Storage performance: From fundamentals to bleeding edge
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.
Posted: 08 Feb 2021 | Published: 15 May 2018
|
|
|
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020
|
|
|
MicroScope – October 2023: Automating repetition in storage and backup management
sponsored by MicroScope
EZINE:
In this issue, we explore how the growing hype of generative artificial intelligence is set to make change in the storage and backup management world, as well as the concerns and limits of the technology. Also, read about the importance of getting MSSPs and suppliers on the same page, and how SSC is moving to meet customer needs.
Posted: 05 Oct 2023 | Published: 06 Oct 2023
|
|
|
CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink
sponsored by TechTarget ComputerWeekly.com
EZINE:
The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.
Posted: 08 Feb 2021 | Published: 12 Sep 2019
|
|
|
Containers: Making security and business sense
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
Posted: 08 Feb 2021 | Published: 21 Aug 2018
|
|
|
MicroScope – March 2023: Steering the storage market
sponsored by MicroScope
EZINE:
In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.
Posted: 28 Feb 2023 | Published: 01 Mar 2023
|
|
|
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE:
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009
|
|
|
Information-Centric Security and Data Erasure
sponsored by EMC Corporation
WHITE PAPER:
Most data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.
Posted: 26 Sep 2006 | Published: 01 Jul 2006
|
|
|
The Benefits of Network Attached Storage in Small and Medium Sized Business Networks
sponsored by NETGEAR Inc.
WHITE PAPER:
SMBs must choose the right solution for managing their data - because a wrong decision can be costly. Luckily, NAS solutions fit the requirements and budgets for SMBs. Read this white paper to learn how these solutions are impacting smaller organizations.
Posted: 03 Dec 2007 | Published: 01 Dec 2007
|
|
|
DatAdvantage: Comprehensive Data Governance
sponsored by Varonis
PRODUCT LITERATURE:
This paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...
Posted: 01 Sep 2007 | Published: 31 Aug 2007
|
|