Premium Content

Access "Tips for cost-effective disaster recovery"

Issue Overview

IT in Europe - June 2011

Providing the most efficient and cost-effective disaster recovery (DR) plan is essential to any organization.  But as you probably know – finding the most affordable technique to provide this is not always a walk in the park.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Snapshots: The alternative backup by W. Curtis Preston

      Snapshot-based backup, also known as near-continuous data protection, is one of the most efficient ways to provide operational recovery, and you can forget about backup windows.

    • VMware storage issues may be solved by your array

      Anyone who has struggled with configuring storage for VMware virtual servers will be happy to hear help is at hand; just look inside your storage array.

    • Hybrid cloud storage by Jacob Gsoedl

      Hybrid cloud storage products provide the best of both worlds -- local storage that's tightly integrated with off-site cloud storage services.

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...