Blog categories

My blog posts and tweets are my own, and do not necessarily represent the views of my current employer, my previous employers or any other party.

Many of these blogs were originally posted elsewhere on public sites, but have been re-posted here with attributions to the original location -- strictly as a means of a centralized archive of my perspectives.

I do not do paid endorsements, so if I am appear to be a fan of something, it is based on my personal experience with it. If I am not talking about your stuff, it is either because I haven't worked with it enough or because my mom taught me "if you can't say something nice ... "

Three new DPM whitepapers

SysCnt-DPM_h_rgb

Just because DPM 2010 is now in beta – doesn’t mean that we’ve stopped driving good stuff for DPM 2007 SP1.  🙂

This week, we are pleased to announce the release of 3 new whitepapers for DPM 2007 SP1 (though the material covered also applies to DPM 2010 beta). 

All three of these whitepapers work on the premise that DPM can protect more than just the primary workloads of SQL, Exchange, SharePoint, Windows file, etc.  In fact, there are a lot of server applications that are built on top of SQL Server (for example) and the ‘recipe’ to back them up is simply to back up the SQL databases, plus a directory or two.  SharePoint 2003 is a great example with its SQL databases and the STMADM configuration info – but this week, here are three more:

How to protect Dynamics with DPM How to protect Microsoft Dynamics AX with Microsoft Data Protection Manager
How to protect EBS and SBS with DPM
How to protect EBS and SBS with DPM
How to protect EBS 2008 and SBS 2008 with DPM 2007 SP1
How to protect SAP running on SQL Server with DPM How to protect SAP® running on Microsoft SQL Server with Microsoft DPM

There are many, many more applications that DPM can protect – simply by protecting the components in a unified way, leveraging the DPM Protection Groups to protect different kinds of data such as SQL databases and Windows files, with the same protection characteristics.  Look for more of these, and please feel free to let us know if there is a key application that you’d like DPM to protect and we’ll look at the recipe for you.

As always, thanks for reading.

Leave a Reply

@JBuff on Twitter