Replication Software White Papers

(View All Report Types)
Recovering Microsoft® Office SharePoint® Server Data: Granular Search and Recovery Means Time and Cost Savings
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: This paper spotlights the issues SharePoint administrators and IT administrators encounter when trying to recover SharePoint data and reveals a solution.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Heterogeneous Data Replication: Cost-Effective Information Leverage
sponsored by Sybase, an SAP company
WHITE PAPER: Data is the lifeblood of organizations but few organizations take an asset-based, comprehensive approach to it. It drives too much cost because of redundant proliferation, poor synchronization across applications and lack of comprehensive availability policies. Read this paper to learn how effective data integration strategies can help.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

Sybase, an SAP company

Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime and Risk
sponsored by Dell Software
WHITE PAPER: Migrating away from older versions of Oracle that require expensive extended contracts is a choice many companies are making to cut costs over the long term. Find out the best practices that can help ensure your next Oracle system upgrade is an economical success. Read the White Paper >>
Posted: 13 Feb 2014 | Published: 31 Dec 2013

Dell Software

Quick Recovery of Microsoft SQL Server 2005 Databases Using Veritas Storage Foundation 4.3 for Windows on HP Integrity Servers
sponsored by HP & Symantec
WHITE PAPER: This white paper describes how to rapidly recover Microsoft SQL Server 2005 environments. The solution is based on the Quick Recovery feature of Veritas Storage Foundation for Windows 4.3 coupled with supporting technology from Microsoft and HP.
Posted: 22 Jan 2007 | Published: 01 Jan 2006

HP & Symantec

ENHANCING YOUR IT ENVIRONMENT USING SNAPSHOTS
sponsored by DellEMC and Intel®
WHITE PAPER: Snapshots help you improve the productivity and reliability of your backups because they are fast, flexible and affordable. Read this white paper to learn more about snapshot technologies and the benefits they deliver.
Posted: 18 Mar 2008 | Published: 17 Mar 2008

DellEMC and Intel®

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Creating your own future proof Private Cloud with a Software-Defined Datacentre solution
sponsored by OVH
WHITE PAPER: One of the most promising paths to virtualization continues to be a software-defined data center (SDDC). A SDDC gives your organization access to the benefits of the private cloud while also delivering a unified configuration of applications, resources, and infrastructure. Read OVHcloud’s white paper to better understand the basics of the SDDC now.
Posted: 18 Dec 2019 | Published: 18 Dec 2019

OVH

Software-Defined Storage: Reduce Costs and Boost Service-Level Optimisation
sponsored by DataCore Software Corporation
WHITE PAPER: This in-depth resource digs into software based storage systems that not only increase efficiency but also reduce costs and accelerate performance.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

DataCore Software Corporation

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.