Thin Provisioning White Papers

(View All Report Types)
Buying Less Storage with NetApp
sponsored by NetApp
WHITE PAPER: Data is constantly growing at exponential rates, but how do you stop this cycle? This white paper looks at how correcting provisioning inefficiencies and eliminating data redundancies through data virtualization tools can enable space-effic...
Posted: 05 Jul 2007 | Published: 01 Jun 2007

NetApp

Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management
sponsored by Northern Parklife
WHITE PAPER: In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

Network Appliance and VMware Virtual Infrastructure 3 Storage Best Practices
sponsored by Arrow Electronics, Inc.
WHITE PAPER: This technical report reviews the best practices for implementing VMware Virtual Infrastructures on Network Appliance fabric-attached storage (FAS) systems.
Posted: 29 Jan 2008 | Published: 01 Oct 2007

Arrow Electronics, Inc.

Key management strategies for your virtualized environment: Increasing your return on investment (ROI) on virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Virtualization helps reduce IT costs and increases business agility. Because of this, virtualization technologies are particularly suited to these economic times. This white paper explores the evolution of virtualization, and then gives practical advice on how virtualization can benefit your organization.
Posted: 22 Jul 2009 | Published: 01 Jul 2009

Hewlett Packard Enterprise

Virtualize Servers with Microsoft Hyper-V and NetApp
sponsored by NetApp and Microsoft
WHITE PAPER: Microsoft's Hyper-V technology provides a full-featured server virtualization environment that is well suited for Windows and non-Windows environments. This article will help you understand Hyper-V with some guidelines for getting started using the technology in NetApp environments.
Posted: 09 Feb 2009 | Published: 09 Feb 2009

NetApp and Microsoft

Guidelines for the Evaluation of Enterprise De-Duplication Solutions: How to Navigate the Pitfalls and Hyperbole
sponsored by IBM
WHITE PAPER: This document is not intended to judge what is good or bad, right or wrong. The primary focus is educational, providing a background on the principles of de-duplication and recommendations to consider in planning an evaluation of de-duplication solutions.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

IBM

Cisco UCS – A Real World TCO Analysis
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper reveals five opportunities for infrastructure cost savings. Learn how to simplify management of your data center through integration and automation of network, compute, and virtualization technologies.
Posted: 03 Jun 2011 | Published: 01 Apr 2011

Cisco Systems, Inc.

Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER: IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009

Sirius Computer Solutions

Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines
sponsored by DellEMC and Intel®
WHITE PAPER: This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

DellEMC and Intel®

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software