Backup and Recovery

Neverfail Lives Up to Its Name

Located in the heart of hurricane territory, the Louisiana Organ Procurement Agency (LOPA) has little tolerance for downtime. That's why the organization whose business...

SMB Disaster Recovery Options Go Beyond Online...

The first article in this series highlighted how SMBs can harness online backup as the cornerstone of their disaster recovery (DR) actions. This article...

VMware and Symantec Virtualize Disaster Recovery

What's one of the most compelling reasons companies have for deploying virtualization technologies these days? Disaster recovery.According to The 451 Group's "V For Virtualization"...

Sun Gets Diligent About Backup

Diligent Technologies scored a big win today, announcing that Sun Microsystems will resell its ProtectTIER virtual tape library (VTL) and de-duplicationofferings. The deal had industry...

Telecom Company Seeks WysDM

A global telecommunications company providing a broad range of services to companies in more than 168 countries, Orange Business Services, like many organizations, was...

Diligent Cashes In On Dedupe Craze

Diligent Technologies has netted $10.5 million in fourth-round funding, raising the data protection and de-duplicationspecialist's total haul to date to $46.5 million.Eastward Capital joined...

EMC Plugs Data Leaks

EMC's RSA security division has acquired data loss prevention startup Tablus, which moves the storage giant into the anti-data leakage (ADL) market and also...

IBM Archives Princeton Softech

In an effort to shore up its data archiving and compliance offerings, IBM today agreed to buy Princeton Softech for an undisclosed sum. Princeton Softech's...

Hifn Scoops Up Siafu

Security firm Hifn is acquiring storage startup Siafu Software, furthering the marriage between data storage and security. The merger combines Hifn's network security and data...

Nexsan Packs Archiving into an Appliance

There seems to be no stopping the appliance juggernaut. Outside of the storage world, appliances are finding an abundance of applications. They take care...

Tech Giants Join Forces on Government Security

Three of the biggest names in high tech are buddying up to improve the security of IT systems for government agencies. Microsoft, Cisco Systems and...

Google Grabs Postini

Google today took a big step toward protecting its Web applications by acquiring partner and on-demand security software maker Postini for $625 million in...

Latest Articles

15 Software Defined Storage Best Practices

Software Defined Storage (SDS) enables the use of commodity storage hardware. Learn 15 best practices for SDS implementation.

What is Fibre Channel over Ethernet (FCoE)?

Fibre Channel Over Ethernet (FCoE) is the encapsulation and transmission of Fibre Channel (FC) frames over enhanced Ethernet networks, combining the advantages of Ethernet...

9 Types of Computer Memory Defined (With Use Cases)

Computer memory is a term for all of the types of data storage technology that a computer may use. Learn more about the X types of computer memory.
- Advertisement -