VIDEO:
This four-part webcast demonstrates the necessity for a proper storage management solution, such as Northern Storage Suite, in an organization's storage infrastructure. They'll review how NSS can reclaim wasted capacity, control user behavior, getting your end-users on-board with saving capacity and how to properly plan for future storage needs.
PRODUCT DEMO:
Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
WEBCAST:
In this webcast you'll hear from Falconstor Software's Product Marketing Manager , Peter Eichers, as he discusses Falconstor storage virtualization solutions.
VIDEO:
This short clip reveals the use of IBMs XIV storage system and how it cost effectively provides robust SAP services to customers at blazing speeds.
TRIAL SOFTWARE:
Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
WEBCAST:
In their second comparative challenge, The HP StorageWorks EVA asked three teams of high school students who had never configured a storage array to run timed tests on EVA, NetApp and EMC to see which one is easiest to use. EVA was the clear winner
VIDEO:
This video gives an overview of two SAN storage arrays that are the entry-level performance leader and entry-level cost leader respectively. The video breaks down the capabilities, functions, and specifications of each.
SOFTWARE DOWNLOAD:
SolarWinds® SAN Monitor for EMC® is a free desktop tool that gives you the visibility into your physical storage to make sure it's in good health and lets you quickly and easily monitor EMC CLARiiON® arrays with at-a-glance insight into storage.
WEBCAST:
Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)