Quantcast
Channel: Reg Whitepapers
Browsing all 84 articles
Browse latest View live

Bridging The Replication Gap

Disaster recovery is not what it used to be.In the event of a flood or fire, for example, organisations have restored tape-based backup data from a remote location. This option is becoming less...

View Article



Applied Desktop Virtualisation

We asked the illustrious readers of The Register to tell us about their experiences with desktop virtualisation. We wanted to know, based on adoption experiences from the readers, the practical...

View Article

Server Virtualisation Scale-Up

The majority of IT professionals consistently report they are happy with their knowledge of server virtualisation. They are comfortable with their understanding of where solutions are well suited in...

View Article

Mobile computing checkpoint

The last decade has seen a significant increase in adoption of laptop and notebook PCs in business.This is a Reg reader Tech Panel piece of research that examines the present and future shape of the...

View Article

Reg Reader Research: Cloud connectivity

One of the most frequent concerns raised when looking at the risk of adopting Cloud services and SaaS - along with security and privacy - is that the underlying communications infrastructure (internal...

View Article


The Consumerisation of IT

The ‘consumerisation of IT’ is real, and it’s not just about ‘hot’ gadgets.Feedback from over 1,600 participants from The Register's dear readers confirmed that many organisations are seeing...

View Article

Information management in financial services

Making sure that the right information is available at the right time to the right people is more important than ever in today’s volatile economic and political environment. But how are financial...

View Article

Reg Reader Research: SaaS based Email and Office Productivity Tools

Much has been made in the media about the Software as a Service (SaaS) options challenging the traditional dominance of desktop office tools and the back-end systems that drive them. Indeed, a number...

View Article


Reg Reader Research: The Links between Public and Private Cloud

If ‘cloud’ is all about services based on shared public infrastructure, isn’t ‘private cloud’ a contradiction in terms?Nevertheless, the term ’Private Cloud’ has become widely accepted, and indications...

View Article


Reg Reader Research: Private Cloud and IT Service Delivery

There’s a lot of talk about budget pressures, and the need to do ’more for less’. But what’s really going on ‘at the coalface’? How are IT departments doing in their quest to deliver services more...

View Article

From virtualisation to private cloud

Lots of people are talking about private cloud as the next natural step from virtualisation. While some companies have managed to implement private cloud, for many it can seem to be a giant leap.By...

View Article

The Business of Security

Big companies invest a lot of time and energy in IT security. That’s because they have a lot to protect: customer databases, business leads, valuable intellectual property.They also have good reason to...

View Article

Fast Forward to Big Data

The pools of data available to organisations continue to grow in size and complexity, yielding both new opportunities and challenges. How should organisations be thinking about their data analytics and...

View Article


A Vision for the Data Centre

While the imminent death of on-premise computing as a result of hosted cloud services has been greatly exaggerated, this doesn’t mean that the enterprise data centre can remain as it is. Stakeholders...

View Article

The changing shape of the desktop

The desktop computing element is one of the most important aspects of any IT infrastructure, and keeping it in good shape is the key to maintaining end user productivity and satisfaction.But with...

View Article


Office 365 in Context

Gone are the days when office productivity revolved around the word processing, spreadsheet and presentation suite running on your desktop PC.Users today are working in a highly connected manner, often...

View Article

The Register guide to hosted apps

This guide will help you to use the appropriate amount of brain if you are considering hosted apps in your business and want to be sure that your data is protected, that you can get service and manage...

View Article


Reg Reader Research: SaaS based Email and Office Productivity Tools

Much has been made in the media about the Software as a Service (SaaS) options challenging the traditional dominance of desktop office tools and the back-end systems that drive them. Indeed, a number...

View Article

Bridging The Replication Gap

Disaster recovery is not what it used to be.In the event of a flood or fire, for example, organisations have restored tape-based backup data from a remote location. This option is becoming less...

View Article

The End User Security Jigsaw

Risk management is not about absolutes or certainty; it’s about playing the odds. This principle is particularly relevant when it comes to securing end user computing activity.We have no shortage of...

View Article
Browsing all 84 articles
Browse latest View live




Latest Images