System Backups Reports

Backup deduplication: a complete guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
Posted: 08 Feb 2021 | Published: 24 Jan 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to supply chain resilience
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.
Posted: 08 Feb 2021 | Published: 06 Nov 2020

TechTarget ComputerWeekly.com

Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.
Posted: 08 Feb 2021 | Published: 20 Oct 2020

TechTarget ComputerWeekly.com

Cloud backup vs traditional backup
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.
Posted: 08 Feb 2021 | Published: 06 Dec 2019

TechTarget ComputerWeekly.com

Data Protection Strategies and Initiatives for 2022
sponsored by Veeam Software
WEBCAST: Veeam asked a group of 3,400 individuals how they define “modern” and “innovative” data protection solutions in this threat landscape. Discover these 9 defining cyber-attack-ready backup and data protection features in the following webcast, hosted by Veeam’s Jason Buffington and Chris Hoff.
Posted: 08 Sep 2022 | Premiered: Sep 6, 2022

Veeam Software

Hyper-converged platforms grow to include secondary storage space
sponsored by Rubrik
EGUIDE: Hyper-converged platforms have grown to include secondary storage space; however secondary-storage still faces a plethora of issues. Discover how to best address the problems facing secondary storage and how vendors are promising to make life easier for storage administrators.
Posted: 08 Dec 2016 | Published: 05 Dec 2016

Rubrik

Encryption and Data Policies Help Boost Mobile Backup
sponsored by TechTarget Data Backup
EBRIEF: Mobile data backup presents the challenge of remote users accessing data around the clock, but there are steps you can take to make it easier.
Posted: 29 Nov 2016 | Published: 29 Nov 2016

TOPICS:  Backups
TechTarget Data Backup

How can Cloud Computing Data Protection be Achieved?
sponsored by Dell EMC and Intel®
EGUIDE: Go inside this expert-guide by 25 year industry veteran Chris Evans to learn the 3 main ways to implement cloud computing data protection.
Posted: 26 Jun 2017 | Published: 20 Jun 2017

Dell EMC and Intel®

CW EMEA - April 2023: Under attack and stressed out
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.
Posted: 12 Apr 2023 | Published: 13 Apr 2023

TechTarget ComputerWeekly.com

Enterprise data protection strategy requires evolution and needs archive, backup
sponsored by Rubrik
EGUIDE: The constantly evolving IT landscape means that backup is no longer enough for many organizations. Data availability and data management are rapidly evolving areas in the spectrum of data protection. Learn the five C's of data protection and why you'll likely need disk, cloud and tape to meet the goals of your enterprise data protection strategy.
Posted: 08 Dec 2016 | Published: 05 Dec 2016

Rubrik