Data Whitepapers


Sort by: Date | Company | Title


Dealing with the data deluge
By Symantec | 28/1/2015
CIO Australia’s Custom Research Group asked more than 100 CIOs, IT, network and infrastructure managers, and chief data and security officers about how they are dealing with the data deluge. These findings look at the growth and challenges for organisations tapping into information, what’s stalling good data management; and statistics on spending, efficiency and ownership.
Download this now


Citrix NetScaler - A foundation of next-generation datacentre security
By Citrix Systems Asia Pacific | 12/1/2015
The need for robust data centre security has never been greater. This whitepaper looks at the traditional challenges and concerns as well as the new in the evolving requirements for security. •Traditional firewalls lack the visibility and control required to protect against the more the 70% of internet attacks •The capabilities of your data centre security should cover application, infrastructure, identity and security fabric •Mounting budget requirements means organisations look to do more with less
Download this now


Application-Aware Storage for Virtual Environments
By Tintri | 9/1/2015
The main benefit of an application-aware storage model is that it allows the storage for each individual application to be managed and optimized independently, regardless of what other workloads and applications are present. Storage system features like high performance, balanced scalability, data reduction, and an application-aware management paradigm are critical to the efficient use of storage resources.
Download this now


Ensuring robust data integrity
By Tintri | 9/1/2015
This white paper describes how the Tintri OS and its underlying file system provide unparalleled data integrity and intelligent performance for serving hundreds of VMs in a single appliance. It also examines Tintri's proprietary redundant array of independent disks (RAID) implementation for comprehensive data integrity.
Download this now


Symantec Business Data Protection Kit
By Symantec | 24/10/2014
Cyber Attacks are painful and destructive. It’s essential to defend your business with a powerful protection system. In this whitepaper, you’ll learn how to get cyber resilient and safeguard your data: • Find out which questions you should ask to find a security solution that works with your business • Understand why your business is a bigger target than you thought • Learn how to protect your brand and bottom line by quickly detecting and responding to attacks
Download this now


40/100 Gigabit Ethernet: The foundation of virtualized data centre and campus networks
By Anixter Australia | 29/9/2014
This whitepaper explains how effective planning and implementation for 40/100 Gigabit Ethernet can allow organizations to remove potential road blocks and take full advantage of virtualized environments. ·With virtualization, considerations must be made regarding users, resources, and infrastructure investment ·40/100GbE is gaining traction as a foundation for building next generation virtualized data centre/campus environments ·Discover how to improve capacity and enjoy a smooth upgrade path with the increasingly dominant standard
Download this now


Integration: Why ‘good enough’ doesn’t cut it
By Tibco | 12/9/2014
The fact that digitalisation exists doesn’t mean it’s available and actionable. This paper explains why true integration is not possible with merely adequate technology. • Digitalisation improves user experience, availability and performance, processing power and decision-making • You owe it to yourself and your organization to go beyond “good enough” • Using a proven platform will mean improved business agility with the ability to establish new partnerships
Download this now


Continous application availability with EMC VPLEX
By EMC Corporation | 8/9/2014
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
Download this now


Assessing the business value of EMC backup and recovery
By EMC Corporation | 8/9/2014
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
Download this now


Top 5 reasons why EMC for archiving
By EMC Corporation | 8/9/2014
Top 5 reasons why EMC for archiving This whitepaper provides the top five reasons why organisations looking for the best-of-breed archive software and protection storage for a true end-to-end archive solution. · Archiving inactive data from tier-1 storage is a key way to save big · Eliminate siloes for administration savings, while maximising overall storage efficiency, typically reducing archive and backup capacity required by 10-30x. · Archiving solution that allows you to add virtual and physical servers to meet new demands
Download this now