8 Uncover…………………………………………………………………………………………. 10 Solve…………………………………………………………………………………………..... 12 Build…………………………………………………………………………………………...... 14 Achieve…………………………………………………………………………………………. 17 Conclusion……………………………………………………………………………………… 19 Works Cited…………………………………………………………………………………….. 20 Appendix A…………………………………………………………………………………….. 22 Executive Summary This report focuses on Symantec Corporation and the problems and symptoms the company faces. Throughout the report one will gain knowledge about the company in general and learn about different problems the company faces. Financial standing of the company will be given and their competitors will be listed. Over the last few years the company has faced issues with leadership and their financials have stayed in the same place. As of 2012 Symantec acquired a new CEO who hopes to implement a new strategy into the business by focusing on protection tablets and smartphones rather than just computers. Even though the strategy is new Bennett has to come up with ideas on how to get the product out to their customers. One solution to this that will be discussed is using word of mouth through their philanthropic giving program. If Symantec can get the device-centric...

Words: 4430 - Pages: 18

Free Essay

Can Norton Antivirus Detect Worm’s Virus?

...Can Norton antivirus detect worm’s virus? Fadi M.S Al-suhimat Recent Internet worm outbreaks have infected hundreds of thousands of Internet servers and user machines within minutes, causing billions of dollars in losses for businesses, governments, and service providers. The high stakes involved have inspired numerous research projects, through which industry and academic institutions are working to strengthen local-area and wide-area networked systems’ abilities to fend off cyber-attacks. To that end, we propose to find new algorithm to detect internet worm viruses deploying fast, scalable security overlay networks to facilitate high-speed intrusion detection and alert-information exchange by depend on failure connection. Fortifying the Internet infrastructure with such a solution could benefit many security-sensitive applications, such as digital government, critical infrastructures, grid computing, e-commerce, and law enforcement. The broader impacts are far reaching in science, education, business, and homeland security. Currently, the internet is getting close to the persons’ life. They login internet to chat with others, download files or browse Web Pages. The internet is also playing an important role in the economy of country. Once the internet breaks down, it will cause an enormous economic loss. Worms is a serious security threat that may cause network congestion and internet break down. Anti-virus software scans files regularly for unusual changes in...

Words: 627 - Pages: 3

Premium Essay

All-in-One Computer Security Systems

...All-in-one Computer Security Systems CIS/105 Some of the different programs that I choose to use as all-in-one security that has total protection are Norton Internet Security and McAfee has an exclusive active protection technology that analyzes and blocks threats in milliseconds. McAfee can immediately detect and remove viruses, even root kits, adware, spyware, and blocks. McAfee has a two-way firewall which blocks outsiders from hacking into your PC. The program also contains other features including ways to better the health of your PC. Norton Internet Security plus 360 versions 4.0 warns you of dangerous downloads before you install and run them on your computer. Norton Internet Security has an extra layer of protection that detects viruses, spyware, Trojans and other threats. In addition Norton 360 4.0 identifies applications that are impacting the performance of your PC. Using an all-in-one computer security protects your CPU from hijackers, identity theft, spyware, and virus. In addition using a security all in one center generally protects the user computer on its own. This keeps your system and all your information safe from others. There are some security programs which protect as well such as Anti-Virus, Anti-Spyware, Anti-Spam, Anti-Root kit, Identity Protection, Link Scanner Active Surf, Link Scanner Search, Web Protection & Firewall, and Sophisticated threat detection. Using an all-in-one security system is effective because the programs are...

Words: 434 - Pages: 2

Premium Essay

Waqas

...Muhammad Waqas Asif MB-S11-1900095 19-B 24 March, 2011 This case study is about the computer virus hunter’s at Symantec Corporation. Symantec Corporation deals with the antivirus software. The product provides protection against harmful contents for the computer. Q 1. Keeping professional excited about the work that is routine and standardized and chaotic is major challenge for Vincent Weafer. How could he use Technical, Human and conceptual skills to maintain an environment that encourage innovation and professionalism among the virus hunters? 1. Technical Skills: a. He provides security storage and system management solution. b. The work never stopped to maintain efficiency. c. When Santa Monica’s team finished, then Tokyo took over, this handed over to Japanese then to Dublin and back to Santa Monica. 2. Human skills: a. Coaching and monitoring the works. b. Networking outside the organization. c. Working in a team to solve the problem. 3. Conceptual skills: a. Using information to solve business problem. b. Discover the problem and finding solutions. Q 2. What management role would Vincent be playing as he (a) had weekly security briefing conference calls with coworkers around the globe, (b) assessed the feasibility of adding a new network security consulting services, and (c) kept employees focused on the company commitment’s to customers? (a) According to the study by Henry Mintzberg managers...

