Printer Friendly

Articles from Computer Technology Review (October 1, 2003)

1-26 out of 26 article(s)
Title Author Type Words
Are you prepared for long-term data preservation? Harada, Richard 1360
Arkeia protects Microsoft Exchange servers: new online backup plug-in offers multiple security levels for high volumes of mail data. 287
Change is blowin' in the wind: the storage business is finally becoming the business of storage. Moore, Fred 1335
CryptoStor secures vital data. Phillips, Ken 1682
Data replication over the WAN. Dufrene, Rene 1572
Designing a knowledge discovery system, Part 2: now that we have categorized, let's ... classify! Vogel, Claude 1819
Do you backup data? Or do you have a data protection strategy? Dion, Jennifer 1775
Finally, affordable SANs. Lary, Richard 2392
Implementing SMI-S in the real world. Webster, John 1544
IP storage today and tomorrow. Dale, David 1389
iSCSI vs. FC for meeting mission critical requirements. Gal-Oz, Shaul 1269
It's 2003: do you know where your data is? The government is enforcing strict new guidelines on archived data. Is your company complying? Padmanabhan, Krishnan 2451
Lifecycle management for storage consolidation. Rhodes, Glenn D. 1983
LTO & SDLT: built SAN tough. Brinkman, Peter N. 1780
Making the most of your business, trade media opportunities. Marken, G.A. 2427
Managed services for real-time communications. Nicholson, Ron 1521
Power and storage: the hidden cost of ownership. Larabie, Chuck 1825
Recovery for the rest of us: small and mid-size businesses need to be as diligent as large enterprises in implementing an emergency preparedness agenda. Chouinard, Don 1131
Sell storage solutions, not storage: that's where the value is. And the profit. Ferelli, Mark 1479
Smart object-based storage cluster computing. Schrock, Rod 1502
Sound advice for secure backup: do it yourself! Raphael, Loius 333
Storage security: issues and answers. Conway, Peter C. 1272
Tek-Tools announces Storage Profiler 3.0: storage management solution introduces support for Veritas Backup Exec, Windows XP and 2003 and reporting on any NAS device. 369
The role of technology in the Sarbanes-Oxley Act compliance. Anisingaraju, Sagar 932
Used to be hype, but now virtualization is for real. Chudnow, Christine Taylor 1965
VPNs and wireless gateways vie for the heart of WLAN security. Mehra, Rohit 1426

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |