Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Virtualization as a disaster recovery strategy?

Many midmarket CIOs are leveraging virtualization technology to meet their disaster recovery needs. In this podcast Mike Karp, a senior analyst at Enterprise Management Associates, offers advice on using a virtual environment for backup.

Beyond server consolidation, how can virtualization support a CIO's disaster recovery strategy? In this podcast, industry expert Mike Karp addresses how virtualization is increasingly being used within midmarket organizations and discuss the major pros and cons of relying on a virtual environment for backup.

BIOGRAPHY: Karp is a senior analyst at Enterprise Management Associates Inc. (EMA) in Boulder, Colo. He has spent more than 20 years in storage, systems management and telecommunications. Having worked for both Fortune 500 and startup companies, Karp has extensive tactical and strategic experience in business development, strategic alliance and channel programs, marketing and industry research and analysis. His focus at EMA is storage, storage management and the methodology that brings these technologies into the marketplace. Prior to joining EMA, Mike served as the director of storage management services at Hurwitz Group.

Play now:
Download for later:

Virtualization as a DR panacea?

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As
This was last published in October 2008

Dig Deeper on Small-business infrastructure and operations

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close