ema

Results 1 - 25 of 4006Sort Results By: Published Date | Title | Company Name
Published By: Aligned Data Centers     Published Date: Oct 12, 2015
The traditional data center model is like the old cable TV and music models, which forced you to buy and pay for all 189 channels and all ten songs, even if you only wanted a few. The evolved data center model, in contrast, is like the new TV and music models – you only buy the show or the song you want. Where the traditional colocation model locks you into long-term contracts for power you may not use, the evolved payfor-use model eliminates the need to forecast IT demand and provides control over capacity. As a result, you reduce waste and align your data center to the needs of your business. Aligned Data Centers is the first to bring this evolved data center model to the marketplace. The pages that follow explain how.
Tags : 
aligned datacenter, evolved datacenter, pay for use model
    
Aligned Data Centers
Published By: Chatsworth     Published Date: May 10, 2016
The modern data center has changed. There are new demands around cloud computing, big data and infrastructure efficiency. This change in the data center is being driven by more users, more data and a lot more reliance on the data center itself. With private cloud technologies and the rapid growth in data leading the way within many technological categories (the Internet of Things), working with the right data center optimization technologies has never been more important. In this white paper, we explore new concepts around data center demand, where energy efficiency and cooling optimization fit in and modern best practices around your data center.
Tags : 
chatsworth, data center optimization
    
Chatsworth
Published By: IO     Published Date: Dec 31, 2015
The case for a re-envisioned data center is being made every day, and at an increasingly urgent pace. Growing technology demands, transforming global economics, corporate efficiency initiatives, and required business agility are among the drivers making change not merely a strategy, but a prerequisite for survival.
Tags : 
    
IO
Published By: Compass Datacenters     Published Date: Mar 02, 2016
The demand for more efficient and cost effective computing has driven organizations large and small to reevaluate their strategies. This examination can incorporate many aspects, encompassing system architecture and software platforms, as well as the IT hardware, and of course the data center facility. Moreover, there are many strategic options for the enterprise CIO and CTO to consider, such as the possibility of direct or indirect ownership and operation of their own data center facility, as well as colocation, cloud, or hybrid combinations thereof. Nonetheless, the IT hardware must ultimately reside in a physical data center that will provide conditioned power and safe environmental conditions for the IT equipment.
Tags : 
    
Compass Datacenters
Published By: RagingWire Data Centers     Published Date: Oct 09, 2015
Today’s modern IT infrastructure is demanding more out of its resources, expansion strategies, delivery methods and disaster recovery methodologies. To help meet these new growing demands, many organizations are turning to colocation providers to help service their data center needs. But what makes up a good data center decision? Is it just the location? What about the bandwidth coming into the site? What about green technologies and the adoption of new unified technologies? The reality here is that there are several key consideration points which need to be made when choosing the right data center colocation solution. Now with cloud computing and a truly distributed, data on-demand, environment, making the right choice has become more important than ever.
Tags : 
    
RagingWire Data Centers
Published By: RagingWire Data Centers     Published Date: Nov 03, 2015
This whitepaper examines some of the short- and long-term issues and challenges that should be part of your due diligence when facing growing demands of your organization’s evolving computing architecture and making major strategic and economic decisions. It also provides guidelines for evaluating the alternative choices, such as co-location and hosted service providers, as well as cloud services, which can all be utilized together for enhanced flexibility.
Tags : 
    
RagingWire Data Centers
Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. While these remain important aspects of an effective security plan, they are part of a broader, more integrative approach to security in today’s dynamic environment. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. This paper has examined the elements and organization of a holistic approach to security. Digital Realty views security as an integrated process, consisting of the subprocesses of physical security, information security, incident management, business continuity and compliance, enabled by the systems, processes and people providing quality of delivery and reliability of performance. Absent any of these elements, security becomes a series of loosely related tasks lacking in cohesive effectiveness.
Tags : 
    
Digital Realty
Published By: CommScope     Published Date: Apr 15, 2016
The data center has assumed a new, more prominent role as a strategic asset within the organization. Increasing capacity demands and the pressure to support the “always-on” digital business are forcing data centers to adapt, evolve, and respond at an increasingly accelerated rate. Cloud, mobility, IoT, big data – these and other interrelated trends are putting enormous pressure on the modern data center. To keep pace, today’s physical infrastructure has become vastly more complex, interconnected, and performance-driven than a decade ago.-
Tags : 
    
CommScope
Published By: CyrusOne     Published Date: Jul 02, 2016
Even through challenging economic times, the need for physical data center capacity continues to grow. For some businesses, the driver is expansion into new markets or geographies. For others, it's the need to deal with growing amounts of data generated by applications with high-capacity demands, evolving end-user abilities, or regulatory bodies that demand ever-increasing quantities of meticulous documentation. The "build-or-buy" decision between construction and colocation should be weighed carefully, as the choice will affect your company and your bottom line quite literally for decades. This executive report will review six key factors that affect that choice, some of which extend beyond a basic TCO analysis.
Tags : 
    
CyrusOne
Published By: QTS Realty Trust, Inc.     Published Date: Jul 19, 2016
pyright © 2016, Data Center Frontier 3 SPECIAL REPORT Chicago Data Center Market Market Overview & Analysis The Windy City is a major hub for Internet and financial infrastructure, with active communities of data center users and service providers. Chicago is America’s third-largest city, and an active business market with nearly 40 Fortune 500 companies headquartered in the metro area. Chicago is distinctive in that it sees demand for data center space from a wide range of industries. It is home to major trading exchanges for stocks, commodities and options, making the city a hotbed of activity for the financial services industry. The region has also become a favored location for hosting, colocation and cloud computing companies. Chicago sees strong demand from the enterprise sector as well, both for primary data centers and as backup/disaster recovery facilities.
Tags : 
    
QTS Realty Trust, Inc.
Published By: Intel     Published Date: Dec 31, 2015
A recent survey of 200 data center managers across the US and UK reveals that a large proportion of centers take a manual approach to planning and forecasting. Despite its limitations, MS Excel emerges as a popular tool and nearly one in ten resort to walking around a data center with a tape measure. Only just over half are able to benefit from using Data Center Infrastructure Management (DCIM) tools. The manual approach is not limited to smaller data centers by any means; the proportion was found to remain the same even amongst the larger data centers (with above 1,500 servers). When asked why manual methods were employed, 46% said it was because they felt that the alternatives would be too expensive. A further 35% feared they lacked the resources to implement a more automated approach. Whilst both these factors may seem reasonable enough at first sight, both might actually represent false economies in the longer run.
Tags : 
    
Intel
Published By: Dell     Published Date: Feb 07, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Pure Storage     Published Date: Jan 12, 2018
Interest in machine learning has exploded over the past decade. You see machine learning in computer science programs, industry conferences, and the Wall Street Journal almost daily. For all the talk about machine learning, many conflate what it can do with what they wish it could do. Fundamentally, machine learning is using algorithms to extract information from raw data and represent it in some type of model. We use this model to infer things about other data we have not yet modeled. Neural networks are one type of model for machine learning; they have been around
Tags : 
learning machines, automated intelligence, scalars, vectors, mathematics, classification, pure storage
    
Pure Storage
Published By: Mimecast     Published Date: Jan 05, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Union’s General Data Protection Regulation (GDPR)? If email isn’t a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: • Why you can’t compromise when it comes to protection of email data • The challenges presented by Subject Area Requests • How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Get enterprise-class encryption to help meet regulatory demands and secure data in on-premises, cloud and hybrid cloud environments.
Tags : 
encryption, regulatory demands, ibm encryption
    
Group M_IBM Q1'18
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: APC by Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
APC by Schneider Electric
Published By: APC by Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
APC by Schneider Electric
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Mimecast     Published Date: Jan 19, 2018
Any digital device or application can be a vector for a cyberattack, but email is an especially acute problem for many organizations. As individuals or members of organizations, most people rely on email to communicate with colleagues, whether in the next cubicle or across the globe. For many in the business world, 24/7 access to email is routine, and often required. Instant, ubiquitous and inexpensive communication gives us quick access to others in our business and personal lives, but gives criminals easy and direct access to us as well.
Tags : 
phishing, email threats, cyberattack, email protection
    
Mimecast
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing. To make the most of these next-generation applications, you need a next-generation database. It must handle a massive volume of data while delivering high performance to support real-time analytics. At the same time, it must provide data availability for demanding applications, scalability for growth and flexibility for responding to changes.
Tags : 
database, applications, data availability, cognitive applications
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. This e-book presents six reasons why you should consider a database change, including opinions from industry analysts and real-world customer experiences. Read on to learn more.
Tags : 
database, streamlining, it infrastructure, database systems
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Nov 08, 2017
In this paper, you'll learn how organizations are adopting increasingly sophisticated analytics methods, that analytics usage trends are placing new demands on rigid data warehouses, and what's needed is hybrid data warehouse architecture that supports all deployment models.
Tags : 
data warehouse, analytics, ibm, deployment models
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com