IT Management  >   Systems Operations  >   Storage Management  >  

Computer Data Storage

RSS Feed    Add to Google    Add to My Yahoo!
Computer Data Storage White Papers (View All Report Types)
 
Anatomy of an Analytic Enterprise
sponsored by SAS
WHITE PAPER: Collecting data is only a starting point; analysis is the key to success. Explore the anatomy of an analytic enterprise and review some key characteristics and tactics organizations must adopt in order to become a truly data-driven, intelligent enterprise.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

SAS

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Software-Defined Storage: Delivering Greater Business Value and ROI
sponsored by Hedvig Inc
WHITE PAPER: Because apps, data, and business requirements are all rapidly evolving, legacy storage infrastructure simply can't keep up. Fortunately, software-defined storage (SDS) architecture delivers both the agility and the cost savings IT shops need. Read on to delve into SDS essentials and SDS's role in the modern data center.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Hedvig Inc

Can Secure Cloud Storage Solve the Long-Term Archiving Dilemma?
sponsored by Iron Mountain
WHITE PAPER: Explore the cloud-based archive solutions market, and discover the benefits of object storage as flexible software construct for digital archives. Together, cloud services and object storage can provide your enterprise with the ability to leverage an object storage repository without building a large infrastructure for it.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Iron Mountain

Customer Analytics and the Role of Flash
sponsored by IBM
WHITE PAPER: All-flash arrays can deliver extreme performance at very low latency to produce highly scalable data ingest and access. Discover how your enterprise can utilize flash storage to deliver faster, more responsive analysis and a better customer experience.
Posted: 24 Jun 2016 | Published: 30 Apr 2014

IBM

The All Flash Data Center
sponsored by Violin Memory
WHITE PAPER: Read on to enhance business efficiency, resiliency, and ROI that can help grow your business success and market leadership.
Posted: 01 Jul 2014 | Published: 30 Jun 2014

Violin Memory

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

Harness the Power of a Data Center That Adapts to People, Processes, Technology, and Data
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn about a system designed to integrate compute, storage, networking, and virtualization resources to provide the foundation for management automation and orchestration of physical and virtual systems. You'll discover how a unified computing system can optimize your data center.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

Cisco Systems, Inc.

Easing the Way Toward Frictionless Data Discovery
sponsored by IBM
WHITE PAPER: In this white paper, learn about the difficulties encountered when using traditional manual methods of prior data integration, and how data virtualization can ameliorate data distribution challenges. Additionally, learn about a modern virtualization and integration option that provides deep data context, bridges relational data islands, and more.
Posted: 21 Oct 2015 | Published: 31 Aug 2015

IBM

Air-Gap, Isolated Recovery, and Ransomware: Cost vs. Value
sponsored by Rubrik
WHITE PAPER: Have you been thinking about air-gapping your infrastructure with scheduled updates to protect against ransomware? Download this resource to examine a thorough profile detailing isolated recovery—including its limitations—and determine its effectiveness in confronting undetected ransomware file encryption.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Rubrik
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement