IT Management  >   Systems Operations  >   Contingency Planning  >   Disaster Recovery  >  

Recovery Time Objective

RSS Feed    Add to Google    Add to My Yahoo!
Recovery Time Objective Multimedia (View All Report Types)
 
Podcast: Leading Manufacturer of Cleaning Products Reduces Data Recovery Times from Days to Minutes
sponsored by FalconStor Software
PODCAST: Learn how Rug Doctor, a leading manufacturer of cleaning products, improved its RTO/RPO and replaced its tape backup system using FalconStor CDP for fast disaster recovery (DR) in tandem with VMware technology for server virtualization.
Posted: 18 Jul 2011 | Premiered: Jul 18, 2011

FalconStor Software

Rapid Recovery - Maintaining Operations after the 2011 Japan Earthquake and Tsunami
sponsored by Dell Software
WEBCAST: In this informative webcast, learn the critical need for true Continuous Data Protection (CDP). Then, see how CMC Markets – a financial services organization with an office in Tokyo – relied on CDP servers to maintain operations after the devastating earthquake and tsunami that struck Japan in March 2011.
Posted: 11 Jul 2012 | Premiered: Apr 24, 2012

Dell Software

PHD Virtual RTA Tool
sponsored by PHD Virtual
WEBCAST: This webcast provides information on a virtual Recovery time Actual (RTA) tool that will help you accurately calculate RTOs. Find out how your organization can achieve this goal (hint: no install is needed, just somewhere to run the executable).
Posted: 31 Jan 2014 | Premiered: Nov 11, 2013

PHD Virtual

Bridging the Gap between Facilities and IT with StruxureWare
sponsored by Schneider Electric
VIDEO: Keep your finger on the pulse on one or many data centres through StrxureWare from Schneider electric. Monitor the facilities and stay updated on the mechanical and electrical utilizations via an easy to navigate dashboard.
Posted: 05 Nov 2014 | Premiered: 03 Jul 2013

Schneider Electric

Red Hat Enterprise Linux 7: Perspectives from Industry Analysts
sponsored by Red Hat
WEBCAST: In this video, Rich Fichera from Forrester, Michael Araneta, Phil Carter, and Mayur Sahni from IDC, and Laurent Lachal from Ovum outline requirements for the new era of IT, including mobile, cloud, big data, and social.
Posted: 02 Jul 2015 | Premiered: Jul 2, 2015

Red Hat

Taking Authentication Beyond Passwords for Secure Always-On Mobile Access
sponsored by HID
VIDEO: This short video depicts how mobile workers can gain secure remote access to the company VPN with mobile and tokenless authentication from HID.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

HID

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

Overview of Office 365
sponsored by CDW Corporation
WEBCAST: This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
Posted: 01 Jul 2014 | Premiered: Jun 10, 2014

CDW Corporation

The Changing Face of Disaster Recovery as a Service
sponsored by Dell, Inc.
WEBCAST: This exclusive webcast examines the changes you have to make to your disaster recovery plans as a result of the changes happening in the market.
Posted: 02 Sep 2014 | Premiered: Aug 29, 2014

Dell, Inc.

vGPU Horizon 7: Video Demonstration
sponsored by NVIDIA/VMware
VIDEO: Now, even the most intense graphics apps can run on VDI. See a demonstration of vGPU capabilities in this video.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement