File Mirroring Software White Papers

(View All Report Types)
ENHANCING YOUR IT ENVIRONMENT USING SNAPSHOTS
sponsored by DellEMC and IntelĀ®
WHITE PAPER: Snapshots help you improve the productivity and reliability of your backups because they are fast, flexible and affordable. Read this white paper to learn more about snapshot technologies and the benefits they deliver.
Posted: 18 Mar 2008 | Published: 17 Mar 2008

DellEMC and IntelĀ®

Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime and Risk
sponsored by Dell Software
WHITE PAPER: Migrating away from older versions of Oracle that require expensive extended contracts is a choice many companies are making to cut costs over the long term. Find out the best practices that can help ensure your next Oracle system upgrade is an economical success. Read the White Paper >>
Posted: 13 Feb 2014 | Published: 31 Dec 2013

Dell Software

Quick Recovery of Microsoft SQL Server 2005 Databases Using Veritas Storage Foundation 4.3 for Windows on HP Integrity Servers
sponsored by HP & Symantec
WHITE PAPER: This white paper describes how to rapidly recover Microsoft SQL Server 2005 environments. The solution is based on the Quick Recovery feature of Veritas Storage Foundation for Windows 4.3 coupled with supporting technology from Microsoft and HP.
Posted: 22 Jan 2007 | Published: 01 Jan 2006

HP & Symantec

Recovering Microsoft® Office SharePoint® Server Data: Granular Search and Recovery Means Time and Cost Savings
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: This paper spotlights the issues SharePoint administrators and IT administrators encounter when trying to recover SharePoint data and reveals a solution.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Heterogeneous Data Replication: Cost-Effective Information Leverage
sponsored by Sybase, an SAP company
WHITE PAPER: Data is the lifeblood of organizations but few organizations take an asset-based, comprehensive approach to it. It drives too much cost because of redundant proliferation, poor synchronization across applications and lack of comprehensive availability policies. Read this paper to learn how effective data integration strategies can help.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

Sybase, an SAP company

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Toshiba Launches Smart Social Infrastructure Through a Flexible, Scalable Cloud Solution
sponsored by IBM
WHITE PAPER: To advance its initiative, Toshiba required a more flexible, scalable cloud solution capable of supporting a wide range of complex projects. This whitepaper highlights the cloud software Toshiba implemented to provide an extensible cloud management framework.
Posted: 10 Dec 2014 | Published: 30 Apr 2014

IBM

Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Tasktop

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork