Go to...
Services
Vigilant Cyber Services
Methodologies and Regulations
Training
Physical Assessments
Cyber Forensics
Virtual Assessments
Whitepapers
Disaster Recovery
Disaster Recovery Services
Off-Site Storage & Servers
Business Continuity
Infrastructure Assessment
Cloud Engineering
Virtualization
Cloud Solutions
EMR Hosting
Remote Desktops
Exchange Hosting
Application Dedicated Servers
Cloud Computing
CoLocation
ESX Hosting
Government Sector
Portfolio
Resources
News
Tools
Blogs
Contact
Site
Web
Search
Services
Vigilant Cyber Services
Methodologies and Regulations
Training
Physical Assessments
Cyber Forensics
Virtual Assessments
Whitepapers
Disaster Recovery
Disaster Recovery Services
Off-Site Storage & Servers
Business Continuity
Infrastructure Assessment
Cloud Engineering
Virtualization
Cloud Solutions
EMR Hosting
Remote Desktops
Exchange Hosting
Application Dedicated Servers
Cloud Computing
CoLocation
ESX Hosting
Government Sector
Portfolio
Resources
News
Tools
Blogs
Contact
Site
Web
Search
November 2021 (1)
October 2021 (1)
September 2021 (1)
August 2021 (1)
July 2021 (1)
April 2021 (2)
March 2021 (1)
January 2021 (1)
August 2020 (1)
July 2020 (2)
June 2020 (1)
May 2020 (1)
March 2020 (2)
February 2020 (1)
January 2020 (1)
December 2019 (2)
November 2019 (5)
October 2019 (1)
September 2019 (2)
August 2019 (1)
June 2019 (1)
May 2019 (1)
April 2019 (1)
March 2019 (1)
February 2019 (1)
November 2018 (1)
September 2018 (4)
August 2018 (2)
July 2018 (9)
June 2018 (4)
May 2018 (2)
February 2018 (2)
December 2017 (2)
November 2017 (2)
October 2017 (1)
July 2017 (2)
June 2017 (1)
January 2017 (3)
December 2016 (1)
November 2016 (2)
July 2016 (1)
April 2015 (1)
November 2014 (4)
October 2014 (2)
August 2014 (1)
June 2014 (1)
March 2014 (1)
January 2014 (1)
December 2013 (1)
November 2013 (1)
July 2013 (3)
June 2013 (7)
April 2013 (1)
February 2013 (6)
January 2013 (6)
December 2012 (8)
November 2012 (10)
October 2012 (2)
September 2012 (11)
July 2012 (2)
June 2012 (1)
May 2012 (1)
February 2012 (2)
November 2011 (1)
August 2011 (1)
December 2010 (1)
November 2010 (1)
May 2010 (4)
July 2009 (2)
June 2009 (1)
March 2009 (2)
November 2008 (1)
October 2008 (1)
September 2008 (5)
July 2008 (2)
June 2008 (2)
May 2008 (1)
December 2007 (1)
November 2007 (3)
September 2007 (2)
August 2007 (6)
March 2007 (1)
June 2005 (1)
May 2005 (1)
Events
Current Articles
|
Archives
|
Search
01
Turning Knowledge to Action
posted on September 01, 2008 21:12
Perhaps one of the biggest challenges to implement changes in an organization is getting people committed to changing their daily behavior. Although, ...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
01
Turning Knowledge to Action
Carl Ingram
posted on September 01, 2008 21:12
Perhaps one of the biggest challenges to implement changes in an organization is getting people committed to changing their daily behavior. Although, ...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (2)
06
Datacenter in a Box - Cost effective Blade Server based Business Continuity, SCON and Disaster Recovery system
SuperUser Account
posted on July 06, 2008 11:13
Vigilant Technologies (Chandler Automated Systems)provides integration of Windows-based servers,Terminal Servers, Virtual servers, MSSQL clusters, Exc...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (345)
03
Zen and the Art of Disaster Recovery - From Overland Storage
SuperUser Account
posted on July 03, 2008 11:12
The Zen of Disaster Recovery (DR) is "being at one" with your data. You know where it is in the information life cycle and, as a result, What tier o...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (0)
24
Vigilant Technologies Deploys Virtual Network of Servers and Desktops – SCON Wanted!
SuperUser Account
posted on June 24, 2008 11:10
Chandler, AZ June 24, 2008 – Vigilant provides high availability and business continuity thru proactive design and management of SCON (server co...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
16
Consolidate, Manage and Automate Your IT Infrastructure
SuperUser Account
posted on June 16, 2008 13:46
Server consolidation and containment with VMware software provides a solution for these problems. Virtual infrastructure enables workload isolation an...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (23)
12
BladeCenter Integration For Various Small To Medium Businesses!
SuperUser Account
posted on May 12, 2008 13:48
BladeCenter systems allow you to centralize servers for increased flexibility, ease of maintenance, reduced cost and streamlined human resources. Comp...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (297)
08
The Small And Medium Size Businesses Guide To A Successful Continuity Program
SuperUser Account
posted on December 08, 2007 11:09
The Small And Medium Size Businesses Guide To A Successful Continuity Program This article is specifically written for any small to medium size busi...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (0)
28
Data Protection Methodologies in the Virtual Environment
cjluera
posted on November 28, 2007 14:34
Overview of this Document Virtualization removes the dependency of the workload on the hardware, resolving the hardware failure scenario, but exposes...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
28
Top 10 IT Disasters of All Time
SuperUser Account
posted on November 28, 2007 10:31
Remember Y2K? Though the millennium bug was not an IT disaster, it was a near disaster that affected the most number of people and businesses. Thus, Y...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
Page 17 of 19
First
Previous
10
11
12
13
14
15
16
[17]
18
19
Next
Last
Services
Cloud Solutions
Vigilant Cyber Services
Disaster Recovery
Business Continuity
Cloud Engineering
Virtualization
Whitepapers
Resources
Portfolio
Blogs
News
Tools
Copyright 2004 - 2021 by Vigilant Technologies / Chandler Automated Systems / CASIT
:
Terms Of Use
:
Privacy Statement
Login