You've requested...

Share this with your colleagues:

Download this next:

LA community college group leverages ADCs

LACCD deployed a new student information system and required load balancers, or application delivery controllers (ADCs), to assure application high availability and performance. The district also needed to minimize overall budget impact and do more with less wherever possible.


Further, the district needed an application delivery solution capable of supporting multiple deployment models, including primary and back-up data centers, development and production environments, as well as public and private clouds.

Download this case study to find out how LACCD leveraged Array ADCs to meet these requirements and much more, while providing enhanced reliability and accessibility for PeopleSoft-based student information systems.

These are also closely related to: ""

  • CW+: Analyst's take: IBM Cognos software helps schools score top marks

    IBM Cognos software helps K-12 organizations increase visibility and improve decision making, driving improved student performance, lowered cost of interventions, greater productivity, and lower operating costs. IBM Cognos software helps organizations such as elementary and secondary schools (K-12 organizations) make better use of their data when performing tasks related to reporting, student performance, and budgeting. The product offering includes: 

    IBM Cognos 8 BI, which provides reporting, analysis, dashboard, and scorecard functionality for monitoring performance, analyzing trends, and evaluating operational or financial results. The application also offers tools for modeling how data in a business intelligence (BI) or performance management (PM) environment will be maintained, governed, and shared. 

    IBM Cognos TM1, which is a performance management tool that enables companies to consolidate, view, edit, and analyze large volumes of data on a real-time basis. 

    IBM Cognos Now, which is an operational BI solution that continuously monitors key performance indicators and line-of-business operational metrics. 

    Department and vertical-specific PM tools, which are for tasks such as workforce analytics and budgetary analysis. 

    IBM Cognos 8 Planning, which provides planning, budgeting, and forecasting

  • Improve BYOD with the Bonjour Protocol

    The bring-your-own-device (BYOD) sensation has resulted in enterprise networks being bombarded by requests to use Apple products in the workplace. Unfortunately, iOS devices can be quite difficult to connect to file sharing servers, monitoring, and printers.

    To remedy the issue, Apple has released the Bonjour gateway protocol which, despite its shortcomings, can increase mobility and flexibility while helping with mobile device management techniques.

    This E-Guide from SearchNetworking.com details the Bonjour gateway and how it can help your organization. In addition, uncover key advice that will help you devise a BYOD policy that best suits your users – and your enterprise.

Find more content like what you just read:

  • Four ways to find savings in VDI storage

    Storage performance remains an issue for VDI due to traditional spinning disks falling short in adequately serving VDI systems. Discover how you can improve storage for VDI using all-flash array storage systems and learn four ways to find savings in VDI storage.

    Download

  • BYOD initiatves in education: Why a stable wireless LAN is required

    Discover the benefits a BYOD or iPad-in-the-classroom program has to offer, and learn why a stable wireless LAN is vital to their success.

    Download

  • How connected buses reimagine education

    Discover how connected buses and virtualized classrooms allow for students in rural southeast Oklahoma to no longer leave learning confined to the classroom.

    Download

  • Migration to cloud backup spares data from destruction: But how?

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

    Download

  • How to deliver high performing apps to users anywhere, anytime

    Download this case study to see how GPU accelerated virtualization allowed the Oregon State University to deliver graphics intensive applications to students from anywhere, on any device.

    Download

  • What's harder to control: Your network or a baby gorilla?

    A growing, low-income school district in southeast Texas was struggling to manage their complex, growing network. Their technology director said "it was like a baby gorilla. It did what it wanted, when it wanted." Find out how they achieved more network speed, security and uptime across their campuses.

    Download

  • Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices

    This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance.

    Download

  • CW ASEAN - December 2016

    In this month's CW ASEAN, read how Singapore is setting itself to be a leader in the digital age.

    Download

  • IT education in Scandavia

    Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.

    Download

  • A New Call for Alignment Between Business Needs and Enterprise Networks

    In this issue of Network Evolution e-zine, we learn how more comprehensive IT-business strategic alignment would aid network managers. We focus on 3 key areas: hardware management, UC, and network security.

    Download

  • Digital Transformation is a Journey: Discover the 4 Case Studies

    To remain innovative, agile, and competitive, organizations must manage, connect, and secure an ever-expanding number of workloads in complex hybrid infrastructures. Access this resource to achieve these lofty requirements using a server virtualization platform that can virtualize critical apps while making data readily available, and more.

    Download

  • How to spend your budget and time wisely when moving your organisation to the cloud in the Middle East

    According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.

    Download

  • How did hybrid flash arrays grant this college 12 times greater IOPS?

    In this case study learn why Gordon College adopted Reduxio's HX550 hybrid flash array to accomplish their goals of app consolidation, reduced database latency, and more.

    Download

  • CW+: Quocirca Report: How to automate your expenses – a guide for higher education and universities

    Universities and other higher education establishments increasingly have to address the need for savings across the board. One area of focus has to be expenses from faculty members and others associated with the faculty.

    Download

  • CW ANZ November 2016

    With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.

    Download

  • IT in Europe: Adopting an Application-Centric Architecture

    Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.

    Download

  • CW Special Report on IBM

    This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..

    Download

  • Network-Powered BYOD - A Case Study in Simplicity

    BYOD has already found its way into most higher-education environments. This expert white paper provides insight into how campus-based IT departments can use cloud solutions to bring BYOD under control and truly unlock the productivity it promises while keeping the network secure.

    Download

  • Artificial intelligence for security pros

    According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.

    Download

  • Data privacy under the GDPR, machine learning, and more

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Information technology skills guide

    Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.

    Download

  • UCC: The cloud is on the horizon

    This e-guide explores unified communication and collaboration (UCC) challenges IT networking pros need to overcome, as well as how to craft cloud UC strategies to aid in overcoming these challenges.

    Download

  • First edition of Computer Weekly 1966

    To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.

    Download

  • The Global Information Technology Report 2013

    This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.

    Download

  • Case study: How this school eliminated paper use by 50%

    Read this case study to learn why the skilled labor training school TAFE Queensland adopted Adobe Sign, an Adobe Document Cloud solution to simplify the onboarding process.

    Download

  • Computer Weekly – 10 October 2017: The most influential women in UK IT

    In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.

    Download

  • The benefits of cloud faxing for highly regulated industries

    In this white paper, learn how you can seamlessly implement a cloud fax model without impacting functionality and security – all while gaining a better understanding of the traits to consider when selecting a cloud fax vendor.

    Download

  • CW Buyer's Guide: Desktop virtualisation

    This eight-page buyer's guide looks at desktop virtualisation and identifies some of the options IT directors must consider when planning a virtualisation project.

    Download

  • Know how to use your data

    Organizations certainly don't lack data, but simply having lots of it won't help you make faster, better decisions. Explore how SAS Data Management tools can help you overcome common barriers to seize the value in the wealth of data available to you.

    Download

  • Maximizing Business Email Security in Gmail

    This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.

    Download

  • Women in IT: Inspiring the next generation

    This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.

    Download

  • We're just not doing enough – Working together to meet the digital skills challenge

    This white paper from TechUK focuses on what needs to be done to deliver the digital skills children and young people need, and to create entry-level skills for jobs in a digital world.

    Download

  • Enforcing Endpoint Security: Creating a Network Security Policy

    As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them.

    Download

  • How to shrink your skills gap like the UAE

    With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.

    Download

  • CW+: The Open Group: Strengthening your business case for using cloud

    What can you, as a buyer do to strengthen your business case for Cloud and keep your company competitive? What are some real-world success stories where companies have applied Cloud to solve specific business challenges? What business risks are clients facing which have influenced Cloud buying decisions?

    Download

  • CW+: The Open Group: Strengthening your business case for using cloud

    With the rapid emergence of technologies, it is important for business executives and stakeholders to focus on the real business challenges and the needs of the enterprise. This White Paper provides a high-level depiction of real-world business problems that were addressed using Cloud computing.

    Download

  • Global ransomware attack is a security wake-up call

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

    Download

  • A Computer Weekly Buyer's Guide to Client Access

    In this 13-page buyer's guide, Computer Weekly looks at how to orchestrate the variety of devices in use, how to achieve efficient workforce mobility, and the pressure on operating systems caused by cross-platform access.

    Download

  • Computer Weekly networking case studies

    Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.

    Download

  • The Top 100 Asian Stars in UK Tech

    The Top 100 Asian Stars in UK Tech list regcognises the UK's top Asian digital influencers in 2015.

    Download

  • HCI and VDI: A perfect match? You decide

    Read this e-book to see for yourself how hyper-converged infrastructure could serve as the foundation for VDI. You'll learn how HCI and virtual desktop infrastructure can be used together, the 4 major challenges forcing out legacy data centers, and more inside.

    Download

  • How a university built their IPAM strategy

    In this case study, learn how Texas Woman's University enabled a disciplined IPAM strategy to manage tens of thousands of IP addresses, resolve DNS and PTR concerns, and provide a more reliable and secure network for their students.

    Download

  • Private Cloud Computing E-Zine Volume 1: Private cloud computing as a business strategy

    While many enterprises have moved to the private cloud model, have they adopted it entirely, and what are the roadblocks to getting there? In this inaugural edition of our Cloud Computing e-zine, we explore company strategies for private cloud adoption, some of the benefits of this model, and the challenges of a true private cloud infrastructure.

    Download

  • CW ASEAN – July 2017: Be alert to threats

    With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.

    Download

  • Cyber Security Trends ANZ 2016

    As cyber security becomes a top priority for policy makers and IT leaders, this e-guide looks at some of the issues facing government and private sector organisations in Australia and New Zealand.

    Download