You've requested...

Share this with your colleagues:

Computer Weekly - 13 March 2012: The economics of private cloud

If a new window did not open, click here to view this asset.

Download this next:

VMworld Europe Case Study: DER Deutsches Reisebüro

Desktop virtualisation helps travel agent centralise IT across 560 branches

 

Poor standardisation and lack of centralised IT across 560 branches of a German travel agency was causing IT inefficiency, downtime and business loss.

 

The IT team gain control back control of its IT and increased the company profits through a desk top virtualisation project.

 

Click on the button below to download this case study

 

These are also closely related to: "Computer Weekly - 13 March 2012: The economics of private cloud"

  • Musings on datacentres

     

    2012 was a year when organisations had to face up to the fact that the basis of IT was beginning to change. Energy costs were rapidly escalating, new technical architectures, such as cloud computing, were coming to the fore and users were off doing their own things. The potential impact on the data centre was massive – and the following report pulls together articles written by Quocirca for SearchVirtualDataCentre (now part of ComputerWeekly) throughout 2012.

     

    Contents:

     

    • Evolution of IT – rise of consumerisation and the need to control IP.
    • The need for a change in how the business and IT views the data centre 
    • A data centre infrastructure strategy fit to support business growth
    • Evaporative cooling in the data centre: how it work and who it’s for
    • Racks, Pods and containers: The new scale up
    • DCIM – what does it mean to you?
    • The promise and problems of private cloud computing.
    • Securing the cloud
    • PUE? Pretty Useless Effort.
    • DCIM, BIM and the ideal IT system
    • End-of-lifing a data centre

     

    Click on the button below to download this report

     

  • How to make the storage decisions to ensure virtualisation success

    Today’s IT leaders have to balance the often-competing demands of delivering greater

    flexibility, availability and responsiveness to change, with the need to manage costs.

    To that end, trends in the datacentre point towards the growth in the use of virtualised

    servers exceeding that of physical servers. But effective virtualisation is not just a

    question of getting the right server strategy – success depends on making the right

    decisions on storage architecture at an early stage.

Find more content like what you just read:

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

    Download

  • Smart cards: security risks

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

    Download

  • How to configure Mac OS X Server

    This step by step guide shows you how to configure Max OS X Server.

    Download

  • Learning Computing: Why object orientated programming works.

    Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey.

    Download

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.

    Download

  • E-Guide: Identifying and addressing evolving threats

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing

    In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.

    Download

  • No deal Brexit: Ideal or Ordeal?

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

    Download

  • CW Middle East ezine April 2018

    The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • CIO Trends #8

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

    Download

  • CIO Trends #8

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

    Download

  • Computer Weekly - 19 November 2019: Is facial recognition happening too fast?

    In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to data protection

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

    Download

  • Information security for SMEs

    In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.

    Download

  • Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks

    Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.

    Download

  • Computer Weekly – 11 July 2017: The data analytics behind the Wimbledon tennis championships

    In this week's Computer Weekly, we find out how the All England Lawn Tennis Club is working with IBM to use data analytics to engage with fans of the Wimbledon championships. We examine whether IT automation will kill jobs or solve the skills gap. And we look at the issues around data portability in the cloud. Read the issue now.

    Download

  • Buyer's Guide to EU General Data Protection

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

    Download

  • Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules

    In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.

    Download

  • European IT Law Briefing: Recruitment and social media

    Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.

    Download

  • Staying the course as a CIO

    In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.

    Download

  • GDPR: Risk, opportunity and what it means for security professionals

    This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.

    Download

  • Network security is being redefined to better block data raiders

    This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.

    Download

  • Next Generation Network Management Techniques

    The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!

    Download

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • Data Breach Readiness 2.0

    Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.

    Download

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

    Download

  • GDPR: The State of Play

    An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.

    Download

  • Effective print security for SMBs

    Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.

    Download

  • Computer Weekly – 16 July 2019: Reaping the benefits of digital transformation at Defra

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

    Download

  • Analytics, Decision Making & Teams That Do It Right

    Experts advise how to make the most of analytics in this report from SAS and the Harvard Business Review.

    Download

  • What to expect in unified communications over the next decade

    This expert E-Guide from SearchUnifiedCommunications.com takes a look at the coming decade and what you can expect from the world of communications and collaboration by the year 2020.

    Download

  • The Tipping Point: Top Unified Communications Issues for 2012

    This expert E-Guide from SearchUnifiedCommunications.com explores the top five unified communications issues organizations today are facing and how they will affect the transformation and evolution of UC for the better.

    Download

  • Learn about the growing focus on cryptomining by attackers

    Since its early applications in cryptocurrency, blockchain implementations have focused on keeping data secure. But the journey of blockchain technology now stretches beyond Bitcoin. For businesses, blockchain implementations can provide a secure way to store and track transactions. In this white paper, learn more about blockchain technology.

    Download

  • The Digital Value Proposition and securing CEO buy-in

    Every business should be a digital business, says Stephen Paterson, Chief Product Officer at ANDigital in this presentation.

    Download

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

    Download

  • De-risking IT Lifecycle Management

    Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

    Download

  • BYOD Policy Creation Tips from Gartner

    This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now.

    Download

  • How to get the best value from Office 365

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

    Download

  • Computer Weekly – 2 October 2018: The most influential women in UK technology

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology, and talk to this year's winner, Code First:Girls CEO Amali de Alwis, about the challenges of achieving diversity in IT. Also, our latest buyer's guide looks at the future of collaboration software. Read the issue now.

    Download

  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • How to use flash to fulfill peak SQL DB performance demands

    View the study here for more on how replacement large capacity flash arrays successfully fulfilled Collier County Public Schools' peak Microsoft SQL Server database performance demands, which their previous heterogeneous SAN environment could not handle.

    Download

  • The future of software development: Energized Work

    Gus Power, CTO  at Energized Work, gives his views on the future of software development, in this presentation for Computer Weekly's 500 Club.

    Download

  • 5 reasons why new storage models are in high demand

    Read this white paper to dig into the top 5 reasons enterprises are seeking out new storage models to streamline their digital transformation initiatives and to learn how to establish a flexible, data-centric architecture in your organization.

    Download

  • Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers

    In this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.

    Download

  • Private Cloud Computing E-Zine Vol. 2, No. 3: Consumerization and the Cloud; Cloud Management

    This expert e-zine covers select topics that can help guide your organization through the process of preparing your data center for the cloud, building and managing a private cloud, and leveraging the cloud for identity management.

    Download

  • Special Report on Adobe

    This special 7-page report from Computer Weekly, updated for 2014, analyses the challenges facing Adobe, its financial performance, the services and products it offers, its place in the IT market and its future strategy.

    Download

  • Communication and Collaboration in 2020: Inside UC’s Faster Future

    In this E-Guide from SearchUnifiedCommunications.com, we take a trip to the year 2020 in an attempt to uncover how unified communications and collaboration will evolve and what it will mean for your organization.

    Download

  • Cyber Vulnerability Index 2012

    More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.

    Download

  • A Computer Weekly buyer's guide to blockchain technology

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

    Download