You've requested...

Share this with your colleagues:

Computer Weekly - 13 March 2012: The economics of private cloud

If a new window did not open, click here to view this asset.

Download this next:

VMworld Europe Case Study: DER Deutsches Reisebüro

Desktop virtualisation helps travel agent centralise IT across 560 branches

 

Poor standardisation and lack of centralised IT across 560 branches of a German travel agency was causing IT inefficiency, downtime and business loss.

 

The IT team gain control back control of its IT and increased the company profits through a desk top virtualisation project.

 

Click on the button below to download this case study

 

These are also closely related to: "Computer Weekly - 13 March 2012: The economics of private cloud"

  • Musings on datacentres

     

    2012 was a year when organisations had to face up to the fact that the basis of IT was beginning to change. Energy costs were rapidly escalating, new technical architectures, such as cloud computing, were coming to the fore and users were off doing their own things. The potential impact on the data centre was massive – and the following report pulls together articles written by Quocirca for SearchVirtualDataCentre (now part of ComputerWeekly) throughout 2012.

     

    Contents:

     

    • Evolution of IT – rise of consumerisation and the need to control IP.
    • The need for a change in how the business and IT views the data centre 
    • A data centre infrastructure strategy fit to support business growth
    • Evaporative cooling in the data centre: how it work and who it’s for
    • Racks, Pods and containers: The new scale up
    • DCIM – what does it mean to you?
    • The promise and problems of private cloud computing.
    • Securing the cloud
    • PUE? Pretty Useless Effort.
    • DCIM, BIM and the ideal IT system
    • End-of-lifing a data centre

     

    Click on the button below to download this report

     

  • How to make the storage decisions to ensure virtualisation success

    Today’s IT leaders have to balance the often-competing demands of delivering greater

    flexibility, availability and responsiveness to change, with the need to manage costs.

    To that end, trends in the datacentre point towards the growth in the use of virtualised

    servers exceeding that of physical servers. But effective virtualisation is not just a

    question of getting the right server strategy – success depends on making the right

    decisions on storage architecture at an early stage.

Find more content like what you just read:

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

    Download

  • Smart cards: security risks

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

    Download

  • How to configure Mac OS X Server

    This step by step guide shows you how to configure Max OS X Server.

    Download

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.

    Download

  • Learning Computing: Why object orientated programming works.

    Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey.

    Download

  • E-Guide: Identifying and addressing evolving threats

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • No deal Brexit: Ideal or Ordeal?

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

    Download

  • CW Middle East ezine April 2018

    The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • CIO Trends #8

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

    Download

  • Information security for SMEs

    In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.

    Download

  • Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks

    Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.

    Download

  • Computer Weekly – 8 January 2019: Technology innovation in music

    In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.

    Download

  • Buyer's Guide to EU General Data Protection

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

    Download

  • European IT Law Briefing: Recruitment and social media

    Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.

    Download

  • Explore the implications of blockchain technology

    Since its early applications in cryptocurrency, blockchain implementations have focused on keeping data secure. But the journey of blockchain technology now stretches beyond Bitcoin. For businesses, blockchain implementations can provide a secure way to store and track transactions. In this white paper, learn more about blockchain technology.

    Download

  • GDPR: Risk, opportunity and what it means for security professionals

    This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.

    Download

  • Staying the course as a CIO

    In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.

    Download

  • Network security is being redefined to better block data raiders

    This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • Computer Weekly – 9 May 2017: Casting the IT skills net wider

    In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.

    Download

  • Data Breach Readiness 2.0

    Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.

    Download

  • How to be GDPR compliant with machine data insights

    Discover an overview of the GDPR and explore how machine data can help you meet the core requirements. Uncover the 3 ways machine data can help support your GDPR compliance program.

    Download

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

    Download

  • Computer Weekly – 11 July 2017: The data analytics behind the Wimbledon tennis championships

    In this week's Computer Weekly, we find out how the All England Lawn Tennis Club is working with IBM to use data analytics to engage with fans of the Wimbledon championships. We examine whether IT automation will kill jobs or solve the skills gap. And we look at the issues around data portability in the cloud. Read the issue now.

    Download

  • GDPR: The State of Play

    An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.

    Download

  • Next Generation Network Management Techniques

    The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!

    Download

  • Computer Weekly – 16 July 2019: Reaping the benefits of digital transformation at Defra

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

    Download

  • Effective print security for SMBs

    Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.

    Download

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

    Download

  • How organizations are remaining compliant with GDPR and CCPA

    The regulatory climate around the world for data protection is heating up, with GDPR leading the way and other regional areas starting to enact their own frameworks. In this research report, explore key findings from an in-depth survey of North American organizations with regard to their plans for GDPR and CCPA compliance.

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • Analytics, Decision Making & Teams That Do It Right

    Experts advise how to make the most of analytics in this report from SAS and the Harvard Business Review.

    Download

  • De-risking IT Lifecycle Management

    Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

    Download

  • Combat today's threats with 3-stage data protection

    This white paper will help you tackle these evolving threats and secure your business with a proven 3-stage data protection process. View it now to get started and to ensure your cybersecurity strategy is in good shape.

    Download

  • What to expect in unified communications over the next decade

    This expert E-Guide from SearchUnifiedCommunications.com takes a look at the coming decade and what you can expect from the world of communications and collaboration by the year 2020.

    Download

  • The Tipping Point: Top Unified Communications Issues for 2012

    This expert E-Guide from SearchUnifiedCommunications.com explores the top five unified communications issues organizations today are facing and how they will affect the transformation and evolution of UC for the better.

    Download

  • The Digital Value Proposition and securing CEO buy-in

    Every business should be a digital business, says Stephen Paterson, Chief Product Officer at ANDigital in this presentation.

    Download

  • Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules

    In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.

    Download

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

    Download

  • International politics is leading to the downfall of global IT services

    In this week's Computer Weekly, we examine the threats to the global IT services sector caused by the political turmoil in the US and UK. Home Office IT chief Sarah Wilkinson discusses digital transformation in a large government department. And we find out how business leaders need to improve their digital skills. Read the issue now.

    Download

  • How to get the best value from Office 365

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

    Download

  • BYOD Policy Creation Tips from Gartner

    This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now.

    Download

  • Computer Weekly – 30 August 2016: Get protected

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

    Download

  • Computer Weekly – 4 December 2018: Tackling legacy systems by making IT evergreen

    In this week's Computer Weekly, we assess strategies for continuous IT improvement to help evergreen IT replace legacy tech. Our new buyer's guide examines next-generation networking technologies such as SD-WAN. And we hear about digital transformation in the charity sector in an interview with the IT leader at Parkinson's UK. Read the issue now.

    Download

  • Computer Weekly – 19 July 2016: Building big ideas in banking

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

    Download

  • CW+: Quocirca report: You sent what ?

    Electronically stored information is a key asset for any organisation, but it is often insufficiently cared for—as the numerous high profile data breaches reported in recent years demonstrate.

    Download

  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.

    Download

  • How flash fulfills peak SQL Server database performance demands

    View the study here for more on how replacement large capacity flash arrays successfully fulfilled Collier County Public Schools' peak Microsoft SQL Server database performance demands, which their previous heterogeneous SAN environment could not handle.

    Download

  • Top 10 cyber crime stories of 2018

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

    Download

  • Top 10 cyber crime stories of 2018

    This year was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly's top 10 cyber crime stories 2018

    Download

  • The future of software development: Energized Work

    Gus Power, CTO  at Energized Work, gives his views on the future of software development, in this presentation for Computer Weekly's 500 Club.

    Download