Words: 354 - Pages: 2

Free Essay

Norton

...6/22/13 OrderConfirmationPage United States | Select Product Cart Billing & Payment Review Confirmation Help Your order is complete. You will receive a confirmation email at: lopezluck01@netzero.net Order Confirmation Number NP176206488 Order Date June 22, 2013 Billing & Payment Details Billing Inform ation Paym ent Method Jose L Lopez 23129 bay av Moreno Valley, CA 92553 United States Jose L Lopez VISA xxxxxxxxxxxx0659 Order Details Product Description Operating System Deliv ery Qty Price Norton™ Internet Security (1 Year Subscription for 1 PC) 366 Day(s) protection for 1 PC Expires on 23-Jun-2014 Product Key:JWK8VJ4M74R8687R9G26HVYX7 Serial number:KYHWMQHRHB6P Y our subscription will continue until June 23, 2014 Window s 7 / XP / XP Pro / Vista Renew al 1 $ 19.99 If you have a Norton Product already installed and are having trouble installing your new purchase, pick one of the follow ing help topics for assistance: My Norton product doesn't install after starting the Dow nload Manager Removing the Norton product installed on my computer already before I install my new purchase Tax (8%) $ 1.60 Total $ 21.59 Your Norton Account Your order information has been saved in your Norton Account. Your Norton Account allows you the freedom to: * Manage your products and account information anytime and anywhere * Access your Norton Product Key for easy reinstall * Take advantage of special offers for Norton...

Words: 448 - Pages: 2

Free Essay

Unit 1 Assignment 1

...works or why. These script kiddies have become such a major threat because there are large numbers of them that buy these very lethal malicious software packages and deploy them in mass numbers, wherever the internet touches or wherever technology can be found. Some of these packages have the ability to be custom tailored (called crimeware kits) towards its specific use such as the Zeus kit. This kit can be purchased at $700 and can also be found free in some circles. When these kits are widely distributed and reconfigured so many times in so many ways it creates seemingly infinite amount software which makes it extremely difficult for antivirus companies to keep up. Almost 90,000 different strains of the Zeus toolkit were discovered by Symantec during 2009. “Variants of the Zeus kit use spam to lure users to a website that uses social engineering or that exploits a Web browser vulnerability to install the bot on a victim’s computer. the bot then allows remote access to the computer and can be used to steal information such as the user’s online banking credentials. Each bot can then be used to send additional spam runs to compromise new users.” These kits have become such a lucrative business among cyber criminals that there are rival organizations that develop their software to interfere with...

Words: 344 - Pages: 2

Free Essay

Managing the Virus Hunters

...Case: Managing the Virus Hunters Introduction: Symantec Corp. is a security software company, best known for its Norton antivirus. Founded in 1982 by Gary Hendrix, it is the market leader in security software. Its headquarters are located in Mountain View, California, U.S. and the company operates worldwide. Symantec hires over 18,000 employees and customers all around the globe. Their Response Lab, in Santa Monica, California, is called the “dirtiest network at Symantec” and is the place where the virus-hunters hunt for new computer viruses. Discussion Questions: 1. Keeping Professionals excited about work that is routine and standardized and chaotic is a major challenge for Vincent Weafer. How could he use technical, human, and conceptual skills to maintain an environment that encourages innovation and professionalism among the virus hunters? The job of the virus hunters is, round-the-clock, a hectic and chaotic job. With professionals facing new challenges every day, which just keep on getting tougher and tougher, it could be a cause to demotivate the professionals, and demote innovation. Vincent Weafer is in a position, where he has to encourage his team to remain professional, and work with as much innovation as possible; and for this purpose, he will have to utilize his managerial skills. In a job where all the work rotates around technical elements, it is an essential requirement for Mr. Weafer to be knowledgeable in the technical aspects of the work his team does...

Words: 1592 - Pages: 7

Premium Essay

Comprehensive Grammar Answer Form

...writing. In fact, the three universities that I have attended in the past have all required me to use the APA style of writing. As I recall my high school years, the APA style of writing also seemed to be a favorite amongst my high school teachers. They all required that term papers be written in APA style as well. This type of writing actually does not differ much from the ones included in the text reading. The text mentioned the APA style of writing several times. In my opinion, it appears to be the most popular style of writing, especially amongst college students. Based on the results of the quizzes, my grammar skills were actually a little better than average. I actually had expected to do better, but I guess my grammar skills are not as good as I thought they were. In any event I feel very confident when it comes to spelling, as I have always been a great speller. Even in grade school, I was a good speller. I learned at a very young age to challenge myself when it comes to spelling. Challenging my-self in that area really paid off as I became older, as I’ve never had a problem with spelling. However, I feel that I need more help with run on sentences and with thought patterns. Though I proof read my paper several times, it’s hard for me to see that I have several run on sentences until after I get my grade back. In general, I feel that my writing is just mediocre. However, I also believe that when it comes to writing, I am my own worst critic. Reason being, I am never...

Words: 751 - Pages: 4

Premium Essay

Security

...computer and communications equipment (owned by MIS) magnetic media (owned by Manager) power supplies and plant, such as air-conditioning units (owned by MIS) Software assets (owned by MIS) • • • • application software system software development tools utilities Information assets (owned by Manager or MIS) ‘Information’ means information held by the Company on its own behalf and that entrusted to it by others. The following are examples of the media which may contain or comprise information assets. • • • • • • • • • • databases and data files system documentation user manuals training material operational or support procedures continuity plans and fallback arrangements back-up media on-line magnetic media off-line magnetic media paper Services • • computing and communications services (owned by MIS) heating, lighting and power (owned by Manager or Building Services Manager) 1 17/01/03 First•Base Technologies Town Hall Chambers High Street Shoreham-by-Sea West Sussex BN43 5DD UK Tel: +44 (01273 454 525 Fax: +44 (0)1273 454 526 info@firstbase.co.uk Guidance on Information Classification Categories for classifying document security Category 1 : Routine (non-confidential) documents Description: All documents of a routine nature. Effects of disclosure: No measurable damage to the company or a department. Examples: Normal memos, routine reports, circulars. Estimated occurrence of this classification: More than 80% of all documents would be within this class...

Words: 2760 - Pages: 12

Free Essay

Research

...TO: FROM: SUBJECT: DATE: CC: [CLICK HERE AND TYPE NAME] SAMUEL NEWMAN-BREMANG [CLICK HERE AND TYPE SUBJECT] OCTOBER 22, 2013 [CLICK HERE AND TYPE NAME] C R E A T I N G W A T E R M A R KS I N M I C R O S O F T W O R D [Note: Some steps may vary in Word 97. For additional help, search for “watermark” in the product help or on the Microsoft support site at http://support.microsoft.com.] A watermark is any text or graphic image (such as the “Draft” in the background of this document) that is printed to overlap existing text in a document. A logo printed lightly behind a letter or the word "Confidential" printed lightly on a contract are other examples of watermarks. The rotated “Draft” watermark on this page was created using the Word Art feature. You can insert pictures (such as a logo) from a file or using Clip Art. All three features can be found by clicking on Picture in the Insert menu. To view a watermark as it will appear on the printed page, click Print Layout on the View menu or click Print Preview on the File menu. The watermark will print on every page of this document, just like headers and footers. To edit the watermark or insert a new one, you need to click Header and Footer on the View menu. TO FORMAT A WORDART WATERMARK (LIKE THIS “DRAFT” EXAMPLE): Use the WordArt… command on the Format menu to choose your desired settings for your watermark. There are multiple tabs in that dialog. Use the “Colors and Lines” tab to set the color and transparency. (This “draft”...

Words: 504 - Pages: 3

Premium Essay

How to Write a Good Academic Paper?

...How to Write a Good Academic Paper? That is a question which most students ask and most of them are new to academic writing. Academic writing if taken as a whole, then it would help you figure its significance and what is more important is, it would help you understand the purpose of it. Any good academic writer’s quality is his/her mind is loaded with creative set of ideas that help him navigate through the whole topic of academic paper. Ideas lead you to somewhere and only a few good students are gifted by nature and if you are not then you can also build up a good rhythm of academic writing. Secondly, you should also have a good sense of your audience; you should know what element of your academic writing would entice them and also create some space for your write-up for reading in their schedule. You then research for resources and data that would be of great use to enlighten your readers. Knowing what you audience wants, should be in your priority because readers enjoy what they seek in your writing. Usually what they look out for is something that could either bring them a smile or get them to think over the subject. Having creative ideas doesn’t guarantee a good and well-researched academic writing. You need to able to figure out ways of putting your research in a proper format so that readers don’t feel deviated from the focal point of your write-up. You should use your sources with proper attentiveness else it would completely ruin your efforts from top to bottom....

Words: 477 - Pages: 2

Free Essay

Communication Styles Worksheet

...Hey Jessica, I’m glad your interested in attending the University of Phoenix let me tell you about some of the great resources that are available. First of all they have all kinds of hands on workshops that you can sign up for. They have ones for writing, math, computer skills, exam prep and plenty more. Some other resources are the Center for writing excellence and the Center for mathematics, there are grammar tutorials and plagiarism tutorials and a plagiarism checker as well to help make sure your papers have the proper grammar and the plagiarism checker reviews your paper and tells you how much similarities there is with your paper and other papers so you don’t accidentally plagiarize your paper. Riverpoint writer is a tool to help make sure you are citing your papers properly. In the center for mathematics center they have running start which gives you a review of math concepts to help you brush up on your skills, build math confidence gives you tips to deal with math anxiety it also has study tips, test tips, worksheets and videos. They also have live online math coaching which is only available two weeks before your math class starts through the end of your class. Hope reading about all these resources makes you want to come to the University even more. gotta go talk later. Hello Everyone, I want to review some of the great resources available here at the University of Phoenix. First off I want to go over the workshops that are available to you. There are all...

Words: 431 - Pages: 2

Premium Essay

Cig Rolling

...Joe Polce English 015 Mrs. Wickman How To Roll Your Own Cigarette Is anyone in your life a cigarette smoker? Do you often notice that they are always complaining about their ever-rising price? According to the U.S Census Bureau, out of the 6.7 billion people in the world, 2 billion are smokers of cigarettes or some other form of tobacco. Almost 75% of these 2 billion spend between $1000 - $1500 yearly on their favorite packs and cartons that they just cannot resist. We know its a habit, right? Its also an expensive habit. I am going to show you a quick and easy way to not only cut the cost of cigarettes in half, but also save you hundred of dollars. A select few smokers of the modern world have been fortunate enough to find the solution to the climbing prices of cigarettes. This solution is actually very simple. Why don’t we, instead of spending the $6 plus on an already produced pack of Marlboro Lights, make and produce our own pack of very similar cigarettes? Herein lies the solution; roll your own cigarettes. Most people shy away from such an idea claiming that they would never know where to start, or have no idea where they would buy the equipment, but on contrary the first steps to this new lifestyle are very easy, and the tools needed are readily available. The benefits of rolling your own cigarettes are numerous. First off, its inexpensive. GS Hammack, a man who writes for a website called AssociatedContact.com, said that “smokers that are looking for...

Words: 1797 - Pages: 8

Premium Essay

Blowjobs

...go fuck urself Paper is a thin material mainly used for writing upon, printing upon, drawing or for packaging. It is produced by pressing together moist fibers, typically cellulose pulp derived from wood, rags or grasses, and drying them into flexible sheets. Paper is a versatile material with many uses. Whilst the most common is for writing and printing upon, it is also widely used as a packaging material, in many cleaning products, in a number of industrial and construction processes, and even as a food ingredient – particularly in Asian cultures. Contents [hide] 1 History 2 Papermaking 2.1 Chemical pulping 2.2 Mechanical pulping 2.3 Deinked pulp 2.4 Additives 2.5 Producing paper 2.6 Finishing 3 Applications 4 Types, thickness and weight 5 Paper stability 6 The future of paper 7 See also 8 References and notes 9 External links History Main article: History of paper Further information: Science and technology of the Han Dynasty and List of Chinese inventions Hemp wrapping paper, China, circa 100 BCE.The oldest known archeological fragments of paper date to 2nd century BC China. Papermaking is considered one of the Four Great Inventions of Ancient China, and the pulp papermaking process is ascribed to Cai Lun, a 2nd century AD Han court eunuch.[1] With paper an effective substitute for silk in many applications, China could export silk in greater quantity, contributing to a Golden Age. Paper spread from China through the Islamic...

Words: 665 - Pages: 3