disk

Results 101 - 125 of 239Sort Results By: Published Date | Title | Company Name
Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage
    
EMC
Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage
    
EMC
Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage
    
EMC
Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage
    
EMC
Published By: EMC     Published Date: Dec 18, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage
    
EMC
Published By: IBM     Published Date: Oct 21, 2009
The purpose of this white paper is to provide an overview of next-generation data protection and recovery options that are designed and priced specifically for small and midsized businesses (SMBs).
Tags : 
data protection, ibm, recovery point objective, rpo, backup, ngdp, disk-based backup, disaster recovery, business continuity, tivoli
    
IBM
Published By: NexGen     Published Date: Feb 09, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now! - See more at: http://www.findwhitep
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development
    
NexGen
Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt
Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt, Inc.
Published By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : 
dell, san, storage area networks, component failures, data loss, reliable san, building san, raid
    
Dell Storage
Published By: IBM Corp     Published Date: Sep 23, 2011
When implementing an active archive strategy, tape has significant advantages over disk, both in cost and functionality.
Tags : 
ibm, technology, tape, disaster recovery, data, backup
    
IBM Corp
Published By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Save time, money, and storage space with ShadowProtect® disk-based backup and disaster recovery software - backup everything and recover anywhere
Tags : 
shadowprotect, storagecraft, storage, backup, disk-based, tape, operating system, windows, running in minutes, save time, recovery, protection, information, it administrators
    
StorageCraft® Technology Corporation
Published By: IBM Cloud Business     Published Date: Jul 13, 2011
Ephemeral disk storage, also known as local disk devices is an important component in using the IBM® SmartCloud. This article details the layout of the virtual disk drives available to the Linux® and WindowsT operating systems for each choice of instance size in the IBM Cloud.
Tags : 
disk, hardware, ibm corp., microsoft windows, operating systems, cloud computing, disk storace, local
    
IBM Cloud Business
Published By: IBM     Published Date: Apr 18, 2012
The term virtualization refers to the creation of virtual machines, virtual networks, and virtual disks (logical images of physical resources) that can execute work and then be returned to a shared resource pool. Cloud computing makes use of virtualization but cloud computing also focuses on allowing computing to be delivered as a service.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, service management, cloud capacity, capacity planning, cloud management, technology platform
    
IBM
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT processors fight sophisticated crimeware with built-in security technologies that work below and beyond the OS
Tags : 
it security, intel, monitoring, reporting, remediation, automatic monitoring, contagions, built-in-security, virtual realms, hardware-based security, intel ipt, software based convenience, anti-virus, security software, memory, network, display, disk
    
Intel
Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
CDW
Published By: CDW     Published Date: Aug 04, 2016
With capacity demands growing constantly, storage environments must take advantage of both spinning-disk and flash technology. For decades, data center managers have faced a constant struggle to efficiently store and retrieve the massive amounts of information that their facilities collect, create and serve up to users. Being able to store and retrieve data quickly and cost-effectively is paramount to running a successful data center. But as the amounts of data that organizations store and retrieve grow at exponential rates, the challenges become thornier. Download this white paper to learn more!
Tags : 
best practices, technology, data, data center, demands, storage, white paper
    
CDW
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware
    
Box
Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
CDW - EMC
Published By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.