IT Management  >   Systems Operations  >   Contingency Planning  >  

Data Recovery

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Restore Deleted, Data-recovery, Disk Recovery, Computer Data Recovery, Disc Recovery
DEFINITION: The restoration of data that has been physically damaged or corrupted.
Data RecoveryReports
51 - 75 of 955 Matches Previous Page  | Next Page
Rocket Software: Predictive & Proactive IT and Data Protection Management
sponsored by IBM
WEBCAST: Watch this video to find out how one solution is helping organizations proactively manage heterogeneous and complete IT, storage and data protection infrastructures. Prevent outages and failures with predictive capabilities like real-time content and alerts.
Posted: 25 Aug 2014 | Premiered: Feb 12, 2014

IBM

What’s so great about StoreOnce federated deduplication?
sponsored by Hewlett-Packard Limited
RESOURCE: This resource explores the benefits of federated deduplication, a new approach that can be deployed across the entire storage infrastructure to enable movement of data across various systems without rehydrating the data.
Posted: 21 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited

Advanced Data Protection for Virtualized Environments
sponsored by HP Autonomy
WHITE PAPER: This white paper explores the top 5 challenges for advanced data protection for virtualized environments. It also gives potential solutions to these issues and explores the elements of a consistent, efficient, and policy-based approach to data protection for your environments.
Posted: 18 Aug 2014 | Published: 18 Apr 2014

HP Autonomy

Providing better healthcare with simplified data access
sponsored by Dell and VMware
WHITE PAPER: This case study explains how one organization was able to implement a unified storage strategy that delivers unlimited scalability and simplified data access among other benefits.
Posted: 18 Aug 2014 | Published: 28 Feb 2013

Dell and VMware

3 Reasons to Find Backup and Recovery Built for Virtualized Environments
sponsored by VMware
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

VMware

BYODs Dark Side Data Protection
sponsored by HP Autonomy
WHITE PAPER: This white paper explains how data protection issues can cause a lot of problems with BYOD initiatives. It also highlights one solution that helps secure the data on BYOD devices.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

HP Autonomy

Why Cloud Backup? Top 10 reasons
sponsored by HP Autonomy
WHITE PAPER: Read on to find 10 reasons to move to the cloud for data backup and storage.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

HP Autonomy

Transform Backup and Recovery - HP StoreOnce and HP Data Protector
sponsored by Hewlett-Packard Limited
WHITE PAPER: This whitepaper will help you learn more about a data protection strategy that can help you anticipate and proactively address recovery issues while improving infrastructure utilization with predictive analytics.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Hewlett-Packard Limited

ESG ‘Multiple Data Protection Solutions’ Does Not Have to Mean ‘Multiple Vendors’
sponsored by Hewlett-Packard Limited
WHITE PAPER: This whitepaper examines what is required to maintain reliable business continuity in today's always-on IT environments and explains how to design a cohesive data protection strategy based on a "data protection spectrum".
Posted: 05 Aug 2014 | Published: 05 Aug 2014

Hewlett-Packard Limited

Why StoreOnce Federated Deduplication Matters to HP (ESG)
sponsored by Hewlett-Packard Limited
WHITE PAPER: This whitepaper examines the role of deduplication within the enterprise and the capabilities modern deduplication technologies can provide when it comes to streamlining data backup and restore operations.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

Hewlett-Packard Limited

Building a Better Cloud Backup Business
sponsored by Asigra
WHITE PAPER: This guide will supply you with the key questions and discussion points that you need to consider when determining whether your business and clients are being well served by your current backup and recovery services platform.
Posted: 05 Aug 2014 | Published: 31 Dec 2013

Asigra

Why You Need Backup and Disaster Recovery
sponsored by N-able Technologies
WHITE PAPER: This white paper explains the main threats to data and highlights the reasons that organizations adopt backup and disaster recovery solutions.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

N-able Technologies

Rethinking Backup and Recovery in the Modern Data Center
sponsored by HP Autonomy
WHITE PAPER: This white paper addresses why a new backup and recovery approach must touch 4 key elements – prioritization, prediction, recommendation, and automation – to achieve maximum resource efficiency. Read on to discover 3 important qualities your new backup and recovery approach must have to manage today's changing environments and big data challenges.
Posted: 30 Jul 2014 | Published: 13 Nov 2013

HP Autonomy

How MSPs Can Help SMBs Prevent Irreparable Data Loss
sponsored by N-able Technologies
WHITE PAPER: This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

N-able Technologies

Head to Head Comparison: Two Top Backup Solutions Face Off
sponsored by arcserve
WHITE PAPER: This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

arcserve

7 Benefits You Realize with a Holistic Data Protection Approach
sponsored by CommVault
WHITE PAPER: This white paper explains the 7 benefits of a holistic approach to data protection and highlights how legacy approaches struggle to keep up with modern demands.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

CommVault

Podcast: Avoid the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by CommVault
PODCAST: This podcast delivers advice and insight from two experts in the field regarding the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 08 Jul 2014 | Premiered: Jul 2, 2014

CommVault

Presentation Transcript: Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters
sponsored by CommVault
WHITE PAPER: Check out this transcript to learn how you can avoid the data apocalypse. You'll get advice and insight from 2 experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

CommVault

The End of Data Protection as we know it? Defining a Next Generation
sponsored by Insight and Arcserve
WHITE PAPER: The backup and recovery market is morphing – find out why, and learn what your organization's data recovery team must know in order to address the upcoming challenges.
Posted: 01 Jul 2014 | Published: 01 Jul 2014


Analyst Report: Enterprise Backup Software and Integrated Appliances 2014
sponsored by IBM
RESOURCE: Enterprise backup is among the oldest, most-performed tasks for IT professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
Posted: 30 Jun 2014 | Published: 16 Jun 2014

IBM

How to Manage Storage Complexity While Reducing Costs
sponsored by Red Hat
WHITE PAPER: This whitepaper describes how infrastructure leaders can confidently manage cost, complexity, and risk, capitalize on emerging technologies, and drive future innovation across their organizations with Red Hat Storage Server, an open, software-defined storage platform.
Posted: 03 Jul 2014 | Published: 31 Jan 2014

Red Hat

Enterprise Architects Challenged to Manage Data Explosion
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Storage Server allows enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Posted: 02 Jul 2014 | Published: 29 Nov 2013

Red Hat

How to Handle Business Data Protection Needs in a Physical or Virtual Environment
sponsored by arcserve
WHITE PAPER: This white paper dives into the details about virtualization and unveils some hidden complexities when it comes to backup and recovery requirements.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

arcserve

Business Continuity with the Concerto™ 7000 All Flash Array
sponsored by Violin Memory
WHITE PAPER: Read this white paper and introduce yourself to a recovery and back-up solution that provides comprehensive data protection functions such as mirroring, snapshots, journaling, remote replication, and more.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Violin Memory

Securing Your Organization While Maintaining Here, Near, and Anywhere Data Availability
sponsored by Violin Memory
WHITE PAPER: The right all-flash array based solution provides comprehensive data protection functions to protect against problems in the data center, in a metro environment, and anywhere with different technologies based on the application needs. Read this solution brief to look into the application-specific data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory
51 - 75 of 955 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement