Delivering Your Cloud Your Way: HP Converged Infrastructure
By: HP Inc View more from HP Inc >>
Download this next:
A Computer Weekly buyer's guide to networks
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Network departments face change and challenge on every conceivable front. The enthusiasm of users for software-centric IT and of businesses for cloud computing, outsourcing and virtualisation remains as high as it has ever been, while network service providers are marching under the banner of a network functions virtualisation movement that intends to replace proprietary hardware controls with virtualised software equivalents. In this 10-page buyer’s guide, Computer Weekly looks at an increasingly complex networking environment that could leave the unwary and the unprepared tied up in knots.
These are also closely related to: "Delivering Your Cloud Your Way: HP Converged Infrastructure"
-
A Computer Weekly Buyer's Guide to Server Operating Systems
By: TechTarget ComputerWeekly.com
Type: eBook
The role of a server operating system is shifting. It has
been influenced by cloud computing – whether it be
public or private – as well as virtualisation.
In this 12-page buyer’s guide, Computer Weekly explores:
- What’s new in Windows Server 2016; an OS designed with cloud in mind
- What has changed between Linux & Unix and the current state of play between the two competing OS
- The evolution of the server operating
system, and sees the next generation moving into the cloud
-
Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation
By: TechTarget ComputerWeekly.com
Type: Ezine
Computer Weekly – 19 June 2012: How to succeed at desktop virtualisation
In this week’s Computer Weekly, our latest Buyer's Guide examines the tools, technologies and best practices for success in desktop virtualisation. We ask if a six-year-old hardware technology – Trusted Platform Module - could be a key to tackling IT security threats. We look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Deloitte's CIO talks about how the global advisory firm is introducing a bring your own device (BYOD) scheme. And we look at new environmental guidelines that will help companies understand the carbon footprint of their IT. Read the issue now.
Buyer's Guide to desktop virtualisation – part one: How to exploit thin-client computing
Thin-client computing – or more accurately, server-based computing – has been around for years. We look at how the technology can help cut costs and improve flexible working while maintaining security, as part of a desktop virtualisation strategy.
Could 2012 be the year TPM security technology reaches critical mass?
Since 2006, many new computing devices have been sold with a built-in trusted platform module (TPM) chip, but enterprises have yet to embrace the technology in their information security strategies.
Fujitsu UK CEO steers private sector course in bid to cut public exposure
Duncan Tait took the helm at Fujitsu at the height of the credit crunch and all the upheaval it triggered, but revenues and orders are on the rise again.
Case study: Greenwich University centralises IT development onto single platform
A web portal implemented by Greenwich University has enabled it to centralise administrative processes and teaching resources, allowing staff and students to access services with a single log-in.
Dealing with the practicalities of the consumerisation scheme at Deloitte
Deloitte CIO Matt Peers is embracing the benefits of a bring your own device project but says there are limits to what you can do.
Opinion: Bed down for Byte Night
The annual IT industry charity sleep-out to raise funds to help homeless children takes place this year on 5 October. Byte Night founder Ken Deeks writes about how you can help.
The CIO role through the lens of MIT: Agile rebel or company dishwasher?
A conference at the Massachusetts Institute of Technology highlighted the changing role of the CIO.
Cutting emissions in the big picture
New guidelines on carbon footprinting in IT were published earlier this year which, if widely adopted, could lay bare the extent of emissions beyond the boundaries of a company’s own premises.
This week's digital edition is sponsored by BCS Institute, Computer Aid, Intel, RES Software, Skillsoft and Terrapin.
Find more content like what you just read:
-
Take a Load Off, Admin
By: TechTarget IT Operations
Type: eBook
In this guide, find out specific goals and key processes to address before implementing an automated server virtualization platform. Access now to learn about the benefits of automation in 3 main areas: compliance, provisioning and configuration.
-
Migration to cloud backup spares data from destruction: But how?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
-
IT in Europe: Next-Generation Network Management Techniques
By: TechTarget ComputerWeekly.com
Type: Ezine
This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.
-
Quocirca: Selecting a cloud printing platform
By: TechTarget ComputerWeekly.com
Type: Resource
As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
-
Has HP taken a calculated risk in splitting the business?
By: TechTarget ComputerWeekly.com
Type: eGuide
Hewlett Packard (HP) is planning to turn its consumer computing and printing departments into a separate company. The remaining business would comprise HP's software, business servers and IT services operations.
-
Web Browser Security Features Make Attacks Harder
By: TechTarget Security
Type: eGuide
This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
-
MicroScope - December 2017: Unlock the potential of DaaS
By: MicroScope
Type: Ezine
This month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference.
-
Log management best practices
By: TechTarget Security
Type: eGuide
Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
-
CW Buyer's Guide: Software-defined networking
By: TechTarget Security
Type: Essential Guide
Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business.
-
Technical Guide on SIM: Moving beyond network security toward protecting applications
By: TechTarget Security
Type: eGuide
SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
-
MicroScope January 2014: A special issue looking at software defined networking
By: TechTarget Security
Type: Ezine
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
Essential Guide to Software Defined Networks
By: TechTarget ComputerWeekly.com
Type: eGuide
Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.
-
MicroScope – May 2023: Vendors need to listen and learn
By: MicroScope
Type: Ezine
In this month's MicroScope ezine, we look at why it is vital that vendors listen to partners and act on the feedback. We also look at what's next for HP's advancing sustainability programme, Amplify Impact. Read the issue now.
-
VM Storage: Dos and Don’ts
By: TechTarget Storage
Type: eGuide
This e-guide examines server virtualization through a storage lens and outlines tools and techniques you can leverage to maximize performance.
-
Print security: An imperative in the IoT era
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Analyst group Quocirca gives the perspective on the risks and best practices of print security.
-
Computer Weekly - 8 February 2022: Exploring the metaverse
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
-
Exploring new web browser security capabilities
By: TechTarget Security
Type: White Paper
New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
-
Unlocking the circular economy in the print industry
By: TechTarget ComputerWeekly.com
Type: Essential Guide
There is a significant opportunity for organisations to gain economic and environmental benefits through operating a more efficient print environment, this report from analyst Quocirca reveals.
-
Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center
By: TechTarget Security
Type: eBook
We are potentially at the beginning of a new generation of IT administrators who manage a range of technologies outside of the traditional realm of virtualization. Read this E-Book to learn more.
-
Looking Back on 25 Years of Linux
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
-
Software-Defined Networks and the New Network Hypervisor
By: TechTarget Security
Type: Ezine
This issue of the Network Evolution E-Zine focuses on various SDN solutions, if it's the answer to the bottleneck problem, and potential pitfalls. Read this issue now to see what experts have to say about the possible SDN revolution.
-
Network Evolution: Software defined networks and the new network hyper-visor
By: TechTarget Security
Type: Ezine
This expert resource puts SDN under the microscope, examining the impact that the technology can have on your environment, along with how your peers are utilizing it. Read on to find out whether SDN is really worth the hype that is building around it.
-
Computer Weekly storage case studies
By: TechTarget ComputerWeekly.com
Type: Case Study
Antony Adshead takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.
-
Expert Best Practices: Using Linux for Data Center Consolidation
By: TechTarget Data Center
Type: eGuide
Access this expert e-guide for the top advantages of using Linux in a data center consolidation project. Learn how using Linux can help you more effectively reduce cooling costs, reduce real estate footprint and improve server workload utilization.
-
Time to Print
By: MicroScope
Type: eGuide
In this e-guide, we discuss the ever-evolving world of print within the digital age. We look at how major print vendors are planning on using the channel to help them grow, how 3D printing is having an impact andwhy cloud-based solutions are increasing.
-
The Best of RSA: Mobile Security
By: TechTarget Security
Type: eGuide
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.
-
Private Cloud E-Zine Vol. 4
By: TechTarget Data Center
Type: Ezine
As cloud continues to evolve, IT managers are looking for better integration of cloud platforms with existing tools, greater control and management, improved self-service and greater portability among cloud environments. This e-zine takes a look at trends in cloud computing, using open source software, moving applications to the cloud.
-
Allocating and Configuring Storage for Virtual Machines
By: TechTarget Data Center
Type: Essential Guide
This drill-down on allocating and configuring virtual machine storage provides storage admins with some best practices to configure virtual machine storage in their virtualized data centers. Read on to learn more.
-
Hadoop Data Management Platforms and Appliances
By: TechTarget Business Analytics
Type: eGuide
This expert Technology Guide provides an introduction to Hadoop and suggests criteria for selecting a Hadoop data management platform. Also included are reviews of leading Hadoop systems from a variety of vendors.
-
The various ways to fight new and emerging cybercrime
By: TechTarget Security
Type: eGuide
Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
-
Unix-to-Linux Migration
By: TechTarget Data Center
Type: eGuide
Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more.
-
Mobile Device Security Overview
By: TechTarget Security
Type: eGuide
This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
-
Wireless LAN ITDC - Checklist #2
By: TechTarget Security
Type: eGuide
Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs.
-
How to choose the right PC for today’s employees
By: Connection
Type: eGuide
This custom TechTarget e-guide is meant to help IT decision-makers choose the right PC for their business, comprised of key considerations, best practices, and comprehensive component and feature lists for the top market options. Download your copy now to learn how to manage your PCs and modernize the end-user experience.
-
Strategies for Building a Private Cloud
By: TechTarget Data Center
Type: Ezine
While the cloud can offer many benefits, IT professionals are still hesitant to transition their computing environments with all the complexities involved. This expert e-zine discusses current cloud trends, the benefits of taking the plunge, and tools you can leverage to ease the extensive process so you don’t have to lag behind.
-
MicroScope – November 2022: Elevate security to minimise risk
By: MicroScope
Type: Ezine
Security remains a major concern for customers and a continuing area of growth for the channel – so what can managed service providers do to help out? Also read about expectations for the last quarter of 2022 and how partnerships are key to digital transformation.
-
e-Guide: Cloud computing myths and tips
By: TechTarget Data Center
Type: eGuide
Read this e-guide to gain insights on the building blocks of the private cloud and how the cloud works with virtualisation. Also, uncover the truth about four common cloud computing myths.
-
Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.
-
The Best Storage for Virtual Environments
By: TechTarget Storage
Type: eGuide
Access this eGuide now to discover what vendors are doing to address the problem of IT pros struggling to support storage for virtual environments and which storage works the best in virtual infrastructures.
-
Computer Weekly – 5 June 2018: The bumpy ride to digital transformation
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.
-
IT in Europe E-Zine – The Cloud Issue
By: TechTarget Data Center
Type: eBook
There is enormous competitive advantage to be gained by organisations that understand how to take advantage of the opportunities for innovation that the cloud represents. In this month's IT in Europe, we aim to help point you in the right direction.
-
Digital transformation: bridging the paper and digital gap
By: TechTarget ComputerWeekly.com
Type: Analyst Report
Enterprises are increasingly turning to traditional managed print service providers to improve process efficiency across both paper and digital information, says this report from analyst group, Quocirca.
-
E-Guide: Selecting a SIM for midmarket business
By: TechTarget Security
Type: eGuide
This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
-
Infographic: 4 types of ransomware
By: TechTarget ComputerWeekly.com
Type: Infographic
Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.
-
UKTech50 2021 - The most influential people in UK technology
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.
-
A Computer Weekly Buyer's Guide to Converged Infrastructure
By: TechTarget ComputerWeekly.com
Type: eBook
In this 13-page buyer's guide, Computer Weekly looks at how the technology cuts the numbers of discrete skills and associated costs while demanding that those who remain retrain to ensure they know how to manage all parts of the stack – and the organisation implements it with care and an understanding of the risks.
-
Step-by-step Guide to Virtual Infrastructure Management
By: TechTarget Data Center
Type: eGuide
Though monitoring and managing your virtual infrastructures can be challenging, the right tools and strategies can help you maintain control over your environment. Access this e-guide to gain key tips and best practices for monitoring applications, physical host servers, hypervisors and more.