Servers

There's no shortage of ways to design infrastructure to solve a specific problem. Look at server choices and ways to maintain them.

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • Downloads // Sep 2014

    Your FREE 60-Day Trial Starts Here

    Get instant access to the Brocade Vyatta 5400 vRouter. Download your free virtual router trial now and enjoy 24/7 support. KEY FEATURES INCLUDE: Advanced IPv4 and IPv6 Unicast and Multicast Stateful firewall, IPsec, SSL-Based OpenVPN and DMVPN Linux-based extensible network OS Hypervisors Supported: VMware ESX, Citrix...

    Sponsored By Brocade

  • Downloads // Sep 2014

    You're A Few Steps Away From Future-Proofing Your Career

    Prepare for the future of networking today with free 60-day trial software, web-based training, and a Brocade Network Function Virtualization Certification ($650 value). BE A BROCADE CERTIFIED PROFESSIONAL NOW. Build your skills by creating a virtualized network with the Brocade Vyatta vRouter Stay ahead of the industry's...

    Sponsored By Brocade

  • White Papers // Aug 2014

    Promise Healthcare Case Study

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    What to Look For When Evaluating NGFW

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • eBooks // Oct 2013

    3 Compelling Reasons to Consider Desktop Virtualization

    If you have already experienced the benefits of server virtualization, it is time to find out what you can gain by extending virtualization to your desktops. In this eBook, find out how other VMware customers have extended their virtualization deployment to end-user computing and have uncovered significant benefits, such as...

    Sponsored By VMware

  • White Papers // Jul 2014

    Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

    This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

    Sponsored By Global Knowledge

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Sponsored By Symantec

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Announcing the New Intel Parallel Studio XE 2015

    Intel Parallel Studio XE 2015 is an advanced, comprehensive tool suite that simplifies debugging and tuning, and speeds development. Available in C, C ++, and FORTRAN. Speed time to market: Composer Edition: Includes industry-leading compilers and libraries that are optimized for creating fast parallel code. Professional Edition: Everything in...

    Sponsored By Intel Software

  • White Papers // Aug 2014

    Why Threat Intelligence is Critical for Next Generation Firewalls

    A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

    Sponsored By Dell Software

  • White Papers // Sep 2014

    Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

    IT Managers and administrators constantly seek strategies on how to holistically manage and orchestrate server and networking infrastructure and the software stack. Download this Information guide on best practices to optimally manage the data center using systems management tools from Cisco and Microsoft.

    Sponsored By Cisco Systems

  • White Papers // Jun 2014

    How CA Technologies Safeguards Competitive Advantage with Proactive Cloud and Web Application Monitoring

    Find out how CA Application Performance Management Cloud Monitor enables the IT team to replicate customer transactions from over 60 global locations to identify potential problems thus ensuring a consistent user experience and quickly resolving any performance problems.

    Sponsored By CA Technologies

  • White Papers // May 2014

    Making the Real-Time Enterprise a Reality

    Organizations are transforming not only their systems, cultures, and processes to take advantage of an increasing volume of data collected in the moment. They’re reinventing the enterprise not simply so they can react to business demands in real time but also to anticipate changes before they occur.

    Sponsored By SAP

  • White Papers // Jan 2014

    Improve Mac Integration in your Organization - Recent Benchmark Study:

    Integrating Macs into your organization’s Windows environment can be tricky since they communicate differently. You need a solution that can access Windows file server information from Mac OS X clients quickly and seamlessly to provide users with the access and performance they need. This exclusive resource examines a solution for...

    Sponsored By Acronis

  • White Papers // Jan 2012

    Virtualization and Cloud Computing: Optimized Power, Cooling, and Management Maximizes Benefits

    IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure (DCPI). Higher power densities that often result can challenge the cooling capabilities of an existing system. Reduced overall energy consumption that typically results from physical server consolidation may actually worsen the data center's...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2014

    Data Center Temperature Rise During Cooling Outages

    The data center architecture and its IT load significantly affect the amount of time available for continued IT operation following a loss of cooling. Some data center trends such as increasing power density, warmer supply temperatures, the “right-sizing” of cooling equipment, and the use of air containment may actually increase...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    Implementing Energy Efficient Data Centers

    Electricity usage costs have become an increasing fraction of the total cost of ownership (TCO) for data centers. It is possible to dramatically reduce the electrical consumption of typical data centers through appropriate design of the network-critical physical infrastructure and through the design of the IT architecture. This paper explains...

    Sponsored By APC by Schneider Electric

  • White Papers // May 2014

    Multifunction Device Buyer's Guide

    A buyer's guide that evaluates in choosing a multi-function device and clearly define requirements. Read this report and learn how to address the benefits in total cost of ownership.

    Sponsored By Fuji Xerox

  • White Papers // Jan 2014

    Sharing Mac Files on Windows Servers - A Technical Best Practices White Paper

    This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing the Acronis’ ExtremeZ-IP® solution for the first time.

    Sponsored By Acronis

  • White Papers // Jul 2014

    Windows Phone 8.1 in the Enterprise

    When Windows Phone 8 was first launched, the majority of its platform innovations were focused on delivering a robust end-user experience. Strong support for Microsoft productivity tools made Windows Phone an attractive option for business users, but not all enterprises were ready to fully embrace the new platform. While it...

    Sponsored By MobileIron

  • White Papers // Aug 2014

    The Practitioner’s Guide to the VMware vCloud Suite: Top Five Questions

    This paper gives an overview of the editions, and addresses the top five questions asked by practitioners who want to better understand and effectively use the capabilities of vCloud Suite. Read more...

    Sponsored By VMware

  • White Papers // Aug 2014

    Unrivalled Cloud Stories

    See how IT leaders in public and private sector organisations across Europe are delivering transformational results by building on the virtualization investments they’ve already made. Read more...

    Sponsored By VMware

  • White Papers // Aug 2014

    See The Next Evolution Of Virtualization In Action

    Thinking about virtualizing your data centre to achieve new cost savings and agility benefits? Then take a closer look at the amazing management and performance advantages that only vSphere with Operations Management delivers. Read more...

    Sponsored By VMware

  • White Papers // Aug 2014

    Migration Away From Windows XP: the Imperative for Change

    As many of you already know, support for Windows XP is coming to an end – but what does this really mean for your organization? Read this exclusive white paper to prepare for the end of Windows XP support.

    Sponsored By VMware

  • White Papers // Jun 2014

    Desktop Virtualization for Wealth Management and Insurance

    The computer desktop has been in existence for a little over 30 years, but in the last 10 years it has moved to notebooks and increasingly towards smart mobile devices. Now with advancements in technology, the desktop is increasingly found in the cloud thanks to virtual desktop infrastructure.

    Sponsored By VMware

  • White Papers // May 2014

    Why Data Domain: Slow backups got you down?

    Traditional backups are just too slow, inefficient and unreliable for the typical data centre of today. If it’s bad now, it’s only going to get worse with more severs and more data to protect. Someone once said, the definition of insanity is continuing to do the same thing over and...

    Sponsored By EMC

  • White Papers // Sep 2014

    Mitigating Targeted Attacks Requires Integrated Solutions

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organisations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    NSS Lab Comparative Analysis Report (Security Effectiveness)

    Implementation of breach detection systems (BDS) can be a complex process with multiple factors affecting the overall security effectiveness of the solution. These should be considered over the course of the useful life of the solution, and include Detection rate and Device stability and reliability. In order to determine the...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Harvard Business Review: Using Frameworks to Defend Against Cyber Attacks

    IT and Business Managers are scared of targeted attacks on their data and systems, but the fact that senior decision makers are unsure or sceptical of the exact business risks and impacts of such attacks makes it harder to secure funding to be prepared and fight them.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Osterman: Why a New Business Model is needed for SSL Certificates

    This Osterman research paper discusses why there are three fundamental problems with the current state of SSL; SSL is underutilised as a way to increase security and business, there have been numerous security breaches, the current certificate acquisition model is fuelling the problem and focuses on why a new business...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Evolving Data Centres: Defending Against Data Breach Attacks

    Enterprises transform IT structures to include virtualisation and cloud computing because they reduce company costs and optimise resource utilisation. Adopting these new platforms, however, opens new windows of exposure that attackers may leverage in data breach attacks.

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Best Practices for Security and Compliance with Amazon Web Services

    Researchers predict cloud security will become one of the primary drivers for adopting cloud computing. The Gartner Global IT Council for Cloud Services Report revealed that over 50% companies cited security as their top concern for transitioning to the cloud.This paper will discuss what part of the shared responsibility equation...

    Sponsored By Trend Micro

  • White Papers // Sep 2014

    Testing Times for Ecommerce

    For development organizations to remain competitive, their developers and testers require an enterprise-class solution that delivers automated software application performance and load testing. In this whitepaper, learn how to deliver realistic, dependable performance tests across the latest technologies, including front and back-office systems, by simulating loads and network speeds for...

    Sponsored By Micro Focus

  • eBooks // Sep 2014

    Blue Coat's Encrypted Traffic Management Interactive E-Guide

    According to Gartner, 50% of ALL network attacks will hide in SSL by 2017. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points. This is creating a significant data security, privacy and compliance risk for businesses. Get up to...

    Sponsored By Blue Coat Systems