WEBCAST:
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time.
WEBCAST:
In this informative webcast, VP and GM of Dell Storage Darren Thomas discusses Dell’s enterprise storage strategy which delivers the latest technologies and capabilities while focusing on cost reduction and ease of use
SOFTWARE DOWNLOAD:
CA ARCserve® Replication offers continuous data protection to complement any backup solution. This software trial includes all Replication and High Availability features for your convenience and testing. Download now.
TRIAL SOFTWARE:
Download your 15-day automatic trial for PHD Virtual Backup for VMware 6.5.2 with a new, innovative backup archiving feature. Now, automate the ability to replicate backup copies to a different location.
WEBCAST:
In this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.
VIDEO:
This short clip reveals the use of IBMs XIV storage system and how it cost effectively provides robust SAP services to customers at blazing speeds.
VIDEO:
This video gives insight into one vendor that specializes in maintaining existing infrastructures while complimenting it with Hadoop. This allows customers to bring in new technology without having to worry about lapses in data protection.
PODCAST:
In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
PODCAST:
The purpose of this podcast is to provide a roadmap to the most effective strategy and technology to protect data and provide fast recovery for data which is lost or corrupted due to accident and malicious action.