Snapshot Replication Software White Papers

(View All Report Types)
Quick Recovery of Microsoft SQL Server 2005 Databases Using Veritas Storage Foundation 4.3 for Windows on HP Integrity Servers
sponsored by HP & Symantec
WHITE PAPER: This white paper describes how to rapidly recover Microsoft SQL Server 2005 environments. The solution is based on the Quick Recovery feature of Veritas Storage Foundation for Windows 4.3 coupled with supporting technology from Microsoft and HP.
Posted: 22 Jan 2007 | Published: 01 Jan 2006

HP & Symantec

ENHANCING YOUR IT ENVIRONMENT USING SNAPSHOTS
sponsored by DellEMC and Intel®
WHITE PAPER: Snapshots help you improve the productivity and reliability of your backups because they are fast, flexible and affordable. Read this white paper to learn more about snapshot technologies and the benefits they deliver.
Posted: 18 Mar 2008 | Published: 17 Mar 2008

DellEMC and Intel®

Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime and Risk
sponsored by Dell Software
WHITE PAPER: Migrating away from older versions of Oracle that require expensive extended contracts is a choice many companies are making to cut costs over the long term. Find out the best practices that can help ensure your next Oracle system upgrade is an economical success. Read the White Paper >>
Posted: 13 Feb 2014 | Published: 31 Dec 2013

Dell Software

Recovering Microsoft® Office SharePoint® Server Data: Granular Search and Recovery Means Time and Cost Savings
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: This paper spotlights the issues SharePoint administrators and IT administrators encounter when trying to recover SharePoint data and reveals a solution.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Heterogeneous Data Replication: Cost-Effective Information Leverage
sponsored by Sybase, an SAP company
WHITE PAPER: Data is the lifeblood of organizations but few organizations take an asset-based, comprehensive approach to it. It drives too much cost because of redundant proliferation, poor synchronization across applications and lack of comprehensive availability policies. Read this paper to learn how effective data integration strategies can help.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

Sybase, an SAP company

Idera & Holistic Backup Management - Dynamic Duo of Server Backup
sponsored by Idera
WHITE PAPER: This white paper caters to your interest in where backup software is headed – a holistic approach to managing backups that your organization wants and needs backup software to deliver. Read on to discover 6 characteristics of a holistic solution.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Idera

Use Analytics to Innovate and Lead in Today's Banking Environment
sponsored by IBM
WHITE PAPER: Banks are bringing together big data projects, transactional processing, data warehousing and analytic tooling. Find out how IBM DB2 for z/OS and DB2 Analytics Accelerator in an IBM zEnterprise environment can help.
Posted: 22 Apr 2014 | Published: 31 Mar 2014

IBM

Simplify and Consolidate Data Protection for Better Business Results
sponsored by IBM
WHITE PAPER: This white paper explores how IBM introduced a next-generation graphical user interface to provide advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup user interfaces, and dramatically simplify backup administration.
Posted: 10 Apr 2014 | Published: 30 Jun 2013

IBM

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro