Jukeboxes Reports

The Value of Off-Site Data Protection Services
sponsored by Iron Mountain
WHITE PAPER: This whitepaper describes an off-site data protection service that can keep electronic media secure while providing efficient retrieval with the help of high-specification service elements for magnetic, optical and solid-state media.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

Iron Mountain

NVMe promises blisteringly fast flash performance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide we look at the architectural issues blocking agreement on NVMe, the fundamentals that underlie NVMe and its blistering performance, the key NVMe product deployments available, and ask what will become of the storage features associated with the storage controller.
Posted: 08 Feb 2021 | Published: 10 Apr 2018

TechTarget ComputerWeekly.com

CW@50: March editions of Computer Weekly
sponsored by TechTarget ComputerWeekly.com
EZINE: We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
Posted: 08 Feb 2021 | Published: 15 Mar 2016

TechTarget ComputerWeekly.com

Hyper-Converged Infrastructure Key Choices
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We look at why it makes sense to go hyper-converged, how HCI differs from converged infrastructure, the pros and cons of hyper-converged vs traditional storage arrays, HCI software products available, and whether hyper-converged can help unleash the blistering performance potential of NVMe flash storage.
Posted: 08 Feb 2021 | Published: 25 Sep 2017

TechTarget ComputerWeekly.com

Does a proprietary solution automatically mean vendor lock-in?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Computer Weekly - 25 May 2021: Making data an asset, not a threat
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the latest developments in the UK government's National Data Strategy and what it means for the economy. Our latest buyer's guide explains the emerging technologies around computational storage. And we look at the advances in customer experience management during the pandemic. Read the issue now.
Posted: 24 May 2021 | Published: 25 May 2021

TechTarget ComputerWeekly.com

CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by TechTarget ComputerWeekly.com
EZINE: An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 08 Feb 2021 | Published: 12 Nov 2020

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to storage for the internet of things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The internet of things is being used to improve storage options. In this 13-page buyer's guide, Computer Weekly looks at how the IoT could increase volumes of data, the challenges it may bring, and the role edge processing, analytics and the cloud has to play in increasing profits
Posted: 08 Feb 2021 | Published: 10 Dec 2018

TechTarget ComputerWeekly.com

Converged infrastructure in 2021: Next-generation datacentre designs
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Simplifying the deployment and management of datacentre hardware systems is one of the main draws of converged and hyper-converged infrastructure setups for enterprises.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
Posted: 04 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com