Access "Disaster recovery and virtual server backup top 2014 storage projects "
This article is part of the February 2014 issue of IT budgets bounce back from recession
Disaster recovery and virtual server backup are the two most pressing storage-related projects for UK IT departments this year, according to the results of the 2014 Computer Weekly/TechTarget IT priorities survey. In the survey, which questioned 299 UK IT department decision-makers, disaster recovery and business continuity are a key 2014 project for 40% of respondents, while 36% plan virtual server backup in the coming 12 months. Those numbers are slightly down on the 2013 survey result,s when 44% said disaster recovery and business continuity was the key backup and storage project, and 41.5% cited virtual server backup as a top priority. Those figures may represent a levelling off of activity in these areas as organisations get to grips with work associated with server virtualisation and its aftermath. Disaster recovery, business continuity and virtual server backup were third and seventh respectively among overall IT project priorities in a list topped by server virtualisation (51%). When asked specifically about planned storage deployments for 2014, ... Access >>>
Premium Content for Free.
Disaster recovery and virtual server backup top 2014 storage projects
by Antony Adshead
As budgets rise and businesses emerge from recession, disaster recovery and virtual server backup are the top storage projects in 2014
SDN still failing to spark interest in Europe
by Jennifer Scott
Research shows just 9% of companies across Europe are planning to implement software-defined networking in the next 12 months
- Disaster recovery and virtual server backup top 2014 storage projects by Antony Adshead
More Premium Content Accessible For Free
The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...
The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...
This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...