systems

Results 1 - 25 of 3036Sort Results By: Published Date | Title | Company Name
Published By: Chatsworth     Published Date: Feb 19, 2016
It is time to finally get over the misconceptions generated by the loud and misleading rhetoric regarding the superior efficiencies of close-coupled and liquid cooled server cabinet solutions, as well as the supposed limits on power densities that can be effectively cooled by air. Passive air cooling can successfully dissipate as much heat as can be generated by commercial servers that can actually fit in a 42-45 U cabinet, and in fact more than most close-coupled and liquid-cooled solutions. In addition, air-cooled solutions that rely on complete isolation between supply air and return air are more efficient than most close-coupled systems and provide access to lower data center cooling costs.
Tags : 
    
Chatsworth
Published By: Chatsworth     Published Date: Feb 19, 2016
Power consumption in the data center continues to be a rising trend. The need to provide redundant power systems with high reliability and availability of compute resources is a major driving force for the increase in power utilization. Some data centers use just as much power for non-compute or “overhead energy” like cooling, lighting and power conversions, as they do to power servers. The ultimate goal is to reduce this “overhead energy” loss, so that more power is dedicated to revenue-generating equipment, without jeopardizing reliability and availability of resources.
Tags : 
    
Chatsworth
Published By: FORTRUST     Published Date: Aug 12, 2015
Data Center Infrastructure Management (DCIM) has become more vital than ever to data center operations as efficiency and technology advancement cycles move at an increasingly rapid pace. The insight provided by these essential systems has historically only been accessible to the data center operations team, not the end user or for that matter – the colocated customer. Now that the technology sector as a whole is becoming increasingly user friendly, transparent and hands on, it makes sense for colocation data centers to offer a higher level of insight and transparency into their clients’ individual environments.
Tags : 
    
FORTRUST
Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. While these remain important aspects of an effective security plan, they are part of a broader, more integrative approach to security in today’s dynamic environment. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. This paper has examined the elements and organization of a holistic approach to security. Digital Realty views security as an integrated process, consisting of the subprocesses of physical security, information security, incident management, business continuity and compliance, enabled by the systems, processes and people providing quality of delivery and reliability of performance. Absent any of these elements, security becomes a series of loosely related tasks lacking in cohesive effectiveness.
Tags : 
    
Digital Realty
Published By: CommScope     Published Date: Apr 15, 2016
This technical paper provides an overview of the most prevalent networking and storage applications in modern data centers. Additionally, it offers information about the different structured cabling systems capable of running these applications and also functions as an application reference book for network cabling designers in data centers.
Tags : 
    
CommScope
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
Hyperconverged infrastructure is radically shaking up the IT landscape, creating huge operational and economic benefits. Tier 1 applications such as Exchange, SQL Server, Oracle and others are among the many beneficiaries of this new generation of infrastructure. However, there are many vendors jumping on the market bandwagon, and not all systems that are marketed as hyperconverged really fit the criteria. IT organizations need to do their homework to ensure they are selecting true hyperconverged solutions.
Tags : 
hyperconverged, infrastructure, virtualized, environments, sql, it landscape
    
Hewlett Packard Enterprise
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Oct 25, 2017
As IT becomes the cloud, and ever more central to business success, projects to transform the IT systems, and more specifically the data center, have become strategic and a competitive differentiator. A crucial piece of the data center transformation puzzle, and one which is too often left until the end, is the network. As the central nervous system of the data center, its transformation must be an integral part of the entire data center transformation project.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper APAC DWA Cloud Leads July 2017
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. Nya möjligheter på utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. Nya möjligheter på utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. Intel otwiera nowe mo?liwo?ci. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. Intel otwiera nowe mo?liwo?ci. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
Flexible and quick fulfillment of online orders has become a differentiator for retailers in the battle for omnichannel customers. But omnichannel fulfillment is expensive and difficult to execute, eroding already thin margins and exposing fragile fulfillment systems. Furthermore, the amount of data that must be processed to ensure the most profitable transaction is more than a fulfillment professional can handle alone, with literally hundreds of decision points to consider.
Tags : 
omni channel, fulfillment, system, retailers, online orders, ibm
    
IBM UK&Ireland
Published By: Dell EMC     Published Date: Aug 22, 2017
GARTNER HAS NAMED DELL EMC AS A LEADER FOR DISTRIBUTED FILE SYSTEMS AND OBJECT STORAGE. This report evaluates Distributed File and Object Storage vendors that help customers deal with the rapid growth in unstructured data. Isilon, the industry leader in scale-out NAS storage, and Dell EMC Elastic Cloud Storage (ECS), were both recognized as leaders in this Gartner report. We believe this recognition demonstrates our industry-leading capabilities to help prepare our customers for their digital future.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 22, 2017
Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. This session by Eric Seidman, Senior Manager, Product Marketing, Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World 2017. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
Tags : 
    
Dell EMC
Published By: Carbonite     Published Date: Oct 05, 2017
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection. IT pros need confidence that the protection they deploy can: •Ensure long-term survivability of historical data •Deliver data securely to different waypoints. •Extend protection as environments change.
Tags : 
data protection, data security, carbonite, data recovery, data resiliency, data backup
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Testing full recoveries of IT environments requires a proven methodology. Establishing and meeting RTOs, configuring a cloud recovery system, and tracking your changing environment are all critical components of a successful cloud recovery operation. In this expert Technical Guide, learn how Jamie Evans, Senior Manager of Disaster Recovery as a Service (DRaaS) for EVault, helps clients complete a full recovery of their systems.
Tags : 
cloud, recovery, vlan, data center, draas
    
Carbonite
Published By: CA Technologies     Published Date: Aug 22, 2017
Effectively supporting these new business demands has become more complex and challenging. The increased use of mobile devices alone is driving exponential growth in transaction volumes. A customer pushes a button on his or her cell phone, for example, to check a bank balance. That single transaction triggers a cascade of transactions as the request is validated and data is accessed, retrieved and then sent back to the customer.
Tags : 
storage, systems, network, applications, data, automation, ca technologies
    
CA Technologies
Published By: Oracle Marketing Cloud     Published Date: Oct 11, 2017
As more and more industries clamor to adopt an Account-Based Marketing program, B2B marketers must re-think how they drive revenue. According to SiriusDecisions, 92% of companies call ABM a B2B must-have—while 84% of B2B marketers say that ABM delivers higher ROI than any other approach. This is good news, but it gets even better. Now you can deliver Account-Based Marketing directly form your Marketing Automation System (MAS) using Demandbase and Oracle Eloqua. Download this infographic to see how you can optimize your ABM and MAS systems, align with sales, and drive revenue for B2B success.
Tags : 
    
Oracle Marketing Cloud
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: OnBase by Hyland     Published Date: May 17, 2017
IT sprawl can be a serious roadblock to your organization's future success, as disconnected information systems and multiple applications get in the way of overall performance. Instead, put sprawl in its place by thinking like an urban planner. In the complimentary e-book, learn how to manage growth with a master plan that uses a single enterprise information platform.
Tags : 
sprawl, application, content, information, management, system, cio, hyland
    
OnBase by Hyland
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com