disa

Results 276 - 300 of 762Sort Results By: Published Date | Title | Company Name
Published By: Aerohive     Published Date: Jun 01, 2015
This paper discusses two approaches for efficient WLAN design. Learn more about the advantages and disadvantages of these two approaches. Both let you integrate 802.11ac into your WLAN and both can help lay the foundation for future, high-speed technologies.
Tags : 
networks, wlan, wireless networks, wireless, wlan, technologies, wi-fi
    
Aerohive
Published By: HP     Published Date: Jun 23, 2008
ESG Lab tested the HP XP24000 storage system to validate the business impact of the new capabilities of the XP24000, including HP Thin Provisioning Software, creating large logical pools of capacity and the enhanced performance of the XP24000 as a core component of HP's extensive portfolio of IT solutions and services.
Tags : 
hp disaster proof, disaster-proof, storage array, high availability, disaster recovery, hurricane, natural disaster, disaster
    
HP
Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services
    
Managed Systems, Inc.
Published By: CCSS     Published Date: May 01, 2008
IT Managers are not in the business of luck. They need to prepare for every disaster scenario, every contingency and ensure that even when every object, job and process is running 100% perfectly on the system, some other unforeseen network element doesn't swoop in and ruin all their efforts, just because it resides outside the parameters of the System i. After all, in a situation like this, people remember the one thing that went wrong – not the millions of things that went right – it's unfortunate, but that's life.
Tags : 
network, network management, network monitoring, ccss
    
CCSS
Published By: VMware     Published Date: Aug 09, 2012
Learn how small and midsized businesses are increasingly adopting virtualisation to deliver consolidation, improve data back up and disaster recovery and increase security with an in-depth new paper from the Enterprise Strategy Group (ESG).
Tags : 
vsa, vsphere storage appliance, storage, data, clustering, virtualization
    
VMware
Published By: EMC Backup & Recovery Solutions     Published Date: Aug 04, 2009
Data deduplication is one of a few standout technologies where the CIO can make an investment which is easy to rationalize and brings a fast payback. This paper explains why data deduplication should be on every CIO's project short list in 2009.
Tags : 
emc, data domain, efficiency, disaster recovery, robo, backup, recovery, idc
    
EMC Backup & Recovery Solutions
Published By: Silver Peak     Published Date: Jun 24, 2013
Running multiple data centers can be costly and complex. While using shared WAN links is a viable option for cutting costs, many organizations would rather incur the additional expense of private lines than sacrifice performance. This resource details the challenges of sharing WAN links and explores how WAN optimization – which employs a set of technologies to improve the bandwidth, latency, and loss characteristics of WAN links – can help you achieve the private line performance you need without the high price tag.
Tags : 
data centers, wan links, optimization, technology, improve bandwidth, boost performance, disaster recovery, backup
    
Silver Peak
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how to avoid network failures and evaluate the options available to ensure high-availability, network uptime and optimal network performance. It also shows you solutions that are affordable, and when deployed, are operationally cost-effective.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: Dell Software     Published Date: Apr 25, 2008
In Quest’s new white paper, learn how to implement a solid data protection, recovery, compliance and e-discovery strategy for your critical e-mail data.
Tags : 
disaster recovery, data protection, exchange recovery, exchange e-discovery, comprehensive data protection, continuous data protection, brick level recovery, email archiving
    
Dell Software
Published By: Veeam     Published Date: May 08, 2011
This whitepaper discusses the challenges of a traditional backup and recovery system and provides the solutions to these challenges.
Tags : 
veeam, backup and recovery, vmware, disaster recovery, vmware backup, storage
    
Veeam
Published By: Datto Inc.     Published Date: May 08, 2013
Successful backup is the foundation for disaster recovery and business continuity. Without it, recovery and continuity cannot exist. Without it, an MSP cannot fulfill their SLA. This Executive Brief addresses four essential elements to ensure successful data protection.
Tags : 
backup, recovery, backup and recovery, business continuity, msp, managed service provider
    
Datto Inc.
Published By: Datto Inc.     Published Date: May 08, 2013
What’s important to your SMB clients? This Brief looks at four key benefits that a?backup and disaster recovery (BDR) solution based on hybrid?cloud will deliver to your SMB clients.
Tags : 
hybrid cloud, business continuity, msp, managed service provider, backup and recovery, disaster recovery
    
Datto Inc.
Published By: Dell EMC     Published Date: Aug 01, 2019
Disaster recovery and long-term retention of data can be very challenging for organizations of any size, especially small to mid-sized companies. Cloud can provide efficiencies such as scale, agility, and initial lower storage costs, but organizations face significant challenges when expanding their data protection environments to the cloud. Dell EMC recognizes the use of cloud as a backup destination that is only going to increase in the future and as such they have architected modern IT solutions for small and mid-sized organizations that require powerful, easy to manage and to deploy data protection solutions with the introduction of the Dell EMC DP4400. To learn more, download this report from Dell and Intel®
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 14, 2019
Disaster recovery and long term retention (LTR) of data can be challenging for mid-sized organizations. Keeping a secondary site up for disaster recovery can be expensive and dealing with tape for LTR can be slow and costly. IDPA DD4400 enables mid-size organizations to take advantage of clould efficiencies for data protection with cloud disaster recovery and long term retention. Download this summary from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Late comers to the market, talk the talk, but can’t walk the walk for critical workloads.  Stratus Director of Product Management Denny Lane resets the definitions of fault tolerance and high availability.
Tags : 
stratus, fault tolerance, critical workloads, mission critical business solution, server virtualization, lexicon, high availability, continuous availability
    
Stratus Technologies
Published By: EMC Corporation     Published Date: Jun 12, 2012
Until recently, NorthStar Trade Finance Inc. had primarily been holding their data on legacy storage systems. Find out how they solved their infrastructure performance and growing storage issues using EMC VNXe in this complimentary case study!
Tags : 
emc vnx, northstar, finance, productivity, unified storage, storage, emc, idc analyst report
    
EMC Corporation
Published By: Carbonite     Published Date: Feb 22, 2017
Learn how flexible deployment can make all the difference when it comes to business data backup, and see how EVault can simplify operations in a heterogeneous IT environment.
Tags : 
business backup, cloud backup, cloud recovery, data backup, data recovery, data protection, disaster recovery, draas
    
Carbonite
Published By: IBM     Published Date: Oct 14, 2014
Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.
Tags : 
disaster recovery, dr in-house, outsourcing
    
IBM
Published By: Carbonite     Published Date: Oct 12, 2017
Carbonite provides data protection solutions for businesses and the IT professionals who serve them. Our product suite provides a full complement of backup, disaster recovery, and high availability solutions for any size business in any location around the world, all supported by a state-of-the-art global infrastructure.
Tags : 
draas, data recovery, recovery capability, cloud support, infrastructure
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Find out five good reasons to consider disaster recovery as a service (DRaaS) and use our buyer’s cheat sheet to make sure you are asking the right questions when evaluating a DRaaS solution.
Tags : 
    
Carbonite
Published By: InMage     Published Date: Feb 18, 2009
Disaster recovery involves continuous data availability and much more. Companies that understand the key steps to ensuring smooth recovery from a disaster can choose solutions that meet today’s need and tomorrow’s. This white paper explains the five steps that are necessary to develop and implement a disaster recovery plan, and recommends tools, techniques and best practices to make your efforts a success.
Tags : 
inmage, drp, disaster recovery plan, data management, rpo, recovery point objective, rto, recovery time objective
    
InMage
Published By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions
    
Code42
Published By: Dyn     Published Date: Jan 14, 2015
Read this whitepaper and learn the 5 ways to keeping your network up and your customers happy.
Tags : 
infrastructure, disaster planning, data center, ttl, monitoring, redirect traffic, server health, business intelligence
    
Dyn
Published By: Sage FAS Fixed Assets     Published Date: Apr 11, 2011
The goal of this white paper is to help you learn about best practices for fixed asset management and suggest tips for implementing a successful inventory process.
Tags : 
sage fas, fixed asset inventory, disaster recovery, sarbanes-oxley act, accounting solution, asset inventory process, ghost assets
    
Sage FAS Fixed Assets
Published By: ForeScout     Published Date: Mar 28, 2017
This research report identifies seven IoT devices that can be hacked in as little as three minutes and make organizations extremely vulnerable to attack. The ubiquity of these devices is a recipe for disaster that must be addressed through visibility and control of devices on the network.
Tags : 
forescout, risk, report, hackable, enterprise
    
ForeScout
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.