WHITE PAPER:
This whitepaper describes an off-site data protection service that can keep electronic media secure while providing efficient retrieval with the help of high-specification service elements for magnetic, optical and solid-state media.
EGUIDE:
In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.
EZINE:
In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EZINE:
In this week's Computer Weekly, with high-street retailers struggling to survive, we look at how technology can keep stores relevant. Everyone is focusing on flash storage, but hard disk drives are still an essential part of the IT toolkit. And we examine the latest developments in the ongoing Post Office Horizon IT scandal. Read the issue now.
EZINE:
In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.
EZINE:
In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
EGUIDE:
In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
EGUIDE:
In this e-guide, we take a look at how and why enterprises are tapping into containers to bolster the business agility of their IT infrastructure and application estates, and some of the latest thinking about how best to utilise container technologies.
ANALYST REPORT:
Read this Forrester report to examine the case for a faster device refresh cycle, 3 advantages of an accelerated device refresh process (hint: one is security), and 8 benefits realized from a two-year refresh cycle.