White Papers

  1. Securing Remote Site Data
    Securing data at remote sites has not been a major concern for corporations for many years. In the early 1990’s technology was primarily run by fax machines and crude email communication methods. Submitted by Strategic Storage Solutions
  2. The Case For Integrated Processes
    Based on research and documented case studies, it is clear that companies are realizing significant value by developing integrated processes across the enterprise. This white paper discusses what integrated processes are, how they create value, specific cases of companies succeeding with integrated processes, as well as a checklist to determine how integrated your own company’s processes are. Submitted by SAP Americas
  3. Top 10 Considerations For Scaling A WAN Acceleration Solution
    Security and compliance concerns are creating increased pressure to remove data out of branch offices and to implement robust business continuity plans. At the same time, new WAN acceleration technologies have emerged that deliver order of magnitude performance improvements across a wide breadth of applications. These two factors are creating a “perfect storm” in the IT industry, which is elevating WAN acceleration from a tactical fix to a strategic enabler of key business initiatives. Submitted by Silver Peak
  4. Best Practices In SAN Migration
    The purpose of this paper is to give the Storage Administrator or Storage Architect a general purpose, “best practices” guideline to help him/her through a migration from one Storage Area Network to another in the least intrusive manner. The idea is to give the user a base to start from and to invoke the thought process when taking on such a challenge, though not to provide a step-by-step procedure that answers all questions. RubySky Technologies
  5. Getting A Business Return From Snapshots
    White Paper: TrueSnap
  6. Getting A Business Return From Snapshots
    RELDATA TrueSnap software, part of its embedded TrueBlock software platform, delivers a simple way to create, present and manage snapshots of heterogeneous operating systems and applications within a single management console. By easing the administrative overhead normally associated with snapshots, RELDATA allows snapshots to become part of a comprehensive data protection and data management strategy. Submitted by RELDATA
  7. Top 10 Questions About The Active Archive Appliance
    PowerFile has attempted to pick the top ten questions about the Active Archive Appliance’s (A3) approach to solving the archive storage problem and address them in this article. A3 is an industry first in bringing enterprise data reliability, scalability, and utility, yet definitively better economics and peace of mind in long term data access through the harnessing of consumer-proven storage underpinnings (DVD) in its subsystem. Submitted by PowerFile
  8. Nexsan Assureon SA: Compliance And Security For The Rest Of Us By Mark Bowker, ESG
    Digital archives are not only growing in capacity, but also in the number of individual objects (defined as files and associated metadata) that are being stored and managed by IT. The Assureon SA is a CAS storage appliance capable of protecting, retaining and searching up to 20 million documents that is designed to be a simple plug and play solution for small and medium businesses. Submitted by Enterprise Strategy Group
  9. Reducing Microsoft Exchange Backup Window By 80% And Imaging Mobile PCs Remotely in Five Minutes With Symantec
    Quality Built gathers and manages large amounts of data gathered during the construction of homes. This information is critical to its patent-pending risk assessment systems to accurately identify and track construction quality issues, and the services Quality Built provides to its customers. Protecting large volumes of construction data and keeping that information flowing between its data center and inspectors in the field is critical. Submitted by Symantec Corporation
  10. Email Mining: Emerging New Business Application
    There's a new application coming soon to a corporate email system near you. It's a logical extension, experts say, of the increased emphasis on the archiving and searching of email these days, driven by regulatory compliance and legal discovery. The latter have become cold, hard realities in today's corporate world. This coming new application is called "email mining," because it's all about extracting knowledge from a company's rapidly expanding email stores, using specialized email archiving solutions. Submitted by Auragen