it disaster recovery

Results 151 - 175 of 330Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corp.     Published Date: Oct 15, 2012
This survey, conducted by the Independent Oracle Users Group, examined more than 350 data managers and professionals regarding planned and unplanned downtime, database high availability, and disaster recovery solutions.
Tags : 
enterprise data, cloud computing, high availability, downtime, database infrastructure, database availability
    
Oracle Corp.
Published By: EMC Corporation     Published Date: Dec 01, 2014
Data is changing the way organizations manage, consume, and deliver storage. Many legacy applications, however, are still in traditional storage silos, where data is tied to specific vendor storage and not easily configurable and monitored. EMC ViPR is the lightweight, software-only solution that centralizes, automates, and transforms storage into a simple, extensible and open platform.
Tags : 
data protection, availability, disaster recovery, easy configurable, vendor storage
    
EMC Corporation
Published By: Nasuni     Published Date: Apr 28, 2011
Traditionally slow access speeds prevented the real use of the cloud in disaster recovery planning. However, modern cloud storage gateways accelerate the speed of access and can provide immediate access to data stored in the cloud. Read on to learn more today!
Tags : 
nasuni, disaster recovery, cloud storage, offsite data protection
    
Nasuni
Published By: CDW Symantec     Published Date: Sep 06, 2012
Deduplication can save you time and money when backing up your company's data. Discover how it works, how it fits into your existing data infrastructure and how it assists in disaster recovery.
Tags : 
    
CDW Symantec
Published By: CDW Quantum     Published Date: Sep 07, 2012
Deduplication can save you time and money when backing up your company's data. Discover how it works, how it fits into your existing data infrastructure and how it assists in disaster recovery.
Tags : 
data deduplication, cdw, disaster recovery
    
CDW Quantum
Published By: Zerto     Published Date: Nov 02, 2012
Zerto has introduced a virtual-aware, software-only, tier-one, enterprise-class replication solution purpose-built for virtual environments. Read on to learn how this gives a new approach to business continuity and disaster recovery
Tags : 
zerto, business data, business continuity, data recovery, disaster recovery
    
Zerto
Published By: Zerto     Published Date: Nov 02, 2012
When organizations are considering a business continuity/disaster recovery solution, they look for solution that protects and recovers the data and application. Read this white paper to learn more about protecting Tier-1 applications with Zerto.
Tags : 
zerto, application security, data security, data recovery, application recovery, data solution
    
Zerto
Published By: Kaseya     Published Date: Mar 12, 2015
TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.
Tags : 
backup, disaster recovery, it challenges, it solutions, automated data management, virtualization, big data
    
Kaseya
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This course will cover the latest best practices for Business Continuity and Disaster Recovery planning. We will hear from BCDR technology and solutions experts as well as a Senior Business Continuity Manager from a leading financial Institution, who will be sharing their lessons learned.
Tags : 
business resilience, mainline information systems, business continuity, disaster recovery
    
Mainline Information Systems
Published By: NetApp     Published Date: Oct 12, 2010
Read about the simplicity of architecting a robust infrastructure with Microsoft® Windows® Server 2008 R2 Hyper-VT in a virtual environment with NetApp® storage, to provide the ability to maintain HA for both the computing and storage resources between the primary and secondary sites and complete disaster recovery in the event of the loss of a whole site.
Tags : 
netapp, hyper v, microsoft exchange server, sql server, sharepoint server mixed workload, disaster recovery, data center, virtualization
    
NetApp
Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy, hurricane, backup, recovery
    
IBM
Published By: IBM     Published Date: Aug 31, 2009
IBM and SAP® have a unique partnership that was established with the goal of delivering the very best enterprise IT solutions to SAP customers.
Tags : 
ibm, db2 9, sap, information management, sap, deep compression, db2 multi-dimensional clustering, db2 database partitioning feature
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : 
new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
You feel the same pressures to secure your data as a massive corporation does, but without the massive budget. This white paper gives an overview of next-generation data protection and recovery options designed and priced for small and mid-sized business.
Tags : 
ibm, data protection and recovery options, disaster recovery, application protection and recovery, e-mail object recovery, business continuity and resiliency
    
IBM
Published By: IBM     Published Date: Oct 14, 2009
Discover the unique support for data warehousing and business intelligence offered by the IBM DB2 portfolio. This white paper shows how an IBM System z server, integrated with the IBM DB2 family of solutions, can help you meet requirements for data warehousing and business intelligence.
Tags : 
data warehousing, ibm, business intelligence, total cost of ownership, tco, integrated facility for linux, eal5, workload consolidation
    
IBM
Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Jul 25, 2008
The need for reliable hardware that can maintain continuous uptime 24/7 is even more important in a virtual infrastructure. If you are planning to use virtualization to implement business continuity or disaster recovery, ensuring you have the most reliable hardware is essential.
Tags : 
virtualization, fault tolerance, availability, server, servers, virtual, virtual server, stratus
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla)
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Dec 05, 2008
Understand why, if you are planning to use virtualization to implement business continuity or disaster recovery, ensuring you have the most reliable hardware is essential.
Tags : 
stratus technology, virtualization, data center, server
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Haitham Al-Beik, Product Development Engineer, highlights the key product attributes of Avance that deliver ease of use and other elements designed to improve an IT Administrator's world.
Tags : 
stratus, it administration, development engineer, mission critical, web services, disaster recovery, critical data, server unreachable
    
Stratus Technologies
Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt, Inc.
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Today’s business requirements—such as security, disaster recovery, and mobility—are more extensive than ever before. To meet these requirements, Microsoft® Exchange has extended its reach beyond simple e-mail to increase user productivity and keep information close at hand, while being flexible enough to meet your organization’s administrative model.
Tags : 
microsoft exchange, exchange, productivity, microsoft, exchange server
    
Microsoft Exchange
Published By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : 
cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.