WHITE PAPER:
This whitepaper describes an off-site data protection service that can keep electronic media secure while providing efficient retrieval with the help of high-specification service elements for magnetic, optical and solid-state media.
EGUIDE:
In this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.
EBOOK:
The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.
EGUIDE:
The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
EBOOK:
To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
EZINE:
In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.
EZINE:
In this first issue of CW Nordics in 2017, we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists.
ANALYST REPORT:
Read this Forrester report to examine the case for a faster device refresh cycle, 3 advantages of an accelerated device refresh process (hint: one is security), and 8 benefits realized from a two-year refresh cycle.
EZINE:
In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
EGUIDE:
This expert guide looks at how object storage is tackling the issue of unstructured data volumes. Access it now for an in-depth look at object storage use cases and 11 vendors to see for yourself if it's a good fit for your organization.