Redundant Array of Inexpensive Disks Reports

Essential Guide to Solid-State Storage Implementation
sponsored by TechTarget Storage
ESSENTIAL GUIDE: Learn about the vast power and potential of solid-state storage in this Essential Guide to SSS implementation. Access five expert-written articles about SSS deployment, its impact, how to harness the most power from it and more!
Posted: 25 Jul 2012 | Published: 23 Jul 2012

TechTarget Storage

Making Server Redundancy Affordable for Remote and Branch Offices
sponsored by LSI Corporation.
WHITE PAPER: Setting up redundant servers with full data protection can be too expensive, complex, and impractical for many organizations. Read how ROBO sites deploying Syncro solutions can cost effectively give you business continuity and robust data protection.
Posted: 19 Jul 2013 | Published: 31 May 2013

LSI Corporation.

Presentation Transcript: Deduplication's Impact on Restores
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This segment begins with an explanation of how long to store backups to get the maximum benefit of deduplication, and then discusses the appropriate frequency of full backups.
Posted: 07 Apr 2009 | Published: 07 Apr 2009

Hewlett Packard Enterprise

IDC White Paper: Key Criteria in Selecting an Enterprise Online PC Backup Solution
sponsored by Iron Mountain
WHITE PAPER: This paper illustrates the top–level benefits of online PC backup. Read this paper to learn more about how to choose an online PC backup solution for your mid-sized organization or enterprise!
Posted: 11 Jan 2010 | Published: 15 Dec 2008

Iron Mountain

The Architectural Advantages of Compellent Automated Tiered Storage
sponsored by Dell Compellent
WHITE PAPER: With the recent profusion of tiered storage solutions into the enterprise storage market, organizations are increasingly adopting tiering strategies to accommodate rapid data growth while controlling costs. Yet most solutions fail to maximize the potential benefits of tiered storage. Read this white paper to learn more.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Dell Compellent

Auto-Snapshot Manager/VMware® Edition: Automated, Integrated, and Scalable Protection of Virtual Machines
sponsored by DellEMC and Intel®
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines.
Posted: 15 Sep 2008 | Published: 15 Mar 2008

DellEMC and Intel®

Adaptec Zero-Maintenance Cache Protection
sponsored by Adaptec, Inc.
PRODUCT OVERVIEW: Adaptec Series 5Z RAID controllers with Zero-Maintenance Cache Protection (ZMCP - pronounced “zemcap”) provide maximum protection for cached data and eliminate the substantial costs and environmental impact of complex, messy and expensive Lithium Ion batteries, while improving cache protection and cache performance.
Posted: 04 Nov 2009 | Published: 04 Nov 2009

Adaptec, Inc.

Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management
sponsored by Northern Parklife
WHITE PAPER: In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

Presentation Transcript: Analysts React: Dell Blades Announcement
sponsored by Dell and VMware
PRESENTATION TRANSCRIPT: SearchStorage.com editors interviewed industry experts Howard Marks, Terri McClure and Andrew Reichman to get their reactions to Dell Inc. launching the Dell EqualLogic PS-M4110 Blade Arrays at Dell Storage Forum 2012.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

Dell and VMware

Best Practices: Backing Up VMware with Veritas NetBackup
sponsored by Symantec Corporation
WHITE PAPER: As there are many ways of using VMware technology, there are just as many methods available for protecting this innovative technology. System administrators and IT technologists can use this paper to determine one of three recommended solutions for protecting VMs. Each of these technologies has relative advantages and disadvantages.
Posted: 17 Mar 2009 | Published: 01 Jan 2009

Symantec Corporation