infor

Results 1 - 25 of 4168Sort Results By: Published Date | Title | Company Name
Published By: FORTRUST     Published Date: Aug 14, 2015
When companies evaluate potential data centers and colocation service providers, they normally compare them using some kind of criteria or checklist. However, many such efforts fail to sufficiently evaluate the breadth and depth of detail necessary to make a well informed decision. This white paper examines several key criteria as they relate to service delivery from a data center or colocation provider. Specifically, this paper examines the importance of factors such as risk mitigation, operational processes and service assurance, combined with maintenance and lifecycle strategies that directly contribute to “high-availability service delivery.”
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Aug 14, 2015
THE TOP 10 CRITERIA TO DISCUSS WHEN TOURING A DATA CENTER Choosing a data center or colocation provider to house your company’s critical IT infrastructure is a huge decision. Unfortunately, colocation providers don’t make it easy to differentiate between them. Many data center tours will have the same components: a sales rep will show you their data center’s battery rooms, cooling equipment, security measures, and generators, all the while assuring you that they are highly secure, reliable, well maintained, invulnerable to natural disasters, and capable of high density computing. After a few tours, it may seem as though there isn’t much difference between one data center and the next. This couldn’t be further from the truth. It’s important to know what to look for so you can make an informed decision. Migrating your IT environment is risky, often expensive, and certainly time consuming — you want to make the right choice the 1st time
Tags : 
    
FORTRUST
Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. While these remain important aspects of an effective security plan, they are part of a broader, more integrative approach to security in today’s dynamic environment. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. This paper has examined the elements and organization of a holistic approach to security. Digital Realty views security as an integrated process, consisting of the subprocesses of physical security, information security, incident management, business continuity and compliance, enabled by the systems, processes and people providing quality of delivery and reliability of performance. Absent any of these elements, security becomes a series of loosely related tasks lacking in cohesive effectiveness.
Tags : 
    
Digital Realty
Published By: CommScope     Published Date: Apr 15, 2016
This technical paper provides an overview of the most prevalent networking and storage applications in modern data centers. Additionally, it offers information about the different structured cabling systems capable of running these applications and also functions as an application reference book for network cabling designers in data centers.
Tags : 
    
CommScope
Published By: CyrusOne     Published Date: Jul 06, 2016
CyrusOne’s quick-delivery data center product provides a solution for cloud technology, social media and enterprise companies that have trouble building or obtaining data center capacity fast enough to support their information technology (IT) infrastructure. In trying to keep pace with overwhelming business growth, these companies often find it hard to predict their future capacity needs. A delay in obtaining data center space can also delay or stop a company’s revenue-generating initiatives, and have significant negative impact on the bottom line.
Tags : 
    
CyrusOne
Published By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Schneider Electric     Published Date: Jun 07, 2019
Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : 
refrigeración, construcción de centro de datos, colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Descubra cómo sacar el máximo provecho a su futuro. Este informe puede ayudarle a afrontar los desafíos del futuro, superar las expectativas de sus clientes y encontrar maneras de coexistir con las soluciones competitivas de centros de datos. 451 Research reúne información de los compradores y de quienes toman decisiones sobre el tema de los espacios de colocación, y resume lo que debe hacerse en las empresas de centros de datos de colocación.
Tags : 
colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Volverse más eficiente y más confinable.Para llevar ventaja sobre la evolución de los centros de datos, las empresas necesitan considerar el monitoreo remoto digital. Este informe explica cómo el monitoreo remoto digital afectará estas áreas: • Mejoras en el costo y el rendimiento de sistemas integrados • Ciberseguridad • Computación en la nube • Análisis de macrodatos • Computación móvil • Aprendizaje automático • Automatización para rendimiento laboral.
Tags : 
ciberseguridad, computación móvil, colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
El montaje del marco de pod proporciona ganancias más rápido. Acumule ahorros de CapEx. Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : 
colocación, de centro de datos
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Consideraciones sobre los sistemas de enfriamiento. A medida que los costos de energía y los problemas ambientales ejercen cada vez más presión en los centros de datos, los sistemas de enfriamiento se vuelven el foco para encontrar eficiencias. Se pueden mitigar muchos problemas con un diseño bien planeado. Este informe técnico explica cómo optimizar el enfriamiento de los centros de datos con sistemas de control eficaces. Descargue su copia para aprender más.
Tags : 
colocación, enfriamiento, de centro de datos
    
Schneider Electric
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Beqom     Published Date: Jun 12, 2019
Erhalten Sie Informationen, die sonst gerne übersehen werden und Ihnen dabei helfen werden, erfolgreich in die Digitalisierung einzusteigen. HR und Sales Manager stehen vor der Herausforderung, den Vergütungsprozess zu rationalisieren und gleichzeitig Spitzenkräfte zu gewinnen und diese auch zu halten sowie die Durchsetzung der Geschäftsstrategie und die Einhaltung gesetzlicher Vorschriften zu gewährleisten. Füllen Sie das Formular aus, um sofort unseren kostenlosen eGuide herunterzuladen und zu erfahren, wie die erfolgreichsten digitalen Transformationen von Vergütungsprozessen funktionieren.
Tags : 
    
Beqom
Published By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG
Published By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
    
Intel
Published By: Workday APAC     Published Date: May 08, 2019
Whether informing talent strategy or building more effective teams, data-driven insights about your workforce can set you up for success. This eBook from Human Capital Institute explores how people analytics can empower your entire organization. Read now.
Tags : 
    
Workday APAC
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Fondato nel 1998, IFOM, Istituto FIRC di Oncologia Molecolare è un centro di ricerca dedicato allo studio della formazione e dello sviluppo di tumori a livello molecolare. Nello specifico, il laboratorio di Francesco Ferrari si concentra sull’identificazione e sullo studio di elementi regolatori non codificanti nel genoma e sul modo in cui vengono coinvolti nella regolazione dei processi biologici fisiologici e patologici. Il gruppo utilizza i dati della genomica funzionale (trascrizione, indicatori epigenetici, organizzazione tridimensionale) e altre informazioni genomiche (come il re-sequencing dei pazienti) con metodi di massive sequencing.
Tags : 
    
Infinidat EMEA
Published By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 
    
Zscaler
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com