Servers

There's no shortage of ways to design infrastructure to solve a specific problem. Look at server choices and ways to maintain them.

  • Videos // Sep 2014

    Ubuntu Demo – POWER8 Launch Event (feat. Mark Shuttleworth)

    The right IT infrastructure choices are critical to business success, more so than ever before. Mobile, social, cloud, big data and analytics are fueling an explosion of data, and spawning new workloads and business models that are putting unprecedented demands on our IT environments. In this changed world the expectations...

    Sponsored By IBM

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: How IBM achieved an exploit block rate of 95.7% Ratings for stability/reliability and evasion Performance ratings based on "real-world" scenarios

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and...

    Sponsored By IBM

  • White Papers // Mar 2014

    Tolly Test Report: IBM Security Web Gateway Appliance

    The report summarizes the Tolly Group’s evaluation of the performance characteristics of the IBM Security Web Gateway AMP 5100 Appliance. It finds the IBM appliance to be 100% effective in blocking inline-preventable web threats and attacks, as well as being powerful and easy to use.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing User Identities and Access in the Cloud

    This document describes how IBM can help clients design, deploy and manage critical identity and access management controls within cloud environments. IBM is a trusted partner with the broad portfolio and comprehensive security strategy required to enable secure innovation.

    Sponsored By IBM

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • White Papers // Sep 2014

    Performance Benchmark Report 2014

    PassMark Software® conducted objective performance testing on 8 security software products using 13 performance metrics. Find out how Webroot’s SecureAnywhere Business Endpoint Protection product performs against 7 competitor products. Download this research to learn more.

    Sponsored By Webroot

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • White Papers // Sep 2014

    Transforming your voice, video and collaboration - Unified communications for mobile and social collaboration

    A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

    Sponsored By IBM

  • White Papers // Oct 2014

    Cybersecurity's Maginot Line

    This report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures alone. Security teams must be able to see the alerts that matter. And they must complement those with rapid endpoint response expertise to confirm and contain attacks as...

    Sponsored By FireEye

  • White Papers // Apr 2014

    Building a Next-Generation Identity and Access Management Program

    Think for a moment about all the employees, customers and business partners who need access to your enterprise resources—using all sorts of different devices in all sorts of locations. Today’s identity and access management solutions need to do more than just “let the good guys in and keep the bad...

    Sponsored By IBM

  • Downloads // Oct 2014

    Find the Root Cause of Your Toughest SQL Server Performance Issues in 4 Clicks!

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • Downloads // May 2014

    Find, Analyze & Resolve Your Toughest Performance Issues on SQL Server - FAST

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • White Papers // Oct 2014

    Saugatuck Technology - Optimized Sourcing in Hybrid IT Environments

    This research paper from Saugatuck Technology discusses the multi-sourced hybrid IT environment, including how to recognize the things that can increase costs and compromise operations, and how to optimize the environments for peak effectiveness.  

    Sponsored By IBM

  • White Papers // Oct 2014

    2014 Selecting a Managed Security Services Provider