Secure Data Storage Reports

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Next-Generation Storage
sponsored by TechTarget ComputerWeekly.com
EBOOK: Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.
Posted: 08 Feb 2021 | Published: 12 Sep 2019

TechTarget ComputerWeekly.com

Protect Data in VMware-Based Environments with IBM Tivoli Solutions
sponsored by IBM
WHITE PAPER: This brief resource examines the challenges of traditional backup and storage approaches in virtual environments, and introduces a unified platform that enables your organization to meet these challenges and effectively store, analyze, manage, and protect data.
Posted: 07 Nov 2013 | Published: 31 Jul 2013

IBM

Simply StoreIT File and Application Sharing
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Read through this expert white paper to find out how this storage solution works to provide such superior service.
Posted: 16 Jan 2014 | Published: 30 Sep 2013

Hewlett Packard Enterprise

How Storage Is Catching Up with the DevOps Revolution
sponsored by Pure Storage
EGUIDE: In this essential guide, discover why DevOps requirements are shifting how enterprises consume and deploy storage resources to a more-cloud focused approach. Download now to gain guidance on storage technologies most appropriate for Agile development, including VM-aware secondary storage, hyper-convergence, and more.
Posted: 20 Apr 2017 | Published: 18 Apr 2017

Pure Storage

Infographic: Disaster Recovery Trends in 2013
sponsored by FalconStor Software
WHITE PAPER: Check out this one-page infographic that details the top trends in the realm of disaster recovery in 2013. You'll gain insight into: the current landscape, what the future holds, the importance of automated DR and more.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

FalconStor Software

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM

Disaster Recovery Strategy Building
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: In this transcript of a video by expert Jon Toigo, founder and CEO of Toigo Partners International outlines what should go into a disaster prevention strategy and why, above all, data must be protected. Also discussed - the importance of data restore time.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

DellEMC and Intel®