Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of damone-cox

damone-cox

Send damone-cox an email

Latest from damone-cox

  • Storage considerations for virtual desktops
    Hardware

    Storage considerations for virtual desktops

    Now that virtualization has taken hold and is accepted in most companies, the question becomes what else can we do with it? The answer? Virtual desktops. Advantages of virtual desktops Virtual desktops allow for a company to have greater control over its resources (the desktops). The IT department, through cloning, can “build” a new desktop ...

    damone-cox
    Published:  September 24, 2007, 1:36 AM PDT Modified:  September 24, 2007, 1:36 AM PDT Read More See more Hardware
  • A primer on array-based and network-based replication
    Storage

    A primer on array-based and network-based replication

    Replication helps protect your data and files by producing a duplicate copy at a second site, server, or storage array. I covered host-based replication in a previous blog. In this blog, I’ll cover two other types of replication — array-based replication and network (or fabric) based replication. Array-based replication Array-based replication requires a central data ...

    damone-cox
    Published:  September 12, 2007, 12:01 AM PDT Modified:  September 12, 2007, 12:01 AM PDT Read More See more Storage
  • Use host-based replication to keep data available
    Data Centers

    Use host-based replication to keep data available

    One of the challenges for any IT department is to keep data available for those who need it. In fact, vendors and consultants have built whole businesses around the concept. Over the next few weeks, I’ll be taking a look at a few methods for keeping data “alive” and available to end-users. Each method I’ll ...

    damone-cox
    Published:  September 6, 2007, 12:42 AM PDT Modified:  September 6, 2007, 12:42 AM PDT Read More See more Data Centers
  • What data do you really need at your disaster recovery site?
    Data Centers

    What data do you really need at your disaster recovery site?

    For a company creating a disaster recovery plan, one of the often overlooked issues is how much data you really need at your DR site. The easy answer is all of it, but this means that your company has to spend money on the storage at the DR site and on the replication solution to ...

    damone-cox
    Published:  August 21, 2007, 12:01 AM PDT Modified:  August 21, 2007, 12:01 AM PDT Read More See more Data Centers
  • Streamline your data management with deduplication
    Storage

    Streamline your data management with deduplication

    The concept of deduplication is simple – it’s creating a single copy for all the duplicate bits or files that exist on a network. But how does it actually work and how do you use it? A little background: Microsoft introduced deduplication in Exchange (but they called it single instant storage) in order to deal ...

    damone-cox
    Published:  August 13, 2007, 5:37 AM PDT Modified:  August 13, 2007, 5:37 AM PDT Read More See more Storage
  • How do you do your back-ups?
    Data Centers

    How do you do your back-ups?

    In the past, tape was the solution. The problem is that this still tends to be the answer. Either backup admins are complacent and don’t want to change, or decision makers are unwilling to look at new ways to do backups. With the ever increasing capacity of disk, it’s not a matter of not having ...

    damone-cox
    Published:  August 6, 2007, 12:00 AM PDT Modified:  August 6, 2007, 12:00 AM PDT Read More See more Data Centers

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice