Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it recovery

Results 301 - 325 of 636Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 31, 2009
IBM and SAP® have a unique partnership that was established with the goal of delivering the very best enterprise IT solutions to SAP customers.
Tags : 
ibm, db2 9, sap, information management, sap, deep compression, db2 multi-dimensional clustering, db2 database partitioning feature
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : 
ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoliŽ storage manager fastback, remote office
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : 
new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
You feel the same pressures to secure your data as a massive corporation does, but without the massive budget. This white paper gives an overview of next-generation data protection and recovery options designed and priced for small and mid-sized business.
Tags : 
ibm, data protection and recovery options, disaster recovery, application protection and recovery, e-mail object recovery, business continuity and resiliency
    
IBM
Published By: IBM     Published Date: Oct 14, 2009
Discover the unique support for data warehousing and business intelligence offered by the IBM DB2 portfolio. This white paper shows how an IBM System z server, integrated with the IBM DB2 family of solutions, can help you meet requirements for data warehousing and business intelligence.
Tags : 
data warehousing, ibm, business intelligence, total cost of ownership, tco, integrated facility for linux, eal5, workload consolidation
    
IBM
Published By: IBM     Published Date: Oct 21, 2009
The purpose of this white paper is to provide an overview of next-generation data protection and recovery options that are designed and priced specifically for small and midsized businesses (SMBs).
Tags : 
data protection, ibm, recovery point objective, rpo, backup, ngdp, disk-based backup, disaster recovery
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
Listen to the recording, "CDPS Analyst Interview with John Webster of Illuminata," to see how the IBM Comprehensive Data Protection Express solution addresses the needs of midmarket companies that don't have adequate backup and recovery capabilities for their critical data.
Tags : 
data loss, ibm, data protection, backup and recovery
    
IBM
Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Jul 25, 2008
The need for reliable hardware that can maintain continuous uptime 24/7 is even more important in a virtual infrastructure. If you are planning to use virtualization to implement business continuity or disaster recovery, ensuring you have the most reliable hardware is essential.
Tags : 
virtualization, fault tolerance, availability, server, servers, virtual, virtual server, stratus
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla)
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Dec 05, 2008
Understand why, if you are planning to use virtualization to implement business continuity or disaster recovery, ensuring you have the most reliable hardware is essential.
Tags : 
stratus technology, virtualization, data center, server
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Haitham Al-Beik, Product Development Engineer, highlights the key product attributes of Avance that deliver ease of use and other elements designed to improve an IT Administrator's world.
Tags : 
stratus, it administration, development engineer, mission critical, web services, disaster recovery, critical data, server unreachable
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical
    
Stratus Technologies
Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt, Inc.
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Today’s business requirements—such as security, disaster recovery, and mobility—are more extensive than ever before. To meet these requirements, Microsoft® Exchange has extended its reach beyond simple e-mail to increase user productivity and keep information close at hand, while being flexible enough to meet your organization’s administrative model.
Tags : 
microsoft exchange, exchange, productivity, microsoft, exchange server, it management, servers
    
Microsoft Exchange
Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions
    
LockLizard
Published By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : 
cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection
    
Cisco
Published By: ESET     Published Date: Jan 21, 2010
The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing your exposure to attacks from cybercriminals.
Tags : 
eset, security, cybercriminal, internet security, malware, back up and recovery, phishing
    
ESET
Published By: GoToMeeting     Published Date: Jul 29, 2011
Watch this on-demand Webinar to hear Terrence Gargiulo, president of MakingStories.net, share stories of how companies use virtual collaboration technology to address these challenges and effectively manage projects.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the training challenges of a global market, virtual teams and an ever-changing business climate.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
    
GoToMeeting
Published By: Citrix Online     Published Date: Jun 09, 2010
This new Forrester white paper explores the critical role that the help desk should play in your organization's business continuity planning.
Tags : 
citrix online, help desk, disaster recovery, business continuity, service desk
    
Citrix Online
Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
    
ScriptLogic
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.