Backup Server Hardware Research
-
Data Deduplication: An Essential Component of your Data Protection Strategy
Sponsored by: arcserveData Deduplication is a technology that helps organizations balance opposing demands. Disk based backups can be rolled out in order to reduce the backup window and improve recovery time, and deduplication means the investment in those disk based targets is maximized. Continue reading this white paper to learn more.
-
Remote/Branch Office Data Protection and System Availability
Sponsored by: arcserveThere are many approaches to remote office data protection and system availability. This paper describes best practices in using available technologies for protection, recovery and availability of remote or branch office systems, applications and data.
-
Lessons Learned from Hurricane Katrina: How To Maintain Operations During a Regional Disaster
Sponsored by: SunGard Availability ServicesNo one could have prepared the country for the wrath that Hurricane Katrina unleashed on the Gulf Coast of the United States. Why were businesses not more prepared to recover quickly and continue operating in the face of this disaster? Read this whitepaper to find out how a comprehensive disaster recovery plan could have helped.
-
Five Best Practices for Protecting Backup Data
Sponsored by: Iron Mountain.Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
-
CA ARCserve Replication r15 and CA ARCserve High Availability r15 Evaluation Software
Sponsored by: arcserveCA ARCserve® Replication offers continuous data protection to complement any backup solution. This software trial includes all Replication and High Availability features for your convenience and testing. Download now.
-
CA ARCserve Backup r12.5 SRM Features
Sponsored by: arcserveCA ARCserve Backup r12.5 uses a three-tier architecture within a domain. Check out this demonstration for an explanation of the CA ARCserve Backup r12.5 SRM Features, including architecture, dashboard overview, nodes and tiers, and SRM probe.
-
CA ARCserve Backup r12.5 Virtualization Support
Sponsored by: arcserveWatch this demonstration for an explanation of the CA ARCserve Backup r12.5 agent for virtual machines. This video offers detailed instructions on how to use the agent for virtual machines, including VMware ESX and Hyper-V technology.
-
CA ARCserve Backup r12.5 Security Features
Sponsored by: arcserveCheck out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
-
CA ARCserve Backup r12.5 Disaster Recovery
Sponsored by: arcserveCheck out this demonstration for an explanation of CA ARCserve Backup r12.5 disaster recovery tools. This video offers detailed instructions on this solution's functionality.
-
CA ARCserve Backup r12.5 Technical Video Series: Overview
Sponsored by: arcserveWatch this video for a demonstration of the comprehensive offerings of CA ARCserve Backup r12.5. This video shows how the architecture is designed, how the product works, and how to use the tools.
-
Case Study: Munder Capital Helps to Safeguard $21 Billion in Funds with CA ARCserve Backup
Sponsored by: arcserveRead this case study to learn how this investment firm implemented a simple and scalable disaster recovery solution to protect their sensitive information.
-
E-Book: Planning Your Server Room
Sponsored by: Dell IndiaWhether your server project is large or small, having a dedicated server room will allow you to store backup disks, blades, equipment, and also allow you to have an onsite console for administrators. This eBook will walk you through some of the key steps to setting up a dedicated server room.
-
HP Data Protector Notebook Extension
Sponsored by: Hewlett Packard EnterpriseHP Data Protector software Notebook Extension is a new solution that extends formal backup policies to notebook and desktop PCs. The solution provides continuous and automated protection of information stored locally – even when working off-line. Benefits include reduced risk of information loss, lower operational cost and improved productivity.
-
Presentation Transcript: Protecting Data on the Edge
Sponsored by: Zenith InfotechAccording to industry statistics, the majority of a typical company's data doesn't reside on data center storage -- it lives on the "edge." The edge may be desktop PCs, laptops or even smart phones and PDAs. In this transcript, W. Curtis Preston describes the most effective techniques, tools and best practices for protecting edge or mobile data.
-
Presentation Transcript: Best Practices around How to Economically Boost System and Application Performance with NAND Flash
Sponsored by: Sun Microsystems, Inc.Read this presentation transcript and learn how to optimize your storage infrastructure using the latest NAND technologies, HDD and DRAM.
-
HP white paper: Complete Data Protection for VMware Virtual Environments
Sponsored by: Hewlett Packard EnterpriseThis paper examines the issues of backup and recovery in VMware virtual server environments, and outlines the key features of HP Data Protector.
-
Windows Servers and Storage: Planning Your Server Room
Sponsored by: Dell, Inc. and Intel®This eBook will walk you through some of the key steps to setting up a dedicated server room. Whether your server project is large or small, having a dedicated server room will allow you to store backup disks, blades, equipment, and also allow you to have an onsite console for administrators.
-
Virtual Data Center E-Zine - Volume 11
Sponsored by: Virtual Data Center E-Zine - Volume 11Data center managers face increasing challenges as virtual machines spread across the enterprise. Automation, monitoring and management tools can offer some much needed relief in the battle to keep control in a virtualized environment. In this month's issue of Virtual Data Center, learn how to choose the right virtual tools for the job.
-
VMware and Dell Solutions for Small to Medium Business: Ensuring Rapid, Reliable and Affordable Disaster Recovery
Sponsored by: Dell and VMwareAffordable high availability and disaster recovery solutions are critical to the survival of all SMBs in the event of a disaster. Building on years of helping SMBs protect their information, VMware and Dell provide cost-effective and robust data protection, disaster recovery, and high availability solutions.
-
Virtual Data Center E-Zine - Volume 10
Sponsored by: Virtual Data Center E-Zine - Volume 10Renewed interest in data centers is presenting a unique challenge to IT professionals who must do more with less. Read in this latest issue how to use server virtualization to boost utilization while saving money.
-
Presentation Transcript: How to Economically Boost System and Application Performance with NAND Flash
Sponsored by: Sun Microsystems, Inc.Read this presentation transcript and learn how to optimize your storage infrastructure using the latest NAND technologies, HDD and DRAM.
-
HP StorageWorks 4400 Enterprise Virtual Array (EVA4400) Performance
Sponsored by: Hewlett Packard EnterpriseIn this white paper learn how sequential performance provides customers with improved data transfer rates for applications such as data warehousing, streaming video, high-performance technical computing, and backups and restores.
-
USF Federal Credit Union Establishes Airtight DR with EVault and Simpler-Webb
Sponsored by: i365, makers of EvaultSince implementing i365 InfoStage, things have gotten a lot easier -- and a lot more comfortable -- for USF FCU.
-
Adaptable System Recovery (ASR) for Linux: How to Restore Backups onto Hardware That May Not Be Identical to the Original System
Sponsored by: Storix SoftwareThis paper will introduce the concept of Adaptable System Recovery (ASR) that makes it possible to easily adapt a system backup to fit new hardware by enabling a means for reconfiguring drivers.
-
Implementing Highly Available Data Protection with Veritas NetBackup
Sponsored by: Symantec CorporationThis paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site.