Automated Backup Software Reports

Backup deduplication: a complete guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
Posted: 08 Feb 2021 | Published: 24 Jan 2020

TechTarget ComputerWeekly.com

Cloud backup vs traditional backup
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.
Posted: 08 Feb 2021 | Published: 06 Dec 2019

TechTarget ComputerWeekly.com

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017

TechTarget ComputerWeekly.com

The keys to a successful business continuity and DR strategy
sponsored by Citrix
EGUIDE: Developing a business continuity and DR strategy usually involves an extensive amount of information gathering, combined with piecing together products and services that work as a collective. Check out this e-guide to learn the differences between business continuity and DR, discover 4 approaches to a successful combined strategy, and much more.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Citrix

Handbook: Choosing a Converged Data Protection Solution
sponsored by TechTarget Data Backup
EBOOK: This guidebook offers expert advice on evaluating converged data protection solutions, with consideration given to the value and risk of integrating data protection and management and what vendors have to offer. For assistance with assessing your company's options, read the guidebook here.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

TechTarget Data Backup

Container applications need backup: Who knew?
sponsored by TechTarget Storage
EZINE: The need to protect data in container applications has emerged with the advent of persistent data in containers. In this 'Storage' magazine issue, we also look at how object storage can thwart ransomware attacks.
Posted: 08 Jun 2018 | Published: 08 Jun 2018

TechTarget Storage

What are Continuous Data Protection Software's Pros And Cons?
sponsored by Dell EMC and Intel®
EGUIDE: Click inside this expert-guide and learn the pros and cons of continuous data protection software.
Posted: 26 Jun 2017 | Published: 20 Jun 2017

Dell EMC and Intel®

Storage Magazine: Storage Product of the Year Winners Revealed
sponsored by TechTarget Storage
EZINE: In the February 2015 issue of Storage magazine, we reveal the winners of our 2014 Products of the Year awards, explores how software-defined storage (SDS) helps allow you to create a DIY storage array and much more.
Posted: 12 Feb 2015 | Published: 10 Feb 2015

TechTarget Storage

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

TechTarget ComputerWeekly.com