Data
From the latest cloud developments to breakthroughs in storage technology, TechFinitive’s Data section keeps our readers abreast of what’s happening in this crucial industry – after all, data underpins almost everything we do.
One of our main goals in the Data section is to demystify the industry. Cloud computing alone is cluttered with acronyms and phrases that almost seem designed to confuse rather than enlighten. So, you will find explainers that cover multicloud, public cloud, data sovereignty, virtual machines and more. We will keep adding to this already extensive list.
To provide useful advice to both IT managers and the end users whose jobs rely on data, we provide practical information on how to get the most out of services. Our aim is to keep our readers at the cutting edge of these technologies, so we’re always on the lookout for ways we can give them an advantage.
And whilst data as a topic is rarely top of a mainstream paper’s headlines, it’s often a key part of breaking news stories. This often ties in with security – after all, data is ransomware’s target – and it’s vital for our readers to understand if they need to rethink their data strategy as a result of a breach.
If you would like us to write an explainer on a data-related topic, or provide in-depth advice on using a cloud technology to your advantage, please get in touch. You can email us at [email protected], follow us on Twitter and join us on LinkedIn.
LastPass Hack: Developer Was Targeted At Home
Company reveals that one engineer - one of four with access to decryption keys - was targeted as part of last summer's attack on the password manager.
After 17 years of cloud computing, what lessons have we learned?
Cloud computing has come a long way in the past decade, but there are still many lessons for businesses to learn. Our cloud expert explains what everyone needs to know.
What is data sovereignty?
Recently data sovereignty has become a hot topic, and there's every chance it could soon reach boiling point. Here's what you need to know.
Fake news: why it could endanger your business and what you can do about it
Believe it or not, fake news is a very real danger to businesses. Vicky Woolaston explains how it can hurt you and what measures you can take to protect yourself.
What is cloud computing?
Cloud computing is simple: you lease computing resources and access them over the internet. But there are variants it helps to understand.
What is Multicloud?
Why should businesses consider choosing more than one cloud provider for a multicloud deployment? There are several pros to balance the cons.
What is Public cloud?
Put simply, a public cloud is a computer service offered by a third party through an internet connection. But things are never that simple...
What is hybrid cloud?
Cloud computing comes in many forms, with hybrid cloud a mix of public and... others. Read on for the full details.
What is ransomware?
Ransomware attacks are big business but affect businesses of all sizes. Here, we explain how it works and how to best defend against it.
What is confidential computing?
Attackers target data when it’s at rest and in transit, but they also really want data being processed. Confidential computing is your guard.
What are virtual machines?
How do virtual machines differ from containers? Why use VMs at all? And what are the downsides? We reveal exactly what you need to know.
How snowflake’s cloud architecture scales modern data analytics
Though cost optimization is important, it’s not the main reason for moving to cloud services and applications. The fact that we’re going to cloud is…
Reinventing the Data Warehouse
When it comes to managing today’s data and how it is used, current data warehousing solutions simply can’t keep up. It used to be the…
Cisco Encrypted Traffic Analytics
The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using…
Dell Validated Design for Analytics – Data Lakehouse
This white paper describes the use of a Data Lakehouse to streamline and optimize data analytics. A Dell Technologies Validated Design for Analytics – Data…
Copy management for Dell EMCâ„¢ PowerStoreâ„¢ storage appliances using Dell EMC AppSyncâ„¢
Executive summary This document outlines technical concepts and provides guidance about copy management for Dell EMC™ PowerStore™ storage appliances using Dell EMC AppSync™. This guidance…
Pure Fusion: Self-service Storage-as-Codeâ„¢
This brief introduces Pure Fusion, a new offering from Pure Storage® that unifies FlashArray™ systems into a policy-driven service with a cloud-like Storage-as-Code™ management and…
It’s Time to Walk Away from SAN and Adopt HCI
Industry analysts predict over 750 million new applications will exist by 2026, more than in the past 40 years. IT teams today are looking for…
Modern Data Protection: Definitive Guide to Veeam
Data is everywhere, across different applications, in multiple locations across your expanding ecosystem including on premises, public cloud and hybrid all at the same time.…
Italy warns of global ransomware attack
Italian officials report that servers using VMware ESXi were attacked by cyber criminals, exposing a worldwide flaw.