rto

Results 176 - 200 of 207Sort Results By: Published Date | Title | Company Name
By: Zerto     Published Date: Oct 22, 2014
A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto’s easy integration with VMware.
Tags : zerto, vmware, virtualization, data center, virtual replication, replication, business continuity, disaster recovery
     Zerto
By: Sparton Corporation     Published Date: Oct 12, 2017
For decades, China has offered a skilled, low-cost manufacturing base. But more and more companies are leaving China for Southeast Asia — Viet Nam, Cambodia, Malaysia and others. Investment figures suggest a long-term shift in manufacturing is underway. What’s behind the move away from China? Our white paper explains the issues, details the benefits of Southeast Asia and addresses questions about quality and production.
Tags : outsourced manufacturing, southeast asia, global manufacturing, vietnam, manufacturing services asia, contract manufacturing asia, design services asia, low cost manufacturing, circuit card manufacturing, alternatives to manufacturing in china
     Sparton Corporation
By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
     Vision Solutions
By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
     Vision Solutions
By: InMage     Published Date: Feb 18, 2009
Disaster recovery involves continuous data availability and much more. Companies that understand the key steps to ensuring smooth recovery from a disaster can choose solutions that meet today’s need and tomorrow’s. This white paper explains the five steps that are necessary to develop and implement a disaster recovery plan, and recommends tools, techniques and best practices to make your efforts a success.
Tags : inmage, drp, disaster recovery plan, data management, rpo, recovery point objective, rto, recovery time objective, strategic disaster recover, local backup
     InMage
By: InMage     Published Date: Feb 18, 2009
Replication has become a catchall phrase that while gaining in allure is also gaining in confusion – especially in the mid-tier where data is just as important as the high-end, but IT staffing and budgets are far more limited. IT people as well as vendors have a tendency to lump all data movement functions together as replication, regardless of the method or the reason.
Tags : inmage, esg, replication methodologies, replication applications, disaster recovery, recovery time objectives, rto, recovery point objectives, rpo, akamai model, remote backup consolidation, host based software, array based software, network based, hybrid methodologies, enterprise applications, data management
     InMage
By: Epicor     Published Date: Jun 22, 2015
This white paper will discuss the steps that you can take in selecting the right system for your organization and minimizing the risks of implementation.
Tags : business system, implementation risk, label operation, flexible packaging, enterprise applications
     Epicor
By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas, recovery point objectives, rpo, recovery time objectices, rto, virtualized server recovery, it management
     IBM
By: Cisco     Published Date: Sep 08, 2016
In today's technology landscape, IT organizations face many diverse and ever-changing challenges that require flexibility in cloud deployment. Many companies have heard of the hybrid cloud and the opportunities it can offer, but like with all technologies, businesses want to know more. This webcast aims to shed more light on the topic, as we bring to you the insights of Forrester Research, business leaders and industry experts addressing similar situations. Extend your existing datacenter resources into public clouds with secure hybrid cloud. Improve business agility. Increase flexibility. Cut costs. During the hour, Dave Bartoletti, principal analyst at Forrester will be joined by industry experts and business leaders to discuss the challenges of hybrid cloud and how enabling choice and control across a secure hybrid cloud can help businesses simplify heterogeneous cloud deployment.
Tags : cisco, cloud forrester, webinar, hybrid cloud, networking, it management
     Cisco
By: HP and Intel ®     Published Date: May 27, 2014
This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing organizations the ability to adjust to ever changing technologies.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
     HP and Intel ®
By: HP     Published Date: May 27, 2014
This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing organizations the ability to adjust to ever changing technologies.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
     HP
By: GeoTrust     Published Date: Jan 21, 2016
Internet se ha hecho tan indispensable en nuestras vidas que ya no nos sorprende cuánta gente lo usa para hacer compras o gestiones bancarias, enviar mensajes de correo electrónico y muchas más cosas. Pero lo cierto es que las cifras son abrumadoras: hace solo 15 años, solo un 13,6 % de la población española usaba Internet, mientras que ahora lo hace más del 74 %.
Tags : 
     GeoTrust
By: Symantec     Published Date: Dec 04, 2014
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.
Tags : spoofing, phishing, identity theft, lax website, cybercrime, norton, security
     Symantec
By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
     HP
By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
     IBM
By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : anti virus, anti-virus, virus, norton, network security, email security, intrusion prevention, ips, gfi, virus engine, trojan, trojans
     GFI
By: Trading Concepts     Published Date: Feb 24, 2009
Virtualization is a revolutionary technology that has emerged as one of the hottest trends in the IT segment. If you are not already leveraging the server virtualization wave as a means to deploy cost effective Disaster Recovery, then use this paper as a catalyst to transform your business today: virtualization enables greater efficiencies, faster application and data recovery, and overall cost savings.
Tags : inmage, dr scout, server virtualization, disaster recovery, continuous data protection, cdp, recovery point objectives, rpo, recovery time objectives, rto, vm infrastructure, data management
     Trading Concepts
By: Symantec     Published Date: Jun 29, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : trust marks, symantec, internet privacy, extended validation, norton secured seal
     Symantec
By: Symantec     Published Date: Oct 02, 2012
Internet Trust Marks: Building Confidence and Profit Online
Tags : trust marks, online shopping, profit, fraud, phising, norton cybercrime report
     Symantec
By: CDW Vmware     Published Date: Aug 02, 2012
As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
Tags : quick, start, data, recovery, vmware, enterprise, data, center, components, protect, recover, secure, threat, intruders, natural disaster, recovery, plan, event, disaster, critical
     CDW Vmware
By: Datto Inc.     Published Date: Jan 31, 2013
You can even conquer a Superstorm when all the pieces come together. Read how the entire Datto team, from product and technical support to the CEO, worked with Partners and their clients to make it through Sandy with data intact and minimal downtime.
Tags : backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
     Datto Inc.
By: Oracle     Published Date: Nov 15, 2016
La mutation numérique impacte l’ensemble des activités de l’entreprise. L’accès à l’avis de ses pairs, à la connaissance, ainsi que les capacités de libre-service, presque partout et à partir de quasiment n’importe quel appareil, ont radicalement transformé la manière dont nous gérons nos entreprises et menons nos vies.
Tags : 
     Oracle
By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security, website protection, website threats, symantec, norton
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This Symantec paper shows how SSL technology can help a start-up build its business online.
Tags : ssl technology, start up security, case study, symantec, norton
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com