WHITE PAPER:
This whitepaper describes an off-site data protection service that can keep electronic media secure while providing efficient retrieval with the help of high-specification service elements for magnetic, optical and solid-state media.
EGUIDE:
In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).
EGUIDE:
We walk you through the key storage metrics you need to know about, look at how storage array makers present them in their product literature, and how to decode IOPS, latency and read/write performance figures.
EZINE:
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
EZINE:
There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.
EZINE:
In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
EBOOK:
The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
EGUIDE:
In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
EGUIDE:
Read this e-guide to explore the benefits of hyper-converged edge computing, usage scenarios and products appropriate for each, and how to tackle any challenges that may arise.
EGUIDE:
In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.