app

Results 1 - 25 of 11600Sort Results By: Published Date | Title | Company Name
Published By: IO     Published Date: Dec 31, 2015
The primary focus of any data center is the critical applications that form an enterprise’s business and operational core—its commercial and technical heart. Last-generation facilities, which were often designed using traditional methods created during the mainframe era, simply aren’t capable of handling the requirements of today’s businesscritical applications. Additionally, deploying a data center with inadequate or inappropriate resources, or placing the facility in the wrong location, can negatively impact application performance and, in turn, enterprise success.
Tags : 
    
IO
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA). It is important to consider while differences emerge among specific compliance mandates, many of the common mistakes and challenges associated with each will apply to all compliance efforts.
Tags : 
    
FORTRUST
Published By: RagingWire Data Centers     Published Date: Sep 08, 2015
Business and IT are no longer separate silos. Your application is your business, and software development is the glue that holds it together. But how can you develop your business and the applications that support it at the same time? How far can you push one before the other breaks? An increasingly large swath of businesses are realizing that the cloud-plus-data-centers model really provides the best of both worlds, and integrating the public virtual cloud with the physical data center is the best way to cost effectively scale, secure, and serve modern production workloads.
Tags : 
    
RagingWire Data Centers
Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. While these remain important aspects of an effective security plan, they are part of a broader, more integrative approach to security in today’s dynamic environment. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. This paper has examined the elements and organization of a holistic approach to security. Digital Realty views security as an integrated process, consisting of the subprocesses of physical security, information security, incident management, business continuity and compliance, enabled by the systems, processes and people providing quality of delivery and reliability of performance. Absent any of these elements, security becomes a series of loosely related tasks lacking in cohesive effectiveness.
Tags : 
    
Digital Realty
Published By: Verne Gloabal     Published Date: Mar 30, 2016
Today’s CIO faces a host of challenges and new trends. Budgets are tight and in many cases decreasing. At the same time, IT is becoming more strategic as the amount of data created is exploding and the value of accessing that data in real time is continuously increasing. Much of this data must be mined and acted upon instantaneously while it is still of value, requiring the application of bigger and more powerful data centers.
Tags : 
    
Verne Gloabal
Published By: CommScope     Published Date: Apr 15, 2016
This technical paper provides an overview of the most prevalent networking and storage applications in modern data centers. Additionally, it offers information about the different structured cabling systems capable of running these applications and also functions as an application reference book for network cabling designers in data centers.
Tags : 
    
CommScope
Published By: CyrusOne     Published Date: Jul 02, 2016
Even through challenging economic times, the need for physical data center capacity continues to grow. For some businesses, the driver is expansion into new markets or geographies. For others, it's the need to deal with growing amounts of data generated by applications with high-capacity demands, evolving end-user abilities, or regulatory bodies that demand ever-increasing quantities of meticulous documentation. The "build-or-buy" decision between construction and colocation should be weighed carefully, as the choice will affect your company and your bottom line quite literally for decades. This executive report will review six key factors that affect that choice, some of which extend beyond a basic TCO analysis.
Tags : 
    
CyrusOne
Published By: Legrand     Published Date: Aug 09, 2016
The need for the “Connected Infrastructure of Tomorrow” is approaching faster than you think. With the Internet of Things (IoT) there are new and critical considerations to think about as one prepares for what’s ahead. Are you ready for it? To start planning and preparing now for tomorrow’s network, we have to understand the requirements for power, light and data today. We have to be smart about the future1. What will the world we live, play and work in be like 10-15 years from now? One can only guess, but there are some important things to consider today, when we design the infrastructure to support tomorrow’s needs being driven by billions of IoT connected devices.
Tags : 
    
Legrand
Published By: Intel     Published Date: Dec 31, 2015
A recent survey of 200 data center managers across the US and UK reveals that a large proportion of centers take a manual approach to planning and forecasting. Despite its limitations, MS Excel emerges as a popular tool and nearly one in ten resort to walking around a data center with a tape measure. Only just over half are able to benefit from using Data Center Infrastructure Management (DCIM) tools. The manual approach is not limited to smaller data centers by any means; the proportion was found to remain the same even amongst the larger data centers (with above 1,500 servers). When asked why manual methods were employed, 46% said it was because they felt that the alternatives would be too expensive. A further 35% feared they lacked the resources to implement a more automated approach. Whilst both these factors may seem reasonable enough at first sight, both might actually represent false economies in the longer run.
Tags : 
    
Intel
Published By: Emerson Network Power     Published Date: Mar 18, 2016
Ponemon Institute and Emerson Network Power are pleased to present the results of the first Emerson Data Center IQ Quiz, part of the Data Center Performance Benchmark Series, which provides an industry-wide perspective on Availability, Security, Productivity, Cost and Speed of Deployment. The purpose of this study is to determine the domain knowledge of data center personnel while also collecting data on application of best practices and current operating conditions within participants’ data centers.
Tags : 
    
Emerson Network Power
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 16, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com