IT Management  >   Systems Operations  >   Contingency Planning  >   Disaster Recovery  >  

Recovery Point Objective

RSS Feed    Add to Google    Add to My Yahoo!
Recovery Point Objective Reports
 
Storage Magazine April 2009: The State of Replication
sponsored by SearchStorage.com
EZINE: Data replication has taken center stage in hot storage technologies and is a fundamental component of DR and backup and recovery operations. This issue's cover story explores where best to deploy replication: in the array, network or servers. Plus, check out features on power-smart disk systems, value-based data protection, deduplication...
Posted: 13 Apr 2009 | Published: 01 Apr 2009

SearchStorage.com

Using Snapshots in Your Data Backup Strategy
sponsored by Dell | EqualLogic
WHITE PAPER: This document discusses the use of snapshots in your data backup strategy, as well as a new snapshot product offering from EqualLogic to simplify your backup projects.
Posted: 17 Dec 2008 | Published: 16 Dec 2008

Dell | EqualLogic

Holistic and Efficient Protection for Oracle Databases with FalconStor CDP
sponsored by FalconStor Software
WHITE PAPER: This white paper explains how FalconStor CDP delivers a comprehensive backup, restore, and recovery regime for Oracle that protects against soft and hard errors.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

FalconStor Software

Network disaster recovery and business continuity technology tutorial
sponsored by Riverbed Technology, Inc.
EBOOK: Server virtualization is a popular topic in business continuity (BC) and disaster recovery (DR). Here's a quick look at some common myths and the realities that are constantly changing in the server virtualization landscape.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

Riverbed Technology, Inc.

Taking the Pain out of Data Protection, Recovery and Restore
sponsored by Zetta Inc.
WHITE PAPER: Ninety five percent of organizations that failed to recover their data and systems within two weeks of a disaster go out of business within two years. This is not a pretty picture. Regrettably, the consequences of poor DR preparedness will only come to light when there is a disaster. There has to be a better way. There is. 
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Zetta Inc.

Disaster Recovery Utilizing P2Vs
sponsored by AMD
PRESENTATION TRANSCRIPT: This presentation transcript follows the history of P2V and explains how companies can extend virtualization to the physical machines in their production environments. Find out when virtualization may not be recommended and discover key DR points to keep in mind. including RTO and RPO.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

AMD

E-Guide: Continuous Data Protection Backup Tutorial on CDP Tools, Part 1
sponsored by FalconStor Software
EGUIDE: In part one of this tutorial on continuous data protection backup, learn about the latest CDP tools, how CDP has grown over the past few years, and the history of CDP tools and how they are evolving.
Posted: 20 May 2011 | Published: 20 May 2011

FalconStor Software

Rapid Recovery - Maintaining Operations after the 2011 Japan Earthquake and Tsunami
sponsored by Dell Software
WEBCAST: In this informative webcast, learn the critical need for true Continuous Data Protection (CDP). Then, see how CMC Markets – a financial services organization with an office in Tokyo – relied on CDP servers to maintain operations after the devastating earthquake and tsunami that struck Japan in March 2011.
Posted: 11 Jul 2012 | Premiered: Apr 24, 2012

Dell Software

Data Protection: Evaluating Business Requirements and Classifying Your Data
sponsored by Dell Software
WHITE PAPER: Protecting your company's data and applications means much more than running a backup routine. It should mean protecting your business assets throughout their lifecycle — preservation, recoverability and availability. A complete data-protection approach can help your company adapt to rapidly changing opportunities. Read the White Paper.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Dell Software

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement