NAS

NAS News

Rhead Group saves 40% with move to Microsoft cloud

Moving from on-premise to cloud platforms better supports the consultancy’s global expansion read more »

Researcher creates proof-of-concept worm for network-attached storage devices

Infecting NAS devices with malware can be very valuable for attackers, a researcher said read more »

Veeam offers free data backup for desktops and laptops

Not quite a Veeam come true as tablet support is missing read more »

VCE rolls out an all-in-one system with EMC's all-flash XtremIO array

The joint venture also refreshed the large-scale 700 line and smaller 200 series read more »

Shellshock attacks target QNAP's network storage, FireEye says

A backdoor gives hackers full control over the NAS device, according to the security vendor read more »

Geeks' favorite DeNA interactive streaming platform looks beyond Japan

On Showroom, users can attend virtual concerts in avatar form read more »

more news ..
NAS Blogs

Privacy wars - personal data and the social contract

Gaining control of privacy is not going to be easy read more »

The new face of risk and finance

Forging a collaborative partnership read more »

Gateways will accelerate data migration to the cloud

Easing the path to true hybrid cloud for the enterprise read more »

The Other Side of Openness: Licence Enforcement

read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
NAS In Depth

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

Beginner's guide to R: Syntax quirks you'll want to know

Part 5 of our hands-on guide covers some R mysteries you'll need to understand. read more »

Sizing up open source: Not so simple

Open-source software throws a wrench into traditional software evaluation criteria. Here's what to look for and what you'll be expected to contribute. read more »

New storage technologies to deal with the data deluge

As enterprise storage demands escalate, disk densities continue to rise. But the real magic is in software, where speed and size come together. read more »

How to prepare your business for digital disaster

Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think. read more »

5 reasons to use social CRM for support and services

Social media can support customers faster, discover potential fires quicker and sell more intimately read more »

more in depth ..
NAS Slideshows

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Hero hacks: 14 Raspberry Pi projects primed for IT

VoIP PBXes, NTP servers, Web-controlled power strips - hack together one of these handy, cheap solutions for the server closet and beyond read more »

10 technology expenses your business can do without

Improve your bottom line by dumping these technological artifacts read more »

more slideshows ..
White Papers

Gartner Magic Quadrant for Enterprise Information Archiving

The term 'enterprise information archiving' incorporates products and solutions for archiving user content read more »

How to choose your Unified Communication and Collaboration Platform Vendor

Best Practice Guide read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open