ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Storage Research

  • CW ANZ: Trend Watch – Security

    Sponsored by: TechTarget ComputerWeekly.com

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

  • No deal Brexit: Ideal or Ordeal?

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • Computer Weekly – 5 March 2019: Modernising IT at the Bank of England

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to the Bank of England as it starts the modernisation programme for its core system. We look at the rise of DevSecOps and how it can help deal with increasingly complex security threats. And we examine the different approaches to storage for structured and unstructured data. Read the issue now.

  • Computer Weekly – 19 February 2019: When is it best to stick with paper?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.

  • Infographic: Public Cloud

    Sponsored by: TechTarget ComputerWeekly.com

    All you need to know about Public Cloud in one handy infographic. You're welcome.

  • CW ASEAN: Unlock flash opportunities

    Sponsored by: TechTarget ComputerWeekly.com

    Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.

  • September ezine: Thinking digital in the world of storage

    Sponsored by: MicroScope

    The full report of the recent MicroScope storage roundtable which discusses how cloud and GDPR has changed the industry

  • Digital Revolution: Moving towards agility

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.

  • Essential Guide: What the EU Data Protection Regulation changes mean to you

    Sponsored by: TechTarget ComputerWeekly.com

    This Essential Guide offers you news, tips and features on how the new regulations may affect you and your organisation.

  • MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate

    Sponsored by: MicroScope

    An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.

  • Data protection: Not just about personal data and compliance

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Jargon buster guide to GDPR

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

  • Object Storage 101

    Sponsored by: TechTarget ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Are we trusting social networks too much?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Are you one eDiscovery away from a budgetary meltdown?

    Sponsored by: TechTarget ComputerWeekly.com

    Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

  • Dash to Flash

    Sponsored by: MicroScope

    It's time for flash Users have started to move towards flash storage in serous numbers and now is the time for the channel to get behind the technology

  • A reference architecture for the IoE

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).

  • Computer Weekly – Dell Technologies aims for an intelligent, connected future

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.

  • Cloud computing storage key management

    Sponsored by: TechTarget ComputerWeekly.com

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

  • Achieving Cost Savings in Backup with Deduplication

    Sponsored by: ExaGrid Systems, Inc.

    This document discusses that dollars and time currently consumed by existing tape libraries can be far better utilized by moving to disk back-up with deduplication.

  • Deduplication: Effectively Reducing the Cost of Backup and Storage

    Sponsored by: AppAssure Software, Inc.

    Organizations have to backup and store data. Compliance requirements demand that data be stored for periods of time. Reducing the cost of backup and storage starts with reducing the amount of data that is backed up and stored. Learn how deduplication, along with server-based backup processes can reduce your storage management costs.

  • Presentation Transcript: Presentation Transcript: EMC Corporation and the Benefits of Network Attached Storage for Small Businesses

    Sponsored by: EMC Corporation

    The presentation transcript from EMC Corporation features Ashish Nadkarni, Principal Consultant with GlassHouse Technologies, discussing the benefits of Network Attached Storage for Small Businesses.

  • Optimizing Performance and Maximizing Investments in Tape Storage Systems

    Sponsored by: Fujifilm USA

    Fujifilm Tape Environment Analysis is the first vendor-agnostic, platform-neutral, comprehensive assessment for tape storage systems. It provides an assessment of the backup environment culminating in a report that includes recommendations to maximize existing resources, avoid unnecessary expenditures and ensure compliance requirements are met.

  • Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness

    Sponsored by: Sirius Computer Solutions

    IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.