Supplier News
-
Networking/VPNs: Dumb, Insecure, And Unreliable — Bad For Business. Why Is It Good For Your WAN?
8/27/2007
What would the world be like without voicemail? We would come back from a meeting to a slew of sticky notes of calls to return. Cellular phones would be little more than glorified walkie-talkies. Submitted by Cybera
-
IP SAN Performance — Best Practices
8/21/2007
Today, there are many IT professionals considering iSCSI-based IP-SAN's as a means for centralizing storage for their application servers. However, it's important to understand how to identify and eliminate latency bottlenecks to ensure superior application performance. In many cases, a properly designed IP-SAN can deliver better performance than internal disk drives. Submitted by SANRAD
-
Data Storage: Symantec Launches Strategy To Unite Enterprise Storage Environments
6/13/2007
Symantec Corp. recently announced Storage United, a new business initiative designed to help enterprise storage professionals address the root causes behind the growing cost and complexity of their storage environments
-
Storage Solution: QStar Technologies Inc. Introduces Its SntryML Email Archive Appliance
5/30/2007
QStar Technologies, Inc. recently announced its SntryML Email Archive Appliance. The appliance is fully integrated with QStar HSM and QStar Data Director data protection products, enabling customers to manage email archives through a seamless tiered storage management structure, supporting disk, tape and optical without integrating a third party software on the email server.
-
Four Steps To Disaster Recovery And Business Continuity Using iSCSI
5/10/2007
Disaster recovery is all about getting back to business as quickly as possible after a failure or error. But your ability to recover is directly tied to what you have done before a disaster occurs – your business continuity plans. You need a business continuity plan that balances potential business losses against the cost of minimizing those losses. This white paper identifies four key steps to developing solid business continuity plans and ensuring rapid disaster recovery. Submitted by EqualLogic
-
Securing Remote Site Data
5/9/2007
Securing data at remote sites has not been a major concern for corporations for many years. In the early 1990’s technology was primarily run by fax machines and crude email communication methods. Submitted by Strategic Storage Solutions
-
The Case For Integrated Processes
3/28/2007
Based on research and documented case studies, it is clear that companies are realizing significant value by developing integrated processes across the enterprise. This white paper discusses what integrated processes are, how they create value, specific cases of companies succeeding with integrated processes, as well as a checklist to determine how integrated your own company’s processes are. Submitted by SAP Americas
-
Top 10 Considerations For Scaling A WAN Acceleration Solution
3/26/2007
Security and compliance concerns are creating increased pressure to remove data out of branch offices and to implement robust business continuity plans. At the same time, new WAN acceleration technologies have emerged that deliver order of magnitude performance improvements across a wide breadth of applications. These two factors are creating a “perfect storm” in the IT industry, which is elevating WAN acceleration from a tactical fix to a strategic enabler of key business initiatives. Submitted by Silver Peak
-
Best Practices In SAN Migration
3/26/2007
The purpose of this paper is to give the Storage Administrator or Storage Architect a general purpose, “best practices” guideline to help him/her through a migration from one Storage Area Network to another in the least intrusive manner. The idea is to give the user a base to start from and to invoke the thought process when taking on such a challenge, though not to provide a step-by-step procedure that answers all questions. RubySky Technologies
-
Getting A Business Return From Snapshots
3/26/2007
RELDATA TrueSnap software, part of its embedded TrueBlock software platform, delivers a simple way to create, present and manage snapshots of heterogeneous operating systems and applications within a single management console. By easing the administrative overhead normally associated with snapshots, RELDATA allows snapshots to become part of a comprehensive data protection and data management strategy. Submitted by RELDATA
This website uses cookies to ensure you get the best experience on our website. Learn more