ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Symantec Corporation

  • E-Book: Storage for PACS

    The exciting world of PACS in Healthcare IT is ever-changing and can be confusing, but the rewards are immense once these new technologies are implemented. Check out this informative E-book to learn more about emerging technologies like PACS storage needs, image exchange, and transforming your workstations into imaging hubs.

  • Symantec NetBackup, Cisco UCS, and VMware vSphere Joint Backup Performance Benchmark

    Obtaining the best possible backup performance is always a team effort in the sense that multiple technologies are brought together to provide optimal data protection performance. Read this white paper to learn why the components described in this document will help you to protect your valuable virtual machine environment.

  • Leveraging Clustered File System Software to Deliver Superior Application Availability

    Transactional application availability is more important than ever to businesses in a globalized economy. This Vendor Spotlight examines the various architectural approaches to ensuring application uptime and availability, particularly a clustered file system approach with clustered services.

  • Your Backup Is Not an Archive

    Data growth, budget pressure, rising service-level requirements, and new technologies like virtualization strain the capabilities of traditional backup and recovery processes, but recent advances in data protection and management unlock an optimized strategy. Read on to learn more.

  • Choosing Linux as a Strategic Platform

    This Technology Spotlight discusses the growth of Linux as a strategic platform for enterprises as well as the evolving uses of Linux and its benefits. The paper also looks at the role of Symantec in this important market.

  • Virtualizing Business-Critical Applications With Confidence

    Within any business, a number of applications exist that are critical to the success of the business. As a result, these applications and the systems they run on require a higher level of availability. The trade off with increasing application availability is an additional cost in terms of redundant hardware and complexity.

  • Tiered Storage Tutorial

    Recent technology improvements aiding the success of tiered storage include new solid-state disks (SSDs), improved Serial Attached SCSI (SAS) and more efficient data movement, classification and quality of service (QoS) software. Continue reading this tutorial to learn more.

  • E-Guide: Improving Storage Efficiencies in your Storage Environment

    Storage efficiency is the ability to store and manage data that consumes the least amount of space with little to no impact on performance. Download this guide for tips on evaluating your data storage efficiency and learn how to increase overall efficiency in your enterprise storage environment.

  • Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn

    Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.

  • Symantec's 7 Steps to Windows 7: Planning and Assessment - Presentation Transcript

    With the release of Windows 7, many organizations are considering migrating to this new platform. This transcript explores best practices to aid IT pros in this transition. Discover a wide range of hardware and software technology that will help you prepare for this switch.

  • E-Guide: Backing up Your Virtual Server

    Backing up virtual machines is tougher than you think; and the fact of the matter is it’s not a straightforward process! This guide will walk you through how to determine which method is best for your storage requirement.

  • E-Guide: Climbing the Uphill Battle of Exponential Data Growth

    This guide provides a simple yet reliable approach to securing data for the long term though the efficient optimization of IT resources and a set of straightforward best practices for data protection. Learn archiving best practices, how to choose a data archiving tool, and how to put together the best data archiving strategy for your business.

  • 2010 Annual Study: U.S. Enterprise Encryption Trends

    This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.

  • Symantec 2010 SMB Information Protection Survey

    Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.

  • Virtualizing Business-Critical Applications With Confidence

    Within any business, a number of applications exist that are critical to the success of the business. As a result, these applications and the systems they run on require a higher level of availability. The trade off with increasing application availability is an additional cost in terms of redundant hardware and complexity.

  • Virtual Machine Protection with Symantec NetBackup 7

    Because of the obvious total cost of ownership benefits of virtualization, virtual machines are assuming more business-critical roles in the data center. In a recent survey, more than 75% of all enterprise companies listed server virtualization as one of the top technologies they are adopting. Read this white paper to learn more.

  • Put Data Growth in Its Place

    It’s a fact: Information–both its availability and accessibility–is critical for the success of any business in a 21st Century economy. Yet most IT organizations are not organized around information, but around infrastructure of servers, storage, and applications. We are entering perilous times for data. Read this white paper to learn more.

  • Symantec Enterprise Vault for Microsoft Office SharePoint Server

    Read this informative paper to learn how to manage storage costs, assist in legal discovery, automate the archiving of business critical data, and more, all while providing a seamless end-user experience

  • Intelligent Data Management with Symantec's Enterprise Vault 9.0 & Dell's DX Object Based Storage - Presentation Transcript

    Check out this presentation transcript to learn about an archiving solution that allows businesses to efficiently manage the increasing costs associated with storage growth, compliance and litigation.

  • 2010 SMB Information Protection Survey by Symantec

    This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.

  • Anatomy of a Data Breach - Why Breaches Happen and What to Do About It

    This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.

  • A Candid Examination of Data Deduplication

    This DCIG analyst report will provide a detailed look at the benefits, primary role and implementation methods of data deduplication.

  • Presentation Transcript: Understanding Dedupe

    Access this presentation transcript, brought to you by SearchStorage.com, to develop a better understanding of data deduplication from one of the world’s leading experts on deduplication – W. Curtis Preston.

  • Backup Exec 2010: Archiving Options

    Symantec makes it easier for companies of all sizes to store, manage, protect, and discover Exchange and Windows file servers, with Backup Exec’s new Archiving Options, powered by market-leading Symantec Enterprise Vault. Learn and explore Backup Exec 2010 Archiving Options in this insightful white paper.

  • Backup Exec 2010: Deduplication Option

    Data deduplication offers companies the opportunity to dramatically reduce the amount of storage required for backups and to more efficiently centralize backup data from multiple sites for assured disaster recovery. This paper discusses Backup Exec 2010 which now includes integrated deduplication capabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.