Disk Technical FederalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Disk Technical Federal returned the following results.
RSS What is RSS?
Related Categories

 •   Disk-based Backup & Storage/ RAID
 •   Storage Management
 •   Storage Security
 •   Backup Systems and Services
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Data Security
 •   Disaster Recovery
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Tape Drives and Libraries

Related Searches
 •   Coding Disk Technical Federal
 •   Decisions Disk
 •   Disk Study
 •   Disk Technical Device
 •   Disk Technical Federal Conversions
 •   Disk Technical Federal Small
 •   Disk Technical Federal Wireless
 •   Disk Technical Management
 •   Disk Technical Simple
 •   Survey Disk
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by ExaGrid Systems, Inc.

February 07, 2012 - (Free Research)
Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well. 
(CASE STUDY) READ ABSTRACT |

Technical Requirements for Mobile Health Care Deployments by Juniper Networks, Inc.

May 09, 2011 - (Free Research)
With the rapid adoption of mobile devices, it’s only natural that these devices have made their way into health care facilities. However, it’s crucial that mobile devices are protected from security vulnerabilities to ensure compliance with federal regulations. This e-guide discusses best practices for mobile health care deployments. 
(EGUIDE) READ ABSTRACT |

E-Book: Red Flag Rules Compliance by Gemalto

September 09, 2010 - (Free Research)
SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims. 
(EBOOK) READ ABSTRACT |

Technical Guide on Government Security by SearchSecurity.com

May 23, 2011 - (Free Research)
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats. 
(EGUIDE) READ ABSTRACT |

Getting Started With E-mail Archiving for Exchange by Sherpa Software

May 01, 2008 - (Free Research)
This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud by IBM

August 17, 2010 - (Free Research)
This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more. 
(TECHNICAL ARTICLE)

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 12, 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

ESG Report: Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations by EMC Backup and Recovery Solutions

April 10, 2009 - (Free Research)
Data de-duplication offers landscape changing value that is easy to quantify, improves reliability, simplifies management and provides rapid recovery of data. Read this ESG report to learn more about it. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker by i365, makers of Evault

July 2008 - (Free Research)
In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice. 
(WHITE PAPER) READ ABSTRACT |

USF Federal Credit Union Establishes Airtight DR with EVault and Simpler-Webb by i365, makers of Evault

April 2008 - (Free Research)
Since implementing i365 InfoStage, things have gotten a lot easier -- and a lot more comfortable -- for USF FCU. 
(CASE STUDY) READ ABSTRACT |

Data Deduplication and Disk-to-Disk Back Up Systems: Technical Considerations (Presentation Transcript) by EMC Backup and Recovery Solutions

January 2008 - (Free Research)
This presentation transcript explores the primary technological differences inherent in the various forms of data deduplication currently available. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Continuity of Operations Planning: Implement COOP Requirements For Storage with HP LeftHand P4000 SAN Solutions by Hewlett-Packard Company

August 2009 - (Free Research)
Continuity of Operations Planning (COOP) is the disciplined planning needed to prepare for a natural or man-made emergency that affects service availability. This data sheet presents an effective solution for COOP from HP. 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication Background: A Technical White Paper by Quantum Corporation

May 2010 - (Free Research)
This technical white paper takes an in-depth look at data deduplication. Read on to develop a better understanding of what this technology does, how it does it, and why it is becomes such a popular tool among organizations looking to manage storage more efficiently. 
(TECHNICAL ARTICLE) READ ABSTRACT |

The Value of iLayer Management: A Technical Brief by Quantum Corporation

April 2010 - (Free Research)
The following paper examines Quantum’s new Scalar tape libraries with integrated iLayer management. This technology was developed to improve data backup, giving its tape libraries disk-like management features. Read this paper now to get an in-depth look at these new tools.     
(IT BRIEFING) READ ABSTRACT |

Federal SOA Institute by IBM Line of Business

February 2008 - (Free Research)
The Federal SOA Institute's mission is to help the federal government adopt and benefit from service oriented architecture (SOA) by providing a robust education environment. 
(CASE STUDY)

Solid State Disks and Storage Tiering by Dell, Inc.

November 2011 - (Free Research)
Check out this white paper for a technical introduction to storage tiering and its implementation. You'll learn exactly how tiered storage works, and how to determine if it's the right strategy for your organization. Finally, you'll receive recommendations on how to evaluate available tiered solutions and determine which will best meet your needs. 
(WHITE PAPER) READ ABSTRACT |

Overcoming challenges of asset management amid declining federal budgets by IBM

April 2012 - (Free Research)
This paper details an asset management solution from IBM. This option is designed for the federal government and enables seamless integration and support maintenance of every asset across the enterprise. Read this now and learn how this option can offer complete visibility into every asset, enable elevated risk management and more. 
(WHITE PAPER) READ ABSTRACT |

Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Reporting by SAP

November 2009 - (Free Research)
This paper explores the reporting challenges faced by organizations and examines the many benefits of automated U.S. American Recovery and Reinvestment Act (ARRA) reporting systems. 
(WHITE PAPER) READ ABSTRACT |

Data Breaches in the US by Quantum Corporation

July 2009 - (Free Research)
Learn the specifics of how, what and when data breaches occur in the United States by viewing this sales tool. Discover how much data was compromised by lost backup tapes, computer theft and lockbox theft from various organizations like health insurance companies, banks and federal departments. 
(ASSESSMENT TOOL) READ ABSTRACT |

Data Deduplication Background - A Technical White Paper by Quantum Corporation

June 2009 - (Free Research)
The purpose of data deduplication is to increase the amount of information that can be stored on disk arrays and to increase the effective amount of data that can be transmitted over networks. Read this white paper to learn more about data deduplication as well as Quantum Dxi-Series disk-based backup solutions. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Cloud-Based Recovery by SunGard Availability Services

January 2012 - (Free Research)
Explore cloud-based Recovery as a Service (RaaS) in this webcast. Discover how Acacia Federal Savings Bank leveraged SunGard’s Recover2Cloud service to gain enhanced data protection, increased savings and lower risk. Watch this webcast for a walk-through of the full range of capabilities offered by SunGard’s Recover2Cloud service. 
(WEBCAST) READ ABSTRACT |

Disk Backup Systems Continue to Evolve to Meet Growing Challenges by Quantum Corporation

February 2012 - (Free Research)
Check out this SearchStorage.com E-Guide to learn about recent developments that allow disk to remain a viable backup solution in today's data-intensive environments. In this guide you'll learn about the top challenges associated with disk backup today, and learn about technologies that are evolving in order to overcome them. Read on for more. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts