it racks

Results 76 - 100 of 100Sort Results By: Published Date | Title | Company Name
Published By: Raritan     Published Date: Oct 07, 2015
In the following sections we will discuss the basic concepts, considerations and approaches in designing, selecting and deploying the appropriate rack PDU for typical data center applications.
Tags : 
raritan, pdu, data center, data center applications, racks, servers, data center power
    
Raritan
Published By: Lenovo and Intel®     Published Date: Sep 12, 2018
IT teams today are under pressure to build on-premises environments that mimic the agility and flexibility of public cloud services. It’s a challenge for IT teams to choose the right technology to invest in for servicing on-premises workloads. With high automation and minimal configuration or management, composable infrastructure fast tracks IT modernization by aligning IT delivery and operations, giving seamless access to dynamic, automated resources that can react in real-time.
Tags : 
    
Lenovo and Intel®
Published By: Eaton     Published Date: Jun 01, 2012
Though power protection solutions vary in numerous ways, all but the largest data centers use basic approaches when deploying uninterruptible power systems (UPSs): Either they distribute many smaller UPSs among their server racks or they install one or two large UPSs centrally within or near their server room. This white paper outlines each architecure's pros and cons.
Tags : 
uninterruptible power system, ups, power back up strategy, distributed power back up scheme, centralized back up scheme, white space, hybrid back up strategy
    
Eaton
Published By: Citrix     Published Date: Apr 16, 2014
Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.
Tags : 
data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades
    
Citrix
Published By: Citrix     Published Date: Apr 16, 2014
Read how Citrix NetScaler 10, the latest version of one of the industry’s most respected ADCs, is the first such appliance to support active-active clustering.
Tags : 
adc, citrix, netscaler, clustering, ssl, load balancing, data center, racks
    
Citrix
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Unitek Education     Published Date: Jan 08, 2009
Unitek's CCNA boot camp is taught by a certified industry expert, who is adept at not just CCNA curriculum, but also teaches CCNP and CSP1 (Cisco high-end security track) tracks. The instructor is also a Unitek consultant, and spends a significant portion of his time providing high-end network infrastructure consulting services. A true industry expert!!
Tags : 
unitek, ccna, ccna boot camp, ccna curriculum, cisco high-end security track, network infrastructure, cisco ccna
    
Unitek Education
Published By: Symantec     Published Date: Dec 04, 2014
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks.
Tags : 
web servers, code-signing, malware, software, code-signing certificates, best practice
    
Symantec
Published By: Symantec     Published Date: Dec 28, 2015
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.
Tags : 
code signing certificates, enterprise security, web servers
    
Symantec
Published By: Online Marketing Summit     Published Date: Apr 21, 2010
Register for this free virtual event on Thursday, May 27th with the best and latest online marketing educational content including best practices, case studies, research and more. You can expect: *Seven tracks covering all major domain of online marketing, including Social Media, Search Engine Marketing and Optimization, Web Analytics, Mobile, Email and Demand Generation; * Content for all skill levels from the online novice to the eMarketing expert, there are sessions that will benefit all corporate, brand and online marketers; *Online marketing education kiosks and learning centers provide you additional access to 1-on-1 consultations, whitepapers and webcasts; *Live Q&A at the end of each session. Speakers and expert practitioners further explain the tactics learned in the session, answering questions and providing live support. Virtual Peer Networking gives you the opportunity to network, collaborate and share ideas with strategic marketers from leading companies around the world, so register now!
Tags : 
oms, online marketing summit, online marketing, emarketing, strategic marketing
    
Online Marketing Summit
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
    
Ecora Software
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This Technology Brief is divided into two parts. The first part discusses the evolution of Ethernet, and then focuses on 10 Gigabit Ethernet and related transceiver and cabling technologies. The second part examines BLADE’s RackSwitch product line, including 10 GbE applications within enterprise networks and data centers.
Tags : 
enterprise data centers, blade’s rackswitch, 10gbe applications, enterprise networks, blade network technologies, evolution of ethernet, cabling technologies
    
BLADE Network Technologies
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
In this Product Brief, Clabby Analytics examines BLADE’s “rackonomics” concept (the idea that putting switches into blades and racks is more economical than using external core switches) — and its two new RackSwitch offerings (the G8000 and G8100) designed to implement its rackonomics view.
Tags : 
rackonomics, overloaded networks, blade network technologies, rackswitch, g8000, g8100, cisco, external core switches
    
BLADE Network Technologies
Published By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : 
it service management, itsm, itsm solutions, itsm tools, itam tools, itam solutions, it ticket management system, it workflow
    
Samanage
Published By: eDataSource     Published Date: Jun 15, 2015
Deliverability is the crucible of email marketing. Nothing good can happen when your email doesn’t even get to your customer’s inbox. eDataSource tracks and reports on deliverability with its Inbox metric, which nets out spam events against mailing quantity. eDataSource sees the full range of Inbox Placement performance, based on our visibility into the email activity of 53,000 brands and their customers engagement with those emails. Email marketers who’ve achieved Inbox Placement rates of at least 95% are thought to be doing pretty well. Still, we often see Inbox Placement rates in the 80s for overall brands, and in the 20s, or even less, for certain individual campaigns.
Tags : 
    
eDataSource
Published By: Rackspace     Published Date: Mar 28, 2018
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an affordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications.
Tags : 
    
Rackspace
Published By: Lenovo and Intel®     Published Date: Sep 04, 2018
IT teams today are under pressure to build on-premises environments that mimic the agility and flexibility of public cloud services. It’s a challenge for IT teams to choose the right technology to invest in for servicing on-premises workloads. With high automation and minimal configuration or management, composable infrastructure fast tracks IT modernization by aligning IT delivery and operations, giving seamless access to dynamic, automated resources that can react in real-time. In this white paper, learn how composable infrastructure, powered by the Intel® Xeon® Platinum processor, can deliver the cloud-level efficiency and flexibility required for competitive business differentiation.
Tags : 
    
Lenovo and Intel®
Published By: Oracle     Published Date: Sep 30, 2019
Consider a typical visit to a brick-and-mortar retail store. As you search through the racks, deciding what to buy, what type of salesperson do you hope for? Someone aggressive, continuously asking if you’re ready to make a purchase? Or someone who’s never there when you have a question, no matter how hard you look? Ideally, most customers would say, the perfect salesperson falls somewhere in between. Someone who’s ready to jump in with assistance, but happily follows your cue. Thanks to years of shopping in stores, consumers today know exactly what they want from that brickand-mortar experience—and savvy retailers know how to train their salespeople to get it right. But what about a different shopping situation? What type of experience attracts or repels online shoppers? And what do digital retailers need to do in order to deliver the experience that compels customers to buy? With so many retailers to choose from, modern consumers don’t need to put up with a digital experience the
Tags : 
    
Oracle
Published By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
Noble Group needed to revamp its IT approach to support its technology and global business, which had in-house apps spread across 1,000 different servers around the world. Having worked with Rackspace previously, it had confidence in Rackspace’s expertise in IT transformation, and decided to take up its managed public cloud services for Microsoft Azure, and professional services for cloud migration, performance and scalability. Yet, this resulted in greater gained cost-savings and increased agility, as Noble moved its massive workloads to the Azure cloud with round-the-clock expertise from Rackspace. This proved to be a wise choice. To adapt to Noble Group’s fast changing business model, Rackspace needed to migrate 60 percent of its resources from on-premises infrastructure to Azure, following eight months of planning. At the end of the cloud migration, Noble Group successfully reduced the 2,000 servers from its infrastructure to just 200 servers.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
IT transformation is more than a one-time migration of applications to the cloud, because the cloud isn’t a destination in itself. Successful migration is the start of an ongoing process of evolving your applications to take advantage of new native capabilities, as they become available on your chosen cloud platform. This e-book illustrates the iterative process of cloud adoption by following the IT transformation journey of a fictitious company, Mercurial Footwear, in its adoption of Microsoft Azure Infrastructure-as-a-Service (IaaS). The various stages of this transformation — from a simple lift-and-shift to the cloud to leveraging cutting-edge technologies like containers and serverless computing — are typical of the process that Rackspace helps its customers to navigate through. With step-by-step explanations, the e-book will provide you with insights into the way cloud architecture evolves, to help you to better take advantage of the Platform-as-a-Service (PaaS) features most re
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
Today, it isn’t a matter of if you’re taking SAP to the cloud – but a matter of when, and how you’re going to make it happen. Because by moving your SAP workloads to the cloud, you are putting them together with other data streams, advanced analytics and machine learning, to create a powerful combination to better engage customers, empower employees, optimize operations and transform products. This e-book introduces Rackspace as the managed cloud service provider to partner, for moving SAP workloads to Azure. Being certified in all the leading SAP technologies, including hosting services, HANA Operations and HANA Enterprise Cloud (HEC) – and having been awarded Microsoft Hosting Partner of the Year five times – Rackspace has got the whole SAP on Azure solution covered, from planning to deployment and ongoing management. Check out the case studies of global companies, like Rockwell Automation, The Mosaic Company, Malaysia Airlines and Coats & Clark, to discover how they have benefi
Tags : 
    
Rackspace
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Start   Previous    1 2 3 4     Next   End
Search Resource Library