Get your company's research in the hands of targeted business professionals.
Backup And Recovery
Backup refers to the copying of data so that these additional copies may be restored after a data loss event. Backups differ from archives and backup systems differ from fault-tolerant systems. Backups are useful primarily for two purposes: to restore a computer to an operational state following a disaster (called disaster recovery) and to restore small numbers of files after they have been accidentally deleted or corrupted.
In this brief, IDC discusses the challenges of using tape and the benefits of disk-based data protection solutions with data deduplication, especially if a business is experiencing unabated data growth, a lack of recovery performance, and increased costs associated with physical tape.
White Paper Published By: SEPATON
Published Date: Mar 11, 2008
Today’s enterprise faces a convergence of data protection challenges. Addressing them means extending online data retention, enabling deduplication, and simplifying operations. This report outlines how ContentAware VTL and deduplication solutions from SEPATON uniquely address these challenges.
This whitepaper examines some of the short- and long-term issues and challenges that should be part of your due diligence when facing growing demands of your organization’s evolving computing architecture and making major strategic and economic decisions.
White Paper Published By: CA Mainframe
Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
White Paper Published By: IBM
Published Date: Feb 25, 2008
IBM HACMP supports a wide variety of configurations, and provides the cluster administrator with a great deal of flexibility. With this flexibility comes the responsibility to make wise choices. This paper discusses the choices that the cluster designer can make, and about the alternatives that make for the highest level of availability.
White Paper Published By: Code42
Published Date: Apr 22, 2016
Backup isn't just a copy in the cloud. It's the antidote to everything. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to find out how backup makes the enterprise impervious.
A new approach, known as “Big Workflow,” is being created by Adaptive Computing to address the needs of these applications. It is designed to unify public clouds, private clouds, Map Reduce-type clusters, and technical computing clusters. Download now to learn more.
White Paper Published By: Symantec
Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Download to watch why everyone's approach to storage has to change. Due to server virtualization and next generation applications, there is a new batch of storage challenges that businesses have learn to overcome.
This whitepaper: Describes a 4-stage virtualization maturity lifecycle experienced by many organizations and discusses in detail (using sample project plans) the tasks and capabilities required to succeed at each stage of the maturity lifecycle.