Software  >   Systems Software  >   Storage Management Software  >   Backup Software  >  

CDP Software

RSS Feed    Add to Google    Add to My Yahoo!
CDP SoftwareWhite Papers (View All Report Types)
 
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies
sponsored by Syncsort
WHITE PAPER: Creating a full physical clone of an Oracle database can cause a number of headaches for Oracle administrators. Read this white paper for tips on how to streamline this process and to help you avoid the headaches.
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort

Deduplication in Data Protection: Assessing the Benefits
sponsored by Overland Storage
WHITE PAPER: Data deduplication offers the potential for taming the growth of data and delivering increased management efficiency. This white paper by IDC offers a balanced assessment of the benefits and potential disadvantages of deduplication solutions.
Posted: 12 Nov 2007 | Published: 01 Oct 2007

Overland Storage

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

Five Steps to Reduce Your Backup Window
sponsored by Overland Storage
WHITE PAPER: Backup windows are a constant headache for storage administrators and they're constantly trying to find new ways to reduce them. This white paper explains 5 easy steps that will help make shorter backup windows a reality. Read this white paper to l...
Posted: 12 Feb 2008 | Published: 01 Feb 2008

Overland Storage

IDC: Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This IDC white paper describes the growing need for data backup and recovery solutions, the advantages of disk-based systems and the software required to manage these systems. Read this white paper to learn more.
Posted: 02 Apr 2008 | Published: 01 Mar 2008

Hewlett-Packard Company

Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER: Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Symantec Corporation

Beyond Virtual Tape Libraries: End-to-End Data Protection with Syncsort Disk-to-Disk Solutions
sponsored by Syncsort
WHITE PAPER: While VTL data storage has been a popular data protection solution in recent years, the VTL solution may be incomplete for long-term needs. Read this white paper to learn why D2D backup solutions are the ideal data protection technologies for y...
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort

Data Protection Report 2008: Best Practices in Data Backup & Recovery
sponsored by Overland Storage
WHITE PAPER: This white paper outlines the survey results of over 135 storage professionals to understand the top goals, challenges and trends related to data protection in 2008. Read this white paper to learn what's in store for this year.
Posted: 12 Feb 2008 | Published: 01 Jan 2008

Overland Storage

Innovative Business Continuity Solutions with Syncsort XRS
sponsored by Syncsort
WHITE PAPER: This white paper describes a single, fifth generation data protection model that assures 24 x 7 uninterrupted business continuity for your organization's mission-critical applications in all information-related disaster scenarios.
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort

Backup Express and Novell Open Enterprise Server: A Business Continuity Model for OES Migration
sponsored by Syncsort
WHITE PAPER: An operating system migration might complicate backup and recovery if you are not cautious. This white paper offers guidelines to assess whether your business-critical data and applications are protected and available during a migration project.
Posted: 28 Mar 2008 | Published: 01 Mar 2008

Syncsort
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement