IT Management  >   Systems Operations  >   Contingency Planning  >  

BCP

RSS Feed    Add to Google    Add to My Yahoo!
BCP Reports
 
The Democratization of IT Disaster Recovery
sponsored by Commvault
WHITE PAPER: This white paper presents the new trends and developments that have made DR widely available and discusses how you can best implement DR in your environment.
Posted: 20 Aug 2015 | Published: 30 Sep 2014

Commvault

How to Enhance Testing for Better Disaster Recovery
sponsored by IBM
WHITE PAPER: This white paper explores a 3-step testing approach that targets IT infrastructure recovery, application recovery, and business validation. Read on to discover the objectives, roles/responsibilities, and validation criteria essential to each stage.
Posted: 31 Aug 2015 | Published: 31 Oct 2014

IBM

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Case Study: Computer Troubleshooters Keeps Its Data Protection Promise
sponsored by Carbonite
WEBCAST: Computer Troubleshooters, an international network of IT service offices, made a promise to keep its customers' data protected no matter what. Watch this brief case study to learn how Computer Troubleshooters kept its promise.
Posted: 07 Dec 2015 | Premiered: Jun 12, 2015

Carbonite

Red Hat Gluster Storage's snapshot feature
sponsored by Red Hat
WHITE PAPER: The following resource provides readers with a technology overview of Red Hat Gluster Storage's Snapshot feature. Access now and learn how this feature can provide a point-in-time copy of Red Hat Gluster Storage server volume(s) so that an administrator can revert to a previous state of data in case of a mishap.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

Red Hat

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

ComputerWeekly.com

Plan and Act on Findings with IBM Cognos Enterprise
sponsored by IBM
WEBCAST: The following webcast depicts how to create, update, and manage a successful business plan. Discover what techniques you can use to move your business forward.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

IBM

Proactive Measures Help to Ensure Business Continuity
sponsored by SearchServerVirtualization
EBOOK: Having a virtualized infrastructure provides significant benefits to businesses, but there needs to be planning to ensure that disasters are limited in frequency and scope.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

SearchServerVirtualization

Network Project of the Year 2014
sponsored by Talari_DON'T USE
CASE STUDY: This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Talari_DON'T USE

Demand More From Your Data Center Environment
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
BCP White Papers | BCP Multimedia | BCP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement