Hardware  >   Computer Hardware  >   Server Hardware  >  

Backup and Recovery Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Backup and Recovery Hardware Reports
 
IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Overcome Today's Disaster Recovery Challenges: Dealing with Endpoint Data Protection Challenges
sponsored by SearchDisasterRecovery.com
EBOOK: Today's workforce is increasingly mobile and BYOD has taken hold in many organizations. The use of a variety of devices not directly connected to a local network is a challenge for IT staffs tasked with protecting data on those devices.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

SearchDisasterRecovery.com

Data Protection Today
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: This classroom takes a look at virtual server recovery advancements, why today's disk backup solutions may struggle with modern recovery demands, and how to craft a robust data protection strategy that goes beyond just backup to focus on speedy recovery for critical apps.
Posted: 30 Jul 2014 | Premiered: 01 Aug 2014

Dell, Inc.

Change Block Tracking (CBT) – What happens to the Deleted Blocks?
sponsored by Vembu Technologies
RESOURCE: This blog post explains how Change Block Tracking (CBT) works, and the differences between the old and new versions.
Posted: 09 Dec 2014 | Published: 20 Nov 2014

Vembu Technologies

Holt Children’s Services uses Seagate NAS HDDs to Bring Efficiency to its Social Welfare Agencies
sponsored by Seagate Technology
WHITE PAPER: Holt Children's Services had massive input/output data on more than three million children. They also needed an information protection and system data management system. Read this case study to learn more about their solution.
Posted: 20 Mar 2015 | Published: 20 Mar 2015

Seagate Technology

Backup Solutions for Today’s SMB
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores a continuum of solutions, including advances in both tape and disk technologies, that allow SMBs to proactively and systematically backup their data affordably, without disrupting day-to-day operations.
Posted: 27 Nov 2013 | Published: 30 Sep 2013

Hewlett-Packard Company

E-guide: Cloud Backup vs. On-Site Backup
sponsored by HP and Intel
EGUIDE: This expert e-guide explores the factors you need to consider when trying deciding if cloud backup is right for your organization, including budget, daily backup capacity, infrastructure, and more.
Posted: 13 Sep 2011 | Published: 13 Sep 2011

HP and Intel

Symantec CEO: "We'll Win in Virtual Backup and the Cloud"
sponsored by Symantec Corporation
EGUIDE: In this interview with SearchDataBackup.com, Symantec CEO Enrique Salem explores the cloud’s role in modern backup and why he expects backup appliances will eventually make up the bulk of backup implementations. Read now to learn more.
Posted: 11 Jun 2012 | Published: 11 Jun 2012

Symantec Corporation

Backup School Presentation Download
sponsored by SearchStorage.com
PRESENTATION TRANSCRIPT: Storage managers have two responsibilities: providing a home for the company’s data and protecting those assets from damage or loss. If the first part is tough, the second is more so. Backup is at the top of every storage manager’s priority list. This backup Presentation Download will address key data protection topics.
Posted: 29 Mar 2011 | Published: 29 Mar 2011

SearchStorage.com

Software designer creates environment for growth
sponsored by Dell, Inc.
CASE STUDY: Learn how a software design group improved productivity and client services by replacing its backup and restore solution with Dell AppAssure.
Posted: 04 Mar 2014 | Published: 28 Feb 2014

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement