You've requested...

Share this with your colleagues:

Computer Weekly - 13 March 2012: The economics of private cloud

If a new window did not open, click here to view this asset.

Download this next:

VMworld Europe Case Study: DER Deutsches Reisebüro

Desktop virtualisation helps travel agent centralise IT across 560 branches

 

Poor standardisation and lack of centralised IT across 560 branches of a German travel agency was causing IT inefficiency, downtime and business loss.

 

The IT team gain control back control of its IT and increased the company profits through a desk top virtualisation project.

 

Click on the button below to download this case study

 

These are also closely related to: "Computer Weekly - 13 March 2012: The economics of private cloud"

  • Musings on datacentres

     

    2012 was a year when organisations had to face up to the fact that the basis of IT was beginning to change. Energy costs were rapidly escalating, new technical architectures, such as cloud computing, were coming to the fore and users were off doing their own things. The potential impact on the data centre was massive – and the following report pulls together articles written by Quocirca for SearchVirtualDataCentre (now part of ComputerWeekly) throughout 2012.

     

    Contents:

     

    • Evolution of IT – rise of consumerisation and the need to control IP.
    • The need for a change in how the business and IT views the data centre 
    • A data centre infrastructure strategy fit to support business growth
    • Evaporative cooling in the data centre: how it work and who it’s for
    • Racks, Pods and containers: The new scale up
    • DCIM – what does it mean to you?
    • The promise and problems of private cloud computing.
    • Securing the cloud
    • PUE? Pretty Useless Effort.
    • DCIM, BIM and the ideal IT system
    • End-of-lifing a data centre

     

    Click on the button below to download this report

     

  • How to make the storage decisions to ensure virtualisation success

    Today’s IT leaders have to balance the often-competing demands of delivering greater

    flexibility, availability and responsiveness to change, with the need to manage costs.

    To that end, trends in the datacentre point towards the growth in the use of virtualised

    servers exceeding that of physical servers. But effective virtualisation is not just a

    question of getting the right server strategy – success depends on making the right

    decisions on storage architecture at an early stage.

Find more content like what you just read:

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

    Download

  • Smart cards: security risks

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

    Download

  • How to configure Mac OS X Server

    This step by step guide shows you how to configure Max OS X Server.

    Download

  • Learning Computing: Why object orientated programming works.

    Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey.

    Download

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.

    Download

  • E-Guide: Identifying and addressing evolving threats

    This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.

    Download

  • No deal Brexit: Ideal or Ordeal?

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

    Download

  • No deal Brexit: Ideal or Ordeal?

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

    Download

  • Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing

    In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.

    Download

  • AppSec risk report: Key trends & challenges

    As organizations continue to embrace the productivity and collaboration benefits of business applications, it’s important to understand that hackers are constantly developing new techniques to exploit these applications. Download this research report for a comprehensive look at the trending attack methods and risks to keep an eye on.

    Download

  • CW Middle East ezine April 2018

    The Middle East region is on a path, or even fast track, to becoming a global digital hub. But any country or region heading in this direction will have some fundamentals to get right.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • CIO Trends #8

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

    Download

  • CIO Trends #8

    In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.

    Download

  • Computer Weekly - 19 November 2019: Is facial recognition happening too fast?

    In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

    Download

  • Multi-pronged approach to cyber security professional development

    In this e-guide, we look at why organisations lack basic prevention, detection and response capabilities. Also, while mastering security basics should always be a top priority, the challenges in securing critical infrastructure and the internet of things provide ample opportunity for further professional development.

    Download

  • A Computer Weekly buyer's guide to data protection

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

    Download

  • A Computer Weekly buyer's guide to data protection

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

    Download

  • Information security for SMEs

    In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.

    Download

  • Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks

    Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.

    Download

  • Buyer's Guide to EU General Data Protection

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

    Download

  • Computer Weekly – 11 July 2017: The data analytics behind the Wimbledon tennis championships

    In this week's Computer Weekly, we find out how the All England Lawn Tennis Club is working with IBM to use data analytics to engage with fans of the Wimbledon championships. We examine whether IT automation will kill jobs or solve the skills gap. And we look at the issues around data portability in the cloud. Read the issue now.

    Download

  • European IT Law Briefing: Recruitment and social media

    Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.

    Download

  • GDPR: Risk, opportunity and what it means for security professionals

    This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.

    Download

  • Computer Weekly - 3 December 2019: Meet the most influential people in UK technology

    In this week's Computer Weekly, we reveal our 10th annual list of the 50 most influential people in UK technology, and profile this year's UKtech50 winner, Demis Hassabis, CEO and founder of AI pioneer DeepMind. Also: we examine how continuous software development can improve application security. Read the issue now.

    Download

  • Staying the course as a CIO

    In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.

    Download

  • Network security is being redefined to better block data raiders

    This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.

    Download

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

    Download

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

    Download

  • Next Generation Network Management Techniques

    The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!

    Download

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • Analytics, Decision Making & Teams That Do It Right

    Experts advise how to make the most of analytics in this report from SAS and the Harvard Business Review.

    Download

  • What to expect in unified communications over the next decade

    This expert E-Guide from SearchUnifiedCommunications.com takes a look at the coming decade and what you can expect from the world of communications and collaboration by the year 2020.

    Download

  • The Tipping Point: Top Unified Communications Issues for 2012

    This expert E-Guide from SearchUnifiedCommunications.com explores the top five unified communications issues organizations today are facing and how they will affect the transformation and evolution of UC for the better.

    Download

  • GDPR: The State of Play

    An infographic to inform the reader of what GDPR is, how it will affect them, and when it will come into play.

    Download

  • Effective print security for SMBs

    Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.

    Download

  • Data Breach Readiness 2.0

    Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.

    Download

  • Computer Weekly – 16 July 2019: Reaping the benefits of digital transformation at Defra

    In this week's Computer Weekly, we check out the digital transformation at Defra, and see how the government department is preparing for Brexit. The new technology chief for the NHS explains how he's going to bring the health service into the digital age. And we examine how to make a success of enterprise social media platforms. Read the issue now.

    Download

  • Security from beginning to endpoint

    With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.

    Download

  • The Digital Value Proposition and securing CEO buy-in

    Every business should be a digital business, says Stephen Paterson, Chief Product Officer at ANDigital in this presentation.

    Download

  • CIO Trends #10: Middle East

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

    Download

  • CIO Trends #10: Benelux

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.

    Download

  • Computer Weekly – 4 June 2019: GDPR one year on – is it working?

    In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.

    Download

  • De-risking IT Lifecycle Management

    Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

    Download

  • BYOD Policy Creation Tips from Gartner

    This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now.

    Download

  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.

    Download

  • How to get the best value from Office 365

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

    Download

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

    Download

  • Computer Weekly – 2 October 2018: The most influential women in UK technology

    In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology, and talk to this year's winner, Code First:Girls CEO Amali de Alwis, about the challenges of achieving diversity in IT. Also, our latest buyer's guide looks at the future of collaboration software. Read the issue now.

    Download

  • Private Cloud Computing E-Zine Vol. 2, No. 3: Consumerization and the Cloud; Cloud Management

    This expert e-zine covers select topics that can help guide your organization through the process of preparing your data center for the cloud, building and managing a private cloud, and leveraging the cloud for identity management.

    Download

  • Communication and Collaboration in 2020: Inside UC’s Faster Future

    In this E-Guide from SearchUnifiedCommunications.com, we take a trip to the year 2020 in an attempt to uncover how unified communications and collaboration will evolve and what it will mean for your organization.

    Download