Backup Hardware Reports

Cloud backup vs traditional backup
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.
Posted: 08 Feb 2021 | Published: 06 Dec 2019

TechTarget ComputerWeekly.com

Infographic: 5 considerations before buying data center backup software
sponsored by TechTarget ComputerWeekly.com
EBOOK: Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.
Posted: 14 Jun 2022 | Published: 14 Jun 2022

TechTarget ComputerWeekly.com

Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017

TechTarget ComputerWeekly.com

Presentation Transcript: Protecting Data on the Edge
sponsored by Zenith Infotech
PRESENTATION TRANSCRIPT: According to industry statistics, the majority of a typical company's data doesn't reside on data center storage -- it lives on the "edge." The edge may be desktop PCs, laptops or even smart phones and PDAs. In this transcript, W. Curtis Preston describes the most effective techniques, tools and best practices for protecting edge or mobile data.
Posted: 24 Nov 2009 | Published: 24 Nov 2009

Zenith Infotech

USF Federal Credit Union Establishes Airtight DR with EVault and Simpler-Webb
sponsored by i365, makers of Evault
CASE STUDY: Since implementing i365 InfoStage, things have gotten a lot easier -- and a lot more comfortable -- for USF FCU.
Posted: 24 Apr 2008 | Published: 24 Apr 2008

i365, makers of Evault

Best Practices in Protecting the Technology Systems Revolutionizing Healthcare
sponsored by Emerson Network Power
WHITE PAPER: With technology infiltrating every aspect of healthcare, traditional approaches to power protection no longer suffice. This paper introduces a new hospital power protection model that leverages technologies and best practices forged in the data center.
Posted: 08 Aug 2013 | Published: 07 Jul 2009

Emerson Network Power

Adaptable System Recovery (ASR) for Linux: How to Restore Backups onto Hardware That May Not Be Identical to the Original System
sponsored by Storix Software
WHITE PAPER: This paper will introduce the concept of Adaptable System Recovery (ASR) that makes it possible to easily adapt a system backup to fit new hardware by enabling a means for reconfiguring drivers.
Posted: 25 Feb 2008 | Published: 25 Feb 2008

Storix Software

Presentation Transcript: How to Economically Boost System and Application Performance with NAND Flash
sponsored by Sun Microsystems, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript and learn how to optimize your storage infrastructure using the latest NAND technologies, HDD and DRAM.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Sun Microsystems, Inc.

VMware and Dell Solutions for Small to Medium Business: Ensuring Rapid, Reliable and Affordable Disaster Recovery
sponsored by Dell and VMware
PRODUCT OVERVIEW: Affordable high availability and disaster recovery solutions are critical to the survival of all SMBs in the event of a disaster. Building on years of helping SMBs protect their information, VMware and Dell provide cost-effective and robust data protection, disaster recovery, and high availability solutions.
Posted: 01 Jun 2009 | Published: 01 Feb 2009

Dell and VMware

Implementing Highly Available Data Protection with Veritas NetBackup
sponsored by Symantec Corporation
WHITE PAPER: This paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site.
Posted: 07 Feb 2008 | Published: 01 Jan 2008

Symantec Corporation