EZINE:
In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.
EGUIDE:
We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
EGUIDE:
In this e-guide, we have put together a list of key definitions in storage and data protection to help you make sense of the fast-evolving storage technology landscape. From software-defined storage to non-volatile memory express (NVMe), we hope this extensive list of definitions will help you succeed in an increasingly data-driven world.
EGUIDE:
The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
EGUIDE:
In this e-guide we round up the key ways backup has changed since tape was king and look at developments such as backup appliances, the use of the cloud as a backup target and even the need for backups to protect your workloads in the cloud.
EGUIDE:
Circumstances surrounding disaster recovery (DR) have become more complex and difficult to get a handle on in recent years. Discover how DR testing can prevent major outages, and learn 15 proven best practices for disaster recovery testing. Also learn how you can improve DR planning in the cloud.
EGUIDE:
In this expert-eguide, learn steps to keeping your data more secure like focusing on the 3 major techniques used in data backup, how to quickly recover from a ransomware attack, why using a recovery-in-place technique could be beneficial, and more.
EZINE:
'Storage' magazine examines nonvolatile memory express and the future of flash storage. We also look at combating ransomware and intellectual property theft.
EGUIDE:
There are a variety of techniques that can be used for cloud backup and data protection. Access this e-guide to learn the advantages and disadvantages of 3 types of cloud backup.