Backup Server Software Reports

Computer Weekly - 3 December 2019: Meet the most influential people in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our 10th annual list of the 50 most influential people in UK technology, and profile this year's UKtech50 winner, Demis Hassabis, CEO and founder of AI pioneer DeepMind. Also: we examine how continuous software development can improve application security. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Dec 2019

TechTarget ComputerWeekly.com

Backup deduplication: a complete guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
Posted: 08 Feb 2021 | Published: 24 Jan 2020

TechTarget ComputerWeekly.com

SMBs Need Enterprise-quality Data Protection, Right-sized for Them
sponsored by HPE and Intel®
WHITE PAPER: This white paper highlights the need for SMBs to find data protection tools that are right-sized for their specific needs. It also cautions against organizations underestimating their data protection needs.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

HPE and Intel®

Securing Your Organization While Maintaining Here, Near, and Anywhere Data Availability
sponsored by Violin Memory
WHITE PAPER: The right all-flash array based solution provides comprehensive data protection functions to protect against problems in the data center, in a metro environment, and anywhere with different technologies based on the application needs. Read this solution brief to look into the application-specific data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory

RPO vs. RTO: Key Differences Explained
sponsored by Parsec Labs
EGUIDE: However similar in acronym, the definitions of RPO and RTO differ, as do their computing needs, cost implications, and how to build them into a variety of resilience plans. Read this custom TechTarget e-guide on RPO vs. RTO: Key Differences Explained to set the record straight.
Posted: 16 Nov 2022 | Published: 15 Nov 2022

Parsec Labs

Data Backup Simplifies Disaster Recovery and Expands Its Use Cases
sponsored by Pure Storage
EGUIDE: Data backup and disaster recovery have been converging to enable users to manage both tasks from the same platform and boost overall data protection. Discover some of the other ways in which backup products have evolved to protect your organization's data.
Posted: 13 Jul 2016 | Published: 11 Jul 2016

Pure Storage

CloudCasa Offers Bring-Your-Own Storage for Kubernetes Backup
sponsored by Catalogic Software
EGUIDE: CloudCasa now enables users to bring their own storage for backups alongside a handful of other new features, including security posture review capabilities and cross-cloud Kubernetes cluster restorations. Get the full scoop on these latest CloudCasa updates in the following TechTarget expert guide.
Posted: 11 Mar 2022 | Published: 11 Mar 2022

Catalogic Software

Hyper-converged platforms grow to include secondary storage space
sponsored by Rubrik
EGUIDE: Hyper-converged platforms have grown to include secondary storage space; however secondary-storage still faces a plethora of issues. Discover how to best address the problems facing secondary storage and how vendors are promising to make life easier for storage administrators.
Posted: 08 Dec 2016 | Published: 05 Dec 2016

Rubrik

A New Approach to Remote Replications
sponsored by IBM
WHITE PAPER: This resource examines the steps organizations can take in order to improve network utilization and speed up data transfer for more effective remote replication.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

IBM

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella