IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Disk to Disk to Tape

RSS Feed    Add to Google    Add to My Yahoo!
Disk to Disk to TapeMultimedia (View All Report Types)
 
Podcast: Tape Backup Systems Economical for Data Retention
sponsored by Iron Mountain
PODCAST: In this podcast, find out why tape has persisted all these years and learn how you can use it to meet your data retention requirements.
Posted: 03 Dec 2012 | Premiered: Nov 19, 2012

Iron Mountain

Tape Backup Systems Economical for Data Retention
sponsored by Iron Mountain
WEBCAST: This webcast discusses the longevity of tape backup and why tape has persisted all these years. Learn how you can use it to meet your data retention requirements.
Posted: 03 Dec 2012 | Premiered: Nov 19, 2012

Iron Mountain

Best Practices for Backup and Recovery
sponsored by Symantec Corporation
WEBCAST: Check out this Symantec webcast discussing best practices for backup and recovery
Posted: 11 Jun 2008 | Premiered: May 6, 2008

Symantec Corporation

D2D Backup and Data Deduplication: Lowering the Costs of Business Continuity
sponsored by Overland Storage
WEBCAST: This Webcast discusses the growing importance of data deduplication as an enabling technology that leverages cost-effective VTLs and other disk appliances to identify and eliminate redundant data.
Posted: 17 Oct 2007 | Premiered: Oct 17, 2007, 09:00 EDT (13:00 GMT)

Overland Storage

Why You Need Email Archiving
sponsored by Insight
WEBCAST: Watch this brief webcast to find out about an email archiving provider that goes beyond backup to preserve your emails and ensure they are searchable and actionable.
Posted: 29 Sep 2014 | Premiered: Sep 29, 2014

Insight

HEAT Service Management Trial
sponsored by FrontRange Solutions Inc.
SOFTWARE DEMO: Click on the link to gain access to a software demo from FrontRange.
Posted: 17 Jul 2014 | Premiered: 17 Jul 2014

FrontRange Solutions Inc.

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

IBM Storwize family for Cloud
sponsored by IBM
WEBCAST: This webcast describes a storage system designed for software-defined environments that both complements and enhances virtual environments. Watch to learn about proven benefits, such as storage virtualization, real-time compression, easy tier, and more!
Posted: 10 Jul 2014 | Premiered: Jul 10, 2014

IBM

Storage and Networking for Desktop Virtualization Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014

IBM

Case Study: Improve Customer Experience with Managed Services
sponsored by Cisco & Fujitsu
VIDEO: Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.
Posted: 22 Oct 2014 | Premiered: 22 Aug 2013

Cisco & Fujitsu
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement