IT Management  >   Systems Operations  >   Contingency Planning  >  

Computer Disaster Recovery

RSS Feed    Add to Google    Add to My Yahoo!
Computer Disaster Recovery White Papers (View All Report Types)
 
The Business Value and ROI of Backup
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper for a comprehensive look at the business value and ROI of backup systems. Additionally, read on to learn about common backup and disaster recovery challenges and how to overcome them.
Posted: 23 Apr 2015 | Published: 31 Oct 2014

Hewlett-Packard Limited

When Disaster Strikes, Will Your BC/DR Plans Be Ready?
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores 4 critical disaster recovery assessments for your organization's cloud-based data and applications.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Best Practices for Deploying WAN Optimization with Data Replication
sponsored by Silver Peak
WHITE PAPER: In this white paper, you'll learn how to properly deploy WAN optimization in disaster recovery situations.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Silver Peak

Presentation Transcript: Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by Commvault
WHITE PAPER: Check out this transcript to learn how you can avoid the data apocalypse. You'll get advice and insight from 2 experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Commvault

Business Continuity: A Growing Opportunity in a Digitalized World
sponsored by Carbonite
WHITE PAPER: This white paper explores the four common challenges channel partners are facing and offers strategies to overcome them and take advantage of market opportunities.
Posted: 10 Apr 2015 | Published: 05 Nov 2014

Carbonite

ESG Lab Review - Data Protection, Recovery and Business Continuity with SIRUS 2
sponsored by Datto, Inc.
WHITE PAPER: This report of ESG examines test results for an image-based data protection, recovery and business continuity solution that uses a hybrid cloud approach to enable highly redundant business continuity and to extend data protection beyond the walls of the local data center.
Posted: 26 Jan 2015 | Published: 28 Nov 2014

Datto, Inc.

Technology in Action: Kingston Tech Migrates to a Broadband WAN
sponsored by Silver Peak
WHITE PAPER: Access this white paper and see how Kingston Technology implemented a software-defined WAN for to reduce costs and complexity while streamlining data replication efforts.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Silver Peak

Debunking the Myths: Cloud HA and DR
sponsored by SIOS Technology Corp
WHITE PAPER: Take a look at this resource to uncover 5 DR and HA in cloud deployment myths, so you can reduce the risk of downtime and data loss, and save big bucks.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

SIOS Technology Corp

Providence Health & Services is Reacting to Threats Five Times Faster
sponsored by Symantec Corporation
WHITE PAPER: This case study features Providence Health & Services experience with a managed security services provider that offered reliable and efficient security management.
Posted: 25 Apr 2014 | Published: 31 Dec 2010

Symantec Corporation

Ensuring High Availability for Critical Systems and Applications
sponsored by Dell, Inc.
WHITE PAPER: Check out this exclusive white paper to discover the ins-and-outs of the software specifically developed to ensure the high availability of Oracle databases.
Posted: 27 Mar 2014 | Published: 10 Jul 2013

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement