ComputerWeekly.com Research Library

Powered by Bitpipe.com

Backup Software Research

  • MicroScope – October 2023: Automating repetition in storage and backup management

    Sponsored by: MicroScope

    In this issue, we explore how the growing hype of generative artificial intelligence is set to make change in the storage and backup management world, as well as the concerns and limits of the technology. Also, read about the importance of getting MSSPs and suppliers on the same page, and how SSC is moving to meet customer needs.

  • CW APAC: August 2023 – Expert advice on storage and backup

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, focused on storage and backup in the Asia-Pacific region, Computer Weekly looks at why 3-2-1 backup is still relevant, how researchers are overcoming restraints found in typical DNA storage systems, Dell's latest offerings and the future of HDDs.

  • Computer Weekly – 21 March 2023: The risks of an imbalance in AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • Buyer's guide to backup and recovery software

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Infographic: 5 considerations before buying data center backup software

    Sponsored by: TechTarget ComputerWeekly.com

    Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.

  • Compass®for Edge Computing

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.

  • COBALT IRON COMPASS®Data Protection for a Remote World

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.

  • End-to-end Data Protection for the Modern Data Center with Cobalt Iron Compass

    Sponsored by: Cobalt Iron

    Cobalt Iron introduced their Compass platform to drive down cost and fully manage, configure, and maintain data protection processes for you. Access this ESG paper for an in-depth, 3rd party look at Cobalt Iron Compass and the benefits of its fully managed, immutable data and ransomware protection.

  • Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.

  • Enterprise Anti-ransomware Backup Solution Profile

    Sponsored by: Cobalt Iron

    Cybersecurity software is the best means to detect and prevent ransomware, but it can’t always stop it. That is where enterprise backup solutions come in. Access this paper from DCIG to discover 5 distinguishing features of anti-ransomware backup solutions.

  • Computer Weekly - 3 December 2019: Meet the most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our 10th annual list of the 50 most influential people in UK technology, and profile this year's UKtech50 winner, Demis Hassabis, CEO and founder of AI pioneer DeepMind. Also: we examine how continuous software development can improve application security. Read the issue now.

  • A Computer Weekly buyer's guide to supply chain resilience

    Sponsored by: TechTarget ComputerWeekly.com

    The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.

  • CW EMEA - April 2023: Under attack and stressed out

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.

  • RPO vs. RTO: Key Differences Explained

    Sponsored by: Parsec Labs

    However similar in acronym, the definitions of RPO and RTO differ, as do their computing needs, cost implications, and how to build them into a variety of resilience plans. Read this custom TechTarget e-guide on RPO vs. RTO: Key Differences Explained to set the record straight.

  • Data Protection Strategies and Initiatives for 2022

    Sponsored by: Veeam Software

    Veeam asked a group of 3,400 individuals how they define “modern” and “innovative” data protection solutions in this threat landscape. Discover these 9 defining cyber-attack-ready backup and data protection features in the following webcast, hosted by Veeam’s Jason Buffington and Chris Hoff.

  • CloudCasa Offers Bring-Your-Own Storage for Kubernetes Backup

    Sponsored by: Catalogic Software

    CloudCasa now enables users to bring their own storage for backups alongside a handful of other new features, including security posture review capabilities and cross-cloud Kubernetes cluster restorations. Get the full scoop on these latest CloudCasa updates in the following TechTarget expert guide.

  • Achieving Persistent Backup for Kubernetes

    Sponsored by: Catalogic Software

    Explore this expert guide to learn how persistent backup for Kubernetes can be achieved with CloudCasa and learn how new backup strategies are changing IT approaches to container management.

  • SD-WAN: The Most Critical Design Considerations

    Sponsored by: NBN

    Experts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.

  • Protecting Data in the Cloud

    Sponsored by: Datavita

    There are a variety of techniques that can be used for cloud backup and data protection. Access this e-guide to learn the advantages and disadvantages of 3 types of cloud backup.

  • Top Data Backup Tips Target Remote Protection and the Cloud

    Sponsored by: Datavita

    As the workforce went almost completely remote, cybersecurity has become a growing concern because home networks are typically less secure than business ones. Check out this e-guide to learn 5 backup tips to get through a time like no other.

  • Breaking Down Industry Leading Data Protection Vendors & Options

    Sponsored by: TechTarget Data Backup

    Read this editorial handbook to compare numerous features and functionality of 13 industry-leading data protection vendors that provide virtualization-specific functionality as well as backup protection for organizations of all sizes.

  • Ransomware Backup Protection Requires Comprehensive Approach

    Sponsored by: TechTarget Data Backup

    Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.

  • Data Backup: From Planning to Providers

    Sponsored by: Cohesity

    Check out this e-guide to discover how to establish a strong data backup plan, learn why cloud backup is the modern-day standard and compare approaches, and find out how cloud backup can help secure remote workers during the coronavirus pandemic.

  • Cloud Storage and Backup Market Rundown

    Sponsored by: Cohesity

    Check out this e-guide for a comprehensive overview of some of the storage industries most fundamental topics— like replication vs. backup—to make sure you are taking advantage of everything they have to offer your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.