Sort results by: Published date | Company name

Virtualization Technologies Aid Disaster Recovery Planning [ Source: Sunbelt Software ]
September 2009- The need to protect virtual server systems is paramount, and where companies want to reduce the costs associated with disaster recovery planning, virtualization can enable easier recovery without a great deal of additional cost. Learn more about enterprise-class disaster recovery and high-availability solutions for cutting-edge virtual environments.

[WHITE PAPER]
Read Abstract | Go to White Paper

6 Key Benefits of Intelligent File Storage Solutions [ Source: Novell ]
April 2010- Organizations need to better track and understand storage patterns, allocate and manage storage based on its relevance and value to the business, while saving money in the administration and procurement of storage resources. Learn how a commercial software tool helps unlock the hidden value in collaborative data—such as presentations, text documents, spreadsheets and videos — the primary output of employee creativity and the fastest consumer of enterprise storage today.

[WHITE PAPER]
Read Abstract | Go to White Paper

Using Intelligence to Manage Your Storage [ Source: Novell ]
April 2010- According to industry analysts, unstructured data—the file-based data such as word processing, presentations, images, videos and virtual machine files on your storage—now frequently makes up the majority of new network disk space installed in an organization. This white paper explores a commercial storage management solution that provides network administrators the ability to access a comprehensive set of network storage information on a variety of server and file systems so they can plan and ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Disaster Recovery Solutions and Strategy [ Source: Riverbed ]
June 2010- Disaster Recovery (DR) is a critical component of IT and risk mitigation strategies, and compounded in difficulty by ever growing data volumes, distributed computing, and new technologies.

How can you get creative in protecting more data, recovering more swiftly, but also saving some money?

Download this whitepaper to learn about how WAN optimization can be a key enabling technology in accelerating DR and accelerating savings, too.

[WHITE PAPER]
Read Abstract | Go to White Paper

Used Magnetic Media Data Erasure & Data Security [ Source: Imation ]
October 2008- With increasing budgetary pressures, data center managers may be tempted to recoup some of their tape investment by reselling magnetic tape cartridges which are no longer needed. The methods tape resellers use in attempts to remove the original owner's data vary widely, and are largely unsuccessful. New data erasing devices are being touted as having the ability to eliminate original customer data while leaving the servo guiding signals of higher capacity cartridges intact. Imation's laboratory ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Accelerate Network Based Backup by 5x [ Source: Riverbed ]
June 2010- One of the greatest challenges today is effectively backing up and protecting the vast amounts of data stored throughout an organization.

With WAN optimization, you can accelerate network-based backup by 5x and can reduce bandwidth use by up to 95%.

Download this paper and learn more about this strategy today.

[WHITE PAPER]
Read Abstract | Go to White Paper

Alternatives for Securing Virtual Networks [ Source: Altor Networks ]
April 2009- View the "Alternatives for Securing Virtual Networks" white paper which describes virtualization security threats and challenges with virtual networks and cloud computing. Add defense-in-depth security to your virtualized data center with Altor VF virtual firewall.

An increasingly large share of data center network traffic is occurring between VMs within a virtualization server - on the “virtual network” - yet VM and network administrators have minimal ability to see or control inter-VM communication. By ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Financial Services: The Need For Visual Privacy [ Source: 3M ]
October 2010- Whether it is being stored, transmitted or viewed, the protection of sensitive customer data and internal financial statements is non-negotiable. Make sure visual privacy isn’t being overlooked in your company’s comprehensive protection strategy.

[WHITE PAPER]
Read Abstract | Go to White Paper

e-Commerce Strategies for Business-to-Business (B2B) Sales and Marketing [ Source: IBM ]
April 2012- You need a single view of the customer, inventory orders and shipments everywhere - across all channels, from order initiation through to fulfillment, including returns. So you know exactly what you need, where you need it and when. Access the perfect order briefcase to learn how you can achieve.

[WHITE PAPER]
Read Abstract | Go to White Paper

Windows 7 Security and Compliance for Public Organizations [ Source: Dell/Microsoft ]
December 2010- Organizations today are under increased pressure to secure their computers, protect their users' and customers' data, and comply with new regulations. Download this paper to learn how Dell computers running Microsoft Windows 7 can help you make your operations more secure and meet compliance requirements.

[WHITE PAPER]
Read Abstract | Go to White Paper