Hyper-converged infrastructure vs traditional: the pitfalls and benefits of a storage move
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we give an overview to buying hyper-converged in which we dig into its benefits, such as ease of deployment, resource efficiency, low Opex costs and reduced use of datacentre space. But we also look at the potential pitfalls that include the difficulties of troubleshooting in a tightly-layered environment.
Posted: 08 Feb 2021 | Published: 12 May 2020
|
|
|
Agentless Architecture: Agentless Backup is Not a Myth
sponsored by Asigra
WHITE PAPER:
Agentless backup is NOT a myth. The Asigra solution is proof because it requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. This paper serves as an introduction to Asigra's Hybrid Cloud Backup and Recovery Software.
Posted: 20 Apr 2009 | Published: 20 Apr 2009
|
|
|
SARCOM Simplifies Storage: Virtualization Makes Provisioning and Management Much Easier - and More Cost Effective
sponsored by Hewlett Packard Enterprise
CASE STUDY:
Using HP StorageWorks Command View EVA software, the SARCOM staff could allocate storage resources to meet demand in real time.
Posted: 25 Nov 2008 | Published: 24 Nov 2008
|
|
|
Protecting a Paperless Office
sponsored by DellEMC and Intel®
CASE STUDY:
By working with Dell, the Peterson Sullivan IT group achieved its goals of creating a consolidated and scalable IT environment with strong backup and disaster recovery strategies.
Posted: 02 Dec 2008 | Published: 02 Dec 2008
|
|
|
eGuide: Hyper-V - Microsoft's Approach to Server Virtualization
sponsored by Dell EMC and Microsoft
EGUIDE:
In this informative E-Guide learn specifically how Hyper-V is designed to meet high availability requirements, how this technology is being used at the hardware level, role of a 64-bit operating system with virtualization and more.
Posted: 18 Mar 2009 | Published: 17 Dec 2008
|
|
|
Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management
sponsored by Northern Parklife
WHITE PAPER:
In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention.
Posted: 12 Feb 2009 | Published: 12 Feb 2009
|
|
|
NetBackup Solutions for VMware
sponsored by Symantec Corporation
WEBCAST:
It is critical to choose the right data protection solution, one that is complete, one that not only protects the physical world, but is also finely tuned for the virtual world. The current release of NetBackup delivers award winning solutions for VMware.
Posted: 06 Mar 2009 | Premiered: Mar 6, 2009
|
|
|
Dell™ Equallogic™ PS Series with VMware Site Recovery Manager Simple, Affordable, Automated Disaster Recovery
sponsored by DellEMC and Intel®
PRODUCT LITERATURE:
VMware Site Recovery Manager (SRM) is a new VMware Infrastructure 3-based solution that is tightly integrated with Dell EqualLogic PS Series storage to offer centralized disaster recovery management and testing for a virtualized datacenter.
Posted: 28 May 2008 | Published: 01 May 2008
|
|
|
Next-Generation Power and Cooling for Blade Environments
sponsored by Hewlett Packard Enterprise
TECHNICAL ARTICLE:
In this technical brief, IDC examines HP Thermal Logic, a holistic approach to improving power and cooling efficiency in the IT infrastructure, designed to help companies reduce energy consumption, reclaim unused datacenter capacity, and extend the life of their datacenter.
Posted: 03 Mar 2009 | Published: 03 Mar 2009
|
|
|
Presentation Transcript: Protecting Data on the Edge
sponsored by Zenith Infotech
PRESENTATION TRANSCRIPT:
According to industry statistics, the majority of a typical company's data doesn't reside on data center storage -- it lives on the "edge." The edge may be desktop PCs, laptops or even smart phones and PDAs. In this transcript, W. Curtis Preston describes the most effective techniques, tools and best practices for protecting edge or mobile data.
Posted: 24 Nov 2009 | Published: 24 Nov 2009
|
|