WHITE PAPER:
The focus of this article is to discuss what application developers need to know to enable their IP, SCSI, iSCSI, sockets or file system based applications to operate over InfiniBand.
WHITE PAPER:
This document discusses how Network Appliance and VMware ESX Server 3.0 work together to provide an effective backup solution in the Loyola Marymount University (LMU) environment. The goal of the VMware/NetApp solution is to provide a crash-consistent process that takes advantage of snapshot-based backups.
WHITE PAPER:
Dell EqualLogic Auto- Snapshot Manager / VMware Edition enables administrators to quickly and easily create hypervisor-aware snapshots of VMs-helping simplify data management, enhance scalability of data protection and recovery, and increase application performance.
WHITE PAPER:
To supplement the growth in iSCSI SANs, Dell has introduced an iSCSI-to-SAS bridge card for the TL-series of tape libraries. This allows a customer to directly attach a tape backup target to their iSCSI 1Gb Ethernet SAN with little to no degradation in transfer speed. This white paper explores
this setup and configuration.
WHITE PAPER:
Serial Attached SCSI (SAS) is gaining popularity in small SAN environments. Read this white paper to learn about SAS zoning and how it helps IT administrators create more flexible, scalable and efficient server networks that meet their business needs.
WHITE PAPER:
This white paper outlines the many data storage challenges facing the IT staff at today's midsize enterprises and discusses how IP-based networked storage can help them overcome these challenges.
EZINE:
In this month's Storage Magazine Online cover story, our resident backup expert, W. Curtis Preston, shows how to test various systems against your data so you can make the right decisions. Plus, check out features on recession-proof storage tips, four-tier storage design, and Continuous Data Protection (CDP).
PRESENTATION TRANSCRIPT:
Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them.