You've requested...

Discover Cloud-Enabled Enterprise Reference Architecture

If a new window did not open, click here to view this asset.

Download this next:

Focus: Campus local area networks (LAN)

Whether a university buzzing with Gen Z students carrying multiple devices, who have never known a life offline or a large enterprise headquarters spanning multiple buildings with a Millennial workforce that expects the latest and greatest standards of connectivity, the demands now being placed on campus local area networks (LANs) are massive.

And just as datacentres did in the past, campus LANs are coming to be defined more and more by virtualisation and software-based controls. Alongside this trend, LAN hardware continues to improve in its capabilities, as network managers try to keep up with the intense demand

In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.

First, we look at how to go about designing and implementing a modern campus LAN, taking into account advances in software-defined and automation.

Then, we will take you behind the scenes at the UK’s University of Northampton to discover how the IT team was able to take advantage of a move to a brand new campus to deploy the latest and greatest networking technology in support of a new model of learning for a new generation of students.

Delving deep into the infrastructure itself, tech evangelist Paul Ryan reveals how copper-based LANs are increasingly unfit for purpose in a digital business, and argues in favour of upgrading to fibre-based passive optical LANs.

Finally, enterprise IT and network design specialist Andrew Froelich looks at some of the key suppliers in the campus LAN space, running the rule over technology from HPE, Huawei and Juniper Networks.

These are also closely related to: "Discover Cloud-Enabled Enterprise Reference Architecture"

  • Top 10 Australian IT stories of 2020

    Just as Australia was reeling from the aftermath of the devastating bush fires in early 2020 that took down telco networks, it faced yet another challenge when the Covid-19 pandemic struck a few months later. Against all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:

  • MicroScope – May 2021: Exploring digital metamorphosis

    Digital transformation or digital evolution?

    There is no doubt that customers are changing and moving to a more digital world – but perhaps this is better described as an evolution rather than a transformation?

    ‘The elephant in the zoom’: Seeking new broadband standards

    Local providers are shaking up the communications market in a bid to provide better fibre broadband, and Spectrum Internet is one of those looking to make waves.

    Control the narrative to increase sales

    Johnny Carpenter, vice-president of EMEA sales at iland, shares some advice for partners looking to increase their sales in a post-pandemic world.

Find more content like what you just read:

  • Blockchain Enterprise Survey: deployments, benefits and attitudes

    Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.

    Download

  • Project Brief: Inside Juniper's radical IT transformation

    Western Australian aged care provider Juniper embarked on an aggressive strategy to completely transform its IT operations in just two years. This 1-page brief summarises how this overhaul has helped free up the resources needed to provide better quality of care for residents.

    Download

  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

    Download

  • Royal Holloway: Attack mapping for the internet of things

    The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.

    Download

  • Computer Weekly – 16 January 2024: All eyes are on the Post Office scandal – at last

    In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.

    Download

  • A Computer Weekly Buyers Guide to IoT

    In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).

    Download

  • Welcome to the new world of network management

    In this e-guide we will explore how the role of the network manager is undergoing radical change as the world of networking moves into the cloud with the transition towards software-defined, virtualised infrastructures and begins to incorporate elements of automation and machine learning.

    Download

  • MicroScope – November 2023: Team up for peak success

    In this issue, we explore the need to handle pitches and collaboration carefully to create more opportunities as an increasing amount of IT spending goes via partners. Also discover Canalys' predictions for the use of generative AI, and just what exactly it means when we talk 'cyber security'

    Download

  • Your Red Hat Ansible Automation Platform starter kit

    In this e-book, discover everything you need to get started with Ansible Automation Platform, including key automation concepts, product features and capabilities, use cases for gaining value quickly, and strategies for implementing organization-wide automation.

    Download

  • Vendor Study – Software Defined Solutions and Services

    This ISG Provider Lens study examines the different kinds of global network offerings related to SDN. These include SD-WAN (consulting, implementation and managed services), SD-WAN (DIY) and equipment and service supply to enterprises for own operation. Read the study now to learn which could best fit your business’ needs.

    Download

  • Essential Guide: How APAC firms can ride out the pandemic

    In this Essential Guide, we examine the impact of Covid-19 on Asia-Pacific businesses, and how they have responded from a technology perspective by driving initiatives spanning digital transformation, business continuity, cloud, cyber security and remote working.

    Download

  • Is the Netherlands keeping up with modern pace of digital change?

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

    Download

  • Emerging Trends and New Developments in Software-Defined Networks

    In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.

    Download

  • New technology uses eBPF to inspect encrypted network traffic

    Network traffic monitoring faces challenges with encrypted traffic and hybrid cloud environments. Gigamon's Precryption technology leverages eBPF to inspect encrypted traffic before or after encryption, providing visibility without decryption. Read the full analyst report to learn more about this innovative approach.

    Download

  • CW Europe – March 2017

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

    Download

  • CW APAC: Trend Watch: Cloud networking

    In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.

    Download

  • MicroScope: Hatch a plan for retirement

    An issue looking at the issues around business management and retirement and how distribution plays a crucial role with cloud and IoT.

    Download

  • European Perceptions, Preparedness and Strategies for IoT Security

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

    Download

  • CW APAC, April 2022: Trend Watch: Cyber security

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

    Download

  • Case study: One platform to manage it all

    Pulsant, a UK infrastructure provider, adopted Morpheus to manage its hybrid cloud services. This enabled them to automate provisioning, reduce technical debt, and offer clients greater flexibility in accessing cloud resources. Read the full case study to learn how Pulsant transformed its cloud operations.

    Download

  • CW Europe – March 2018

    Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.

    Download

  • Build a telecommunications foundation for an evolving future

    Download this e-book to explore the value of open, trusted partner ecosystems for telco modernization and highlights key partnerships in 6 essential areas.

    Download

  • CW EMEA – October 2023: Prepare for AI explosion

    In this month's CW EMEA, we look at generative AI, which Accenture claims is the next big thing in enterprise IT. We also look at a demo of multi-supplier non-real-time RAN optimisation, a Ryder Cup tech testbed, and how Zurich Insurance has cut the time it takes to develop ServiceNow apps. Read the issue now.

    Download

  • Discover how data analytics and IoT work together to transform the IT industry

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

    Download

  • CW Middle East July to Sept 2016:

    In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.

    Download

  • A Computer Weekly E-Guide to Network Management & Monitoring

    Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Getting a handle on AIOps and self-healing systems

    Reducing effort, reacting faster, preventing problems and improving understanding of the IT environment are the key benefits of AIOps, identified by analyst Forrester. To achieve these goals AIOPs platforms are increasingly making use of predictive analytics and automation to offer IT operations a level of self-healing.

    Download

  • The development of wired and wireless LANs in a hybrid work model

    Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).

    Download

  • Jargon Buster Guide to Virtualisation

    This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.

    Download

  • CW Nordics November 2017

    The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

    Download

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

    Download

  • Secure Beyond Breach: A Practical Guide

    Based on real-world scenarios and written by industry experts who have been in the trenches, Secure Beyond Breach is a practical guide that details how to implement a micro-segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.

    Download

  • MicroScope – July 2021: Life on the edge

    With opportunities around edge computing on the up, we ask experts to weigh in on how the channel can approach using the tech to its advantage. Also discover how to encourage employees to take cyber security lessons seriously, and how collaboration is key to growth this year

    Download

  • Singapore Builds on Its Digital Foundations to Secure its Place as a Leader In The Digital Age

    In this week's Computer Weekly, we find out how the city-state of Singapore is investing in skills and technology to become a leading digital nation. We examine how to prevent legacy IT becoming a hindrance to digital transformation. And we look at the impact of controversial new tax rules on the UK's IT contractor community. Read the issue now.

    Download

  • Buyer's Guide: Applications of next generation networking

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

    Download

  • How do you solve a problem like security training?

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

    Download

  • Analyst assessment: Verizon Business for managed SD-WAN/SASE

    In this analyst report, IDC analyzes the global managed SD-WAN/SASE services market, highlighting Verizon's leadership position. Key takeaways include the evolution toward integrated networking and security, challenges with enterprise adoption, and Verizon's strengths in multivendor offerings and visibility. Read the full report to learn more.

    Download

  • Market overview: 13 managed SD-WAN/SASE vendors

    To see how 13 leading vendors for managed SD-WAN/SASE services stack up against each other, download this 10-page IDC MarketScape report.

    Download

  • Computer Weekly – 6 February 2024: Generative AI – an early adopter's experience

    In this week's Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer's guide examines the key security trends for 2024. And Microsoft's head of identity talks about a future without passwords. Read the issue now.

    Download

  • Top 10 network stories of 2018

    2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.

    Download

  • Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data

    In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.

    Download

  • Computer Weekly – 10 April 2018: Technology is a lifesaver for NHS Blood and Transplant

    In this week's Computer Weekly, we talk to the CDO of the NHS's blood and transplant agency about how digital transformation is proving to be a real lifesaver. Our latest buyer's guide examines the state of public cloud. And we find out how Ireland is gaining a Brexit dividend to boost its tech sector. Read the issue now.

    Download

  • Security analytics: Enabling organisations to get ahead of attackers

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

    Download

  • The top data center & infrastructure challenges in 2024

    Access this e-book for a full data center landscape report that offers deeper insights into IT budget shifts, workload deployment, and infrastructure hardware.

    Download

  • Computer Weekly Buyer's Guide to SD-WAN services

    In this 14-page buyer's guide, Computer Weekly looks at howSD-WAN effectively removes telcos' lock-in, the ways hybrid deployment hinges on the network, and the flexibility demanded by cloud-based workloads.

    Download

  • Focus: Network security

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

    Download