Premium Content

Access "Remote and mobile data backup: Backup's last frontier"

W. Curtis Preston Published: 13 Oct 2012

Backing up remote sites and mobile computing devices is an issue that has been plaguing backup administrators for years. But with organizations that are increasingly becoming more mobile, the time to get a handle on mobile data backup is now. Remote data centers and mobile users represent the last frontier of backup and recovery. And that frontier spirit is often reflected in the way many companies rein in backup and recovery of remote and mobile data. Remote data centers, as well as users of laptops or other mobile devices, are often left on their own to make do with inferior methods (or none at all), while the "big" data center enjoys a modern day backup and recovery environment. In this tutorial on mobile and remote data backup, learn about remote and mobile data backup solutions, how deduplication can help remote data backup systems, and other potential mobile data backup tools to have in your arsenal, such and continuous data protection, self-healing storage and the cloud. MOBILE DATA BACKUP AND RECOVERY TUTORIAL: TABLE OF CONTENTS >> Getting to the ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Computer Weekly networking case studies
    CW-EuroUserAwards2014 networking-1.jpg

    Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for ...

  • Special Report on VDI

    The articles contained here were written by Brian Madden, the fiercely independent thought leader in the world of virtualisation and mobility ...

  • Spies in the VPN

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...