ComputerWeekly.com Research Library

Powered by Bitpipe.com

Business Continuity PlanningResearch

  • From Singapore to Tokyo: Choosing a Data Center Location in Asia Pacific

    Sponsored by: Digital Realty

    This white paper explains why selecting the right data center location is critical for managing costs and mitigating the risks associated with availability, uptime, and resiliency, and includes a checklist to assist enterprises in evaluating and selecting a data center location in Asia Pacific.

  • Building The Always - On, Always - Available Enterprise

    Sponsored by: SUSE

    This white paper explores the 3 steps to take to get on the path to running 24x7x365 services. Read on to learn how you can calculate the cost of downtime, measure availability effectively, and match business needs to the appropriate technologies.

  • Simplify Management & Deliver Business Continuity for VMware Horizon 6

    Sponsored by: VMware

    This whitepaper will help you learn how desktop virtualization can help you simplify end-user management while also optimizing backup and recovery capabilities.

  • SAP HANA® – High Availability FAQ

    Sponsored by: SAP America, Inc.

    In today's reality business cannot stop and data must always be accessible. Learn how SAP HANA can protect data and ensure business continuity in the most demanding mission-critical enterprise environments.

  • Software-defined Storage: Simplify Storage Management and Protect Investments

    Sponsored by: ShiftF7

    Check out this brief paper that includes 4 user success stories for deploying software-defined storage. Learn how application performance and recovery objectives have improved with this data storage technology.

  • Streamline Your Federal Contingency Planning/COOP

    Sponsored by: RSA, The Security Division of EMC

    Learn how to streamline your COOP with an automated and integrated solution. Understand the nuances of the terminology and align with best practices such as NIST 800-34. Align recovery efforts with organizational objectives and priorities.

  • Keys to a Successful BCM Program

    Sponsored by: RSA, The Security Division of EMC

    Watch to discover how a centralized, automated approach to business continuity and disaster recovery planning allows you to respond swiftly in a crisis to protect your operations with the RSA Archer Business Continuity Management solution.

  • Mobile Access to Your BC/DR Plans

    Sponsored by: RSA, The Security Division of EMC

    Watch to discover how the RSA Archer Business Continuity Management Mobile application enables users to view business-continuity or disaster-recovery plans and associated strategies, tasks, calling trees, and requirements from their Apple iOS device.

  • Chasing and Attaining the Goal of Zero Downtime

    Sponsored by: SUSE

    In this expert resource, explore the findings of a recent research report on how successful organizations are identifying causes of downtime and attempting to achieve "zero downtime."

  • Business Continuity Strategy for Windows Azure Best Practices

    Sponsored by: TechGenix

    Access this brief paper to learn about the best practices for your business continuity strategy for Windows Azure. If your backup and disaster recovery plans are geared for the old on-premises way of doing things, check out this paper and the tips that are given to rethink that.

  • Transform Your IT Organization From Cost Center to Innovator

    Sponsored by: Dell and Microsoft

    This white paper introduces end-to-end solutions from Dell that work with Microsoft Windows Server® 2012 and a new generation of Microsoft business applications on flexible, scalable, efficient, virtualization-ready infrastructure.

  • Top 5 Reasons Why You Can’t Afford Not to Virtualize

    Sponsored by: VMware

    This white paper explains why embracing virtualization now is a necessary step for organizations across all industries. It gives the top 5 reasons that organizations need to move forward with virtualization.

  • Woolworths and Google: Innovating together

    Sponsored by: Google

    Tune in to this in-depth webcast to learn how one company was able to implement widespread change within their business with the help of Google Apps for Business. Watch this webcast today, and discover how you can bring serious change to your organization and facilitate innovation within, with Google Apps for Business.

  • Banking on your Data?

    Sponsored by: NTT Communications ICT Solutions and Hitachi Data Systems

    This resource explains the importance of meeting compliance requirements and delivering modern data protection capabilities.

  • 5 Ways Virtualization Can Protect Your Business Now

    Sponsored by: VMware

    This whitepaper details a virtualization foundation focused on building robust business continuity and disaster recovery.

  • Case Study: Why Cooley Group Chose Nasuni for Access to Global Shared Storage

    Sponsored by: Nasuni Corporation

    This case study explains how the Cooley Group provided all employees at remote offices with fast, local data access while also giving IT control over the infrastructure. Read on to find out more about the solution they chose and how your business can take advantage of the same benefits.

  • Infographic: Rethinking protection for the modern data center

    Sponsored by: HP Autonomy

    This inforgraphic examines some of the most important trends surrounding modern IT and protecting the "always-on enterprise."

  • Create a Business Continuity Plan for the Contact Center

    Sponsored by: Genesys

    Companies today need to have a business continuity plan that covers more than minor application downtime -- they need to be ready for the very real possibility of natural or man-made disasters. How prepared is your contact center for disaster? Find out in this white paper.

  • Case Study University of North Texas

    Sponsored by: FrontRange Solutions Inc.

    This white paper introduces an ITSM solution that utilises the cloud, and eliminates the pain points of traditional infrastructure management.

  • University of North Texas System Debuts IT Shared Services in the Cloud

    Sponsored by: FrontRange Solutions Inc.

    This white paper introduces an ITSM solution that utilises the cloud, and  eliminates traditional infrastructure management pain points.

  • Put an End to Unplanned Outages

    Sponsored by: Cox Communications, Inc.

    This white paper introduces one company's solutions to the critical issue of unplanned IT outages, ensuring maximum uptime and minimal losses in the event of a disruption.

  • Best Practices for Disaster Recovery Planning

    Sponsored by: CommVault Systems, Inc.

    This expert e-guide explains the top 10 mistakes that organizations often make in terms of planning a disaster recovery process. It also gives tips on how to can avoid these mistakes as well as advice for selecting the proper operational scenario during disaster recovery testing to ensure a successful DR plan.

  • Avoiding the Data Apocalypse: Mitigating and Minimizing Data Disasters

    Sponsored by: CommVault Systems, Inc.

    Access this webcast to learn how you can mitigate and minimize data disasters by leveraging the advice and insight of experts in the field. You'll also learn about the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.

  • Top Five Benefits of Image-Based Backup

    Sponsored by: Datto, Inc.

    This white paper explains the benefits of image-based backup over traditional methods. Image-based backup provides faster and more reliable data recovery and protection.

  • Multiple Data Protection Methods' Does Not Have To Mean 'Multiple Vendors'

    Sponsored by: HP and Intel

    This webcast gives a breakdown of the various recovery options and how each works in various scenarios. It also highlights the benefits of choosing one vendor for multiple backup tools.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.