IT Management  >   Systems Operations  >   Contingency Planning  >  

Computer Disaster Recovery

RSS Feed    Add to Google    Add to My Yahoo!
Computer Disaster RecoveryReports
 
Case Study: Texas Tech University Requires Updated Backup & Recovery Software
sponsored by CommVault Systems, Inc.
CASE STUDY: Check out this informative case study to find out which software Texas Tech University implemented to meet their environments needs.
Posted: 10 Feb 2014 | Published: 07 Jan 2013

CommVault Systems, Inc.

The Basics of Data Deduplication Solutions
sponsored by Dell Software
EGUIDE: This guide gives the basics of deduplication and focuses on how deduplication fits in with disaster recovery strategies. It also shows the advantages of hardware and software deduplication.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell Software

Network Programmability Is Real: Five Use Cases for Our Disaster Recovery Cloud Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource covers the benefits found from five use cases for a networking platform that will provide added flexibility and agility.
Posted: 07 Apr 2014 | Published: 17 Feb 2014

Cisco Systems, Inc.

Disaster Recovery Plans Should Affect More Than Just IT
sponsored by Veeam Software
EGUIDE: Take a look at this expert e-guide to find out about the many disaster recovery options available, and how they would fit into your company's environment.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

Veeam Software

Aligning Your Business Needs with Veeam Backup & Replication
sponsored by Veeam Software
WHITE PAPER: Read through this in-depth white paper to find out how critical your data and systems are to your company, and how this vendor's backup and replication solution can provide you with superior data protection.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Veeam Software

A UK Security Provider Fortifies its Systems for Greater Resiliency
sponsored by IBM
CASE STUDY: This informative case study explores one company's success with a disaster recovery plan and how it sought business continuity while ensuring security.
Posted: 08 Apr 2014 | Published: 31 Dec 2012

IBM

SharePoint Object Recovery
sponsored by PHD Virtual
WEBCAST: Watch this webcast that highlights a recovery tool and draws out the steps you need to take to execute a granular level of restoration, including the recovery of lists, libraries and folders on SharePoint.
Posted: 31 Jan 2014 | Premiered: Aug 19, 2013

PHD Virtual

Welcome to Iron Mountain’s National Data Center
sponsored by Iron Mountain
WEBCAST: This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.
Posted: 27 Jan 2014 | Premiered: Jan 27, 2014

Iron Mountain

New Data Center Designs Go Underground for Energy Efficiency
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a service that's changing the data center colocation model by delivering the key capabilities and functions you need to align your data center infrastructure with disaster recovery requirements and fuel success.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Meeting Backup and Archive Challenges - Today and Tomorrow
sponsored by Fujitsu
WHITE PAPER: This exclusive paper discusses the backup and recovery challenges that organizations today face, focusing on how you can overcome common data management and archiving challenges to ensure that, in the event of disaster, your critical data and services are up and running as fast as possible.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Fujitsu
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement