RecruitingBlogscom

Follow Us:

 

data availability

Results 251 - 275 of 318Sort Results By: Published Date | Title | Company Name
Published By: Double-Take Software     Published Date: Jul 27, 2010
Application and data availability can make or break a business. These days backing up to the Cloud is a simple, cost effective way to get the advantages of a datacenter without the expense of creating and managing a physical center. Double-Take Cloud is a simple way to migrate, backup and restore data and applications to the cloud with minimal downtime and complete control over your expenses.
Tags : 
doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto, rpo
    
Double-Take Software
Published By: DoubleTake     Published Date: Jul 27, 2010
Application and data availability can make or break a business. These days backing up to the Cloud is a simple, cost effective way to get the advantages of a datacenter without the expense of creating and managing a physical center.
Tags : 
doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto, rpo
    
DoubleTake
Published By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
DoubleTake
Published By: Pillar Data Systems     Published Date: Apr 20, 2010
Now more than ever, IT managers must spend carefully to keep from negatively impacting the bottom line. Download this paper to learn how you can realize significant savings in storage.
Tags : 
pillar data systems, storage utilization, data availability
    
Pillar Data Systems
Published By: HP Virtualization     Published Date: Mar 22, 2010
Virtually every organization understands that its successful operation depends on the continuous availability of its applications. Most companies rely on internal applications-ranging from enterprise resource planning to payroll systems-to keep the wheels of their enterprise turning. They also depend on external-facing applications for everything from selling products to their customers to automating the supply chain with suppliers and partners. The failure of any of these mission-critical applications could be catastrophic to a business.
Tags : 
business continuity
    
HP Virtualization
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability, data management
    
Vision Solutions
Published By: Emerson Network Power     Published Date: Nov 19, 2009
Download your free white paper today to get a better understanding of the trends driving data center design and management and how you can use them to reduce costs, improve equipment utilization and ensure high availability!
Tags : 
emerson network power, liebert, data center trends, data center design and management, high availability, flex capacity, high density, eco availability, dcim, energy efficiency, power supply
    
Emerson Network Power
Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli
    
IBM
Published By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql
    
Marathon Technologies
Published By: IBM     Published Date: Aug 31, 2009
IBM and SAP® have a unique partnership that was established with the goal of delivering the very best enterprise IT solutions to SAP customers.
Tags : 
ibm, db2 9, sap, information management, sap, deep compression, db2 multi-dimensional clustering, db2 database partitioning feature, sap dba cockpit simplifies operations, autonomic administrative functions
    
IBM
Published By: Alacritech     Published Date: Aug 21, 2009
Customers are increasingly constrained by large transfers of data backup, long backup times to storage devices, and less efficient use of server resources as a result. System and database availability is heavily impacted during backup periods, and with the rapid growth of storage and the need to archive customer data, IT managers are actively seeking solutions for their backup problems.
Tags : 
data backup, backup and recovery, storage, database availability, backup, recovery, servers, backup server, backup servers, data transfer, alacritech
    
Alacritech
Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath
    
Creekpath
Published By: Neverfail Group     Published Date: Aug 21, 2009
This white paper discusses Windows high availability, with a focus on business drivers and benefits. Cost and real-world benefits are considered the two most important elements in choosing the right high availability solution.
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability, sql server, exchange server, ms exchange, microsoft exchange, neverfail
    
Neverfail Group
Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator, the eu directive, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, security center, total security, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: Dell-Intel     Published Date: Jul 16, 2009
The Business Ready Configurations for Dell PowerEdge blade servers, Dell EqualLogic SAN, and VMware Infrastructure provides a detailed reference architecture for deploying and using VMware virtualization on Dell blades and iSCSI storage environments. The Dell PowerEdge M1000e supports the recently announced 11th generation Dell PowerEdge M610 and M710 blade servers based on the new Intel Xeon processors.
Tags : 
data center, virtualization, xeon, dell, intel, equallogic, san, iscsi, vmware infrastructure, iscsi, poweredge, vmware distributed resource scheduler, drs, vmware, high availability, scalable, scalability, lan, failover, balancing
    
Dell-Intel
Published By: HP     Published Date: Jul 08, 2009
The growth of structured data from databases, e-mail and other applications has been exponential. The increasing flood of data can lead to a host of problems — failing to recognize that data storage must be managed as a critical resource often results in a very difficult environment to manage, a higher cost of ownership, less responsiveness to change and added risk to the business. This white paper discusses how a dedicated, optimized network storage solution can increase data availability and reduce operating costs by simplifying management and improving capacity utilization.
Tags : 
simply storage, storage, email, databases, databasing, structured data, network storage solution, capacity utilization, data availability, nas, san, disk array, storageworks, operating costs, shared direct-attached storage, network attached storage, storage area network, proliant, scalability, uptime
    
HP
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
Published By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
Vision Solutions
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage, das, data management, data integration, storage, storage efficiency, implementation, esg, it sandbox, microsoft office sharepoint server, moss, mission-critical, sql
    
NetApp
Published By: NetApp     Published Date: Jun 09, 2009
This paper focuses generally on optimal storage and storage management for SharePoint and specifically evaluates NetApp's approach, detailing how the capabilities in NetApp's DataONTAP and SnapManager for SharePoint Server offerings help to drive storage efficiency, reduce cost, and exclude complexity in a comprehensive SharePoint implementation. It is not so much a "how to" guide, but rather a "why to" explanation. Learn more today!
Tags : 
netapp, microsoft, sharepoint, networked storage, snapmanager, dataontap, direct attached storage, das, data management, data integration, storage, storage efficiency, implementation, esg, it sandbox, microsoft office sharepoint server, moss, mission-critical, sql, triggers
    
NetApp
Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
    
SafeData, LLC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top