You've requested...

Share this with your colleagues:

Download this next:

LA community college group leverages ADCs

LACCD deployed a new student information system and required load balancers, or application delivery controllers (ADCs), to assure application high availability and performance. The district also needed to minimize overall budget impact and do more with less wherever possible.


Further, the district needed an application delivery solution capable of supporting multiple deployment models, including primary and back-up data centers, development and production environments, as well as public and private clouds.

Download this case study to find out how LACCD leveraged Array ADCs to meet these requirements and much more, while providing enhanced reliability and accessibility for PeopleSoft-based student information systems.

These are also closely related to: "Virtualization in Education"

  • Case study: How cloud storage simplifies IT management

    Located on the Aleutian Chain, roughly 800 miles southwest of Anchorage Alaska, the Unalaska City School District needed to keep their IT storage simple, and affordable, due both to their size and their location on the map.

    In this case study, learn how thanks to their new cloud-based architecture they’re able to:

    • Autonomously retrieve any lost files in minutes instead of hours
    • Remote replication of information to an off-campus location
    • Manage all health and configuration information to an always-on cloud service
    • And more

  • ITSM helps an IT department rediscover its purpose

    IT departments receive many requests every day. Due to a busy schedule, IT departments may not have time to consider the benefits of updating their management systems.

    The Nampa school district suffered from an antiquated and unresponsive IT department, but found that with a new service management tool they could ensure reliable operation of:

    • Data networks
    • Applications
    • Digital-assisted devices

    Discover how an underperforming IT Department turned itself into an exceptional customer service organization. 

Find more content like what you just read:

  • CW+: Analyst's take: IBM Cognos software helps schools score top marks

    IBM Cognos software helps K-12 organizations increase visibility and improve decision making, driving improved student performance, lowered cost of interventions, greater productivity, and lower operating costs.

    Download

  • Student collaboration strengthened with BYOD

    This case study explores how Roseville City School District was able to support a mobile-first BYOD learning environment by upgrading their wireless infrastructure and eliminating downtime.

    Download

  • Ransomware attacks on HigherEd rise 250%: How to protect users and data

    In this e-book, learn more about how your educational institution can build a holistic, multi-layer defense against ransomware attacks (especially in regards to protecting against email and Web-based threats).

    Download

  • Improve BYOD with the Bonjour Protocol

    This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.

    Download

  • How to deliver a faster and more secure wireless network

    Learn about a smart Wi-Fi 802.11ac tool to help you deliver a faster, more dependable Wi-Fi connectivity that supports multimedia applications while being affordable and secure.

    Download

  • BYOD initiatves in education: Why a stable wireless LAN is required

    Discover the benefits a BYOD or iPad-in-the-classroom program has to offer, and learn why a stable wireless LAN is vital to their success.

    Download

  • 8 point mobility checklist for educators

    In today's digital-first world, mobile computing and modern communications are changing the way educational institutions operate. Securely integrating new devices into your existing mobility strategy can be difficult and time consuming. Download this 8 point checklist to ensure a successful mobility strategy for educators.

    Download

  • How will your local schools be digitally transforming?

    What does digital transformation mean in an educational environment, and what sort of update will children benefit most from? Read this research report to find out about back-end updates such as improved network security and reliability, and more visible initiatives such as laptops in classrooms may be affecting the schools in your area.

    Download

  • Ransomware costs & prevention strategies

    How can school districts protect against ransomware? This resource offers a general ransomware protection strategy for school districts, which accommodates individual requirements and protects against advanced threats.

    Download

  • What's harder to control: Your network or a baby gorilla?

    A growing, low-income school district in southeast Texas was struggling to manage their complex, growing network. Their technology director said "it was like a baby gorilla. It did what it wanted, when it wanted." Find out how they achieved more network speed, security and uptime across their campuses.

    Download

  • Migration to cloud backup spares data from destruction: But how?

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

    Download

  • How did hybrid flash arrays grant this college 12 times greater IOPS?

    In this case study learn why Gordon College adopted Reduxio's HX550 hybrid flash array to accomplish their goals of app consolidation, reduced database latency, and more.

    Download

  • Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices

    This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance.

    Download

  • How you can provide high availability across your entire IT

    Click inside to learn how Veeam is helping businesses achieve 24-7 availability, by connecting their backup system with today's latest technologies like converged infrastructure and multicloud environments. Then, read how Veeam was able to help businesses in 7 industries.

    Download

  • IT education in Scandavia

    Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.

    Download

  • Key benefits of cloud-managed wireless

    Cloud-managed wireless is growing 3X faster than the wireless LAN market as a whole. Discover why enterprise networks are adopting cloud-managed wireless to offload operational expenses of deploying, securing and updating powering and cooling appliances.

    Download

  • Digital Transformation is a Journey: Discover the 4 Case Studies

    To remain innovative, agile, and competitive, organizations must manage, connect, and secure an ever-expanding number of workloads in complex hybrid infrastructures. Access this resource to achieve these lofty requirements using a server virtualization platform that can virtualize critical apps while making data readily available, and more.

    Download

  • Government leaders can use analytics to help citizens: Learn more

    Government leaders often wonder where to start in using analytics to improve their operations and enrich their citizens' lives. Uncover 10 ways to harness analytics to improve your city – including real-world examples.

    Download

  • How to prepare for Wave 2 wireless

    Making the switch to Wave 2 wireless, and 802.11ac products, will require design and other adjustments by enterprise networking pros.

    Download

  • Challenges and opportunities of technology in the classroom

    Across the globe, access to the internet has revolutionized learning. Student's expectations are changing, but not all educators are ready to adopt new mobile and digital technologies in the classroom. Download this white paper to learn about today's education expectations, and challenges to technology in the classroom.

    Download

  • How to spend your budget and time wisely when moving your organisation to the cloud in the Middle East

    According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.

    Download

  • CW ANZ November 2016

    With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • CW ASEAN - December 2016

    In this month's CW ASEAN, read how Singapore is setting itself to be a leader in the digital age.

    Download

  • CW Special Report on IBM

    This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..

    Download

  • Global ransomware attack is a security wake-up call

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

    Download

  • Artificial intelligence for security pros

    According to Gartner, by 2018, 25% of security products used for detection will have some form of machine learning built into them. Explore this 155 page e-book to learn more about artificial intelligence and machine learning for security professionals.

    Download

  • Role vs. attribute-based access control and authorization

    Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.

    Download

  • How to achieve fast and reliable Wi-Fi

    Find out how to deploy indoor Wi-Fi access points to improve network performance in the toughest environments.

    Download

  • Hyperconverged Architecture: Everything you need to know

    For small and medium-sized businesses, purchasing a full IT infrastructure just isn't in the cards. That's where this hyperconvered system comes in. In this eBook learn about the power and reliability that comes from manageable solid –state disk storage, 10 advantages hyperconverged architecture can offer, and more.

    Download

  • Information technology skills guide

    Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.

    Download

  • First edition of Computer Weekly 1966

    To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.

    Download

  • Case study: How this school eliminated paper use by 50%

    Read this case study to learn why the skilled labor training school TAFE Queensland adopted Adobe Sign, an Adobe Document Cloud solution to simplify the onboarding process.

    Download

  • CW+: Quocirca Report: How to automate your expenses – a guide for higher education and universities

    Universities and other higher education establishments increasingly have to address the need for savings across the board. One area of focus has to be expenses from faculty members and others associated with the faculty.

    Download

  • Know how to use your data

    Organizations certainly don't lack data, but simply having lots of it won't help you make faster, better decisions. Explore how SAS Data Management tools can help you overcome common barriers to seize the value in the wealth of data available to you.

    Download

  • IT in Europe: Adopting an Application-Centric Architecture

    Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view.

    Download

  • Computer Weekly – 10 October 2017: The most influential women in UK IT

    In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.

    Download

  • Women in IT: Inspiring the next generation

    This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.

    Download

  • We're just not doing enough – Working together to meet the digital skills challenge

    This white paper from TechUK focuses on what needs to be done to deliver the digital skills children and young people need, and to create entry-level skills for jobs in a digital world.

    Download

  • Information management: Realize 6 positive outcomes

    This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronize, consolidate, and share vital citizen data.

    Download

  • Data privacy under the GDPR, machine learning, and more

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.

    Download

  • How a university built their IPAM strategy

    In this case study, learn how Texas Woman's University enabled a disciplined IPAM strategy to manage tens of thousands of IP addresses, resolve DNS and PTR concerns, and provide a more reliable and secure network for their students.

    Download

  • How to measure collaboration ROI

    In this e-guide, learn how to measure collaboration ROI and discover what enterprises really want from UCC vendors as they adopt more unified communications and collaboration (UCC) tools.

    Download

  • How to shrink your skills gap like the UAE

    With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.

    Download

  • The Global Information Technology Report 2013

    This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.

    Download

  • CW ASEAN – July 2017: Be alert to threats

    With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.

    Download