Backup deduplication: a complete guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
Posted: 08 Feb 2021 | Published: 24 Jan 2020
|
|
|
Best practices for remote data backups
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.
Posted: 08 Feb 2021 | Published: 24 Feb 2020
|
|
|
Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.
Posted: 22 Jul 2022 | Published: 26 Jul 2022
|
|
|
CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by TechTarget ComputerWeekly.com
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 08 Feb 2021 | Published: 12 Nov 2020
|
|
|
Application Tiering and Tiered Storage
sponsored by DellEMC and IntelĀ®
ANALYST BRIEF:
Storage consolidation brings many applications together to a single storage pool. It improves storage utilization, simplifies management, and increases reliability in well implemented SANs. While consolidation makes it easier to manage, provision, and backup your data, how do you manage different application service level requirements?
Posted: 25 Mar 2009 | Published: 25 Mar 2009
|
|
|
Enhancing Disk-to-Disk (D2D) Backup with Data Deduplication
sponsored by FalconStor Software
WHITE PAPER:
Today's storage environments need a way to keep data intact without consuming corresponding disk storage. The FalconStorĀ® File Interface Deduplication System provides the solution. Read on to discover the amazing benefits of this data deduplication solution.
Posted: 20 May 2009 | Published: 20 May 2009
|
|
|
FalconStor Continuous Data Protector
sponsored by FalconStor Software
PRODUCT OVERVIEW:
Enter the HP Solutions Demo portal for an interactive flash demo and overview on FalconStor CDP with HP Solutions.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
|
|
|
A Holistic View of Virtualization in the Data Center
sponsored by Agilysys-Sun Technology Solutions
WHITE PAPER:
When most IT Pros and CIOs think virtualization, the first thing that comes to mind is server consolidation using server virtualization. However, there is a lot more to virtualization than just "consolidating your servers with VMware." In this analysis, we'll help you to understand the different types of virtualization and which works best for you.
Posted: 09 Mar 2009 | Published: 09 Mar 2009
|
|
|
BACKUP REDESIGN: Do More with Less ... Really!
sponsored by AppAssure Software, Inc.
WHITE PAPER:
The call to protect corporate data in less time and for less money has inspired a whole new way of thinking about backup - a complete backup redesign. This paper explores a better way to backup and protect data and applications - disk-based application.
Posted: 10 Apr 2009 | Published: 10 Apr 2009
|
|
|
Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER:
As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008
|
|