Disk Security Reports

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Storage performance: From fundamentals to bleeding edge
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.
Posted: 08 Feb 2021 | Published: 15 May 2018

TechTarget ComputerWeekly.com

Infographic: 2019 Europe IT Priorities, Storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we take a look at what the most popular primary and secondary storage initiatives are in 2019 as well as how much storage will be maintained on-premise across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

MicroScope – October 2023: Automating repetition in storage and backup management
sponsored by MicroScope
EZINE: In this issue, we explore how the growing hype of generative artificial intelligence is set to make change in the storage and backup management world, as well as the concerns and limits of the technology. Also, read about the importance of getting MSSPs and suppliers on the same page, and how SSC is moving to meet customer needs.
Posted: 05 Oct 2023 | Published: 06 Oct 2023

MicroScope

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to Colocation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

The Benefits of Network Attached Storage in Small and Medium Sized Business Networks
sponsored by NETGEAR Inc.
WHITE PAPER: SMBs must choose the right solution for managing their data - because a wrong decision can be costly. Luckily, NAS solutions fit the requirements and budgets for SMBs. Read this white paper to learn how these solutions are impacting smaller organizations.
Posted: 03 Dec 2007 | Published: 01 Dec 2007

NETGEAR Inc.

Intelligent Tiered Storage - No Need to Wait!
sponsored by Hitachi Vantara
PODCAST: Tiered Storage has been a storage industry buzz word for several years, its justification and value have been twisted and misconstrued by vendors and analysts alike. Listen to this Podcast and learn about three facts that probably don't coincide are.
Posted: 17 Oct 2006 | Premiered: Oct 18, 2006, 09:00 EDT (13:00 GMT)

Hitachi Vantara

Top Considerations for Implementing Secure Backup and Recovery
sponsored by Zmanda Inc.
WHITE PAPER: Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data.
Posted: 09 Jul 2008 | Published: 08 Jul 2008

Zmanda Inc.

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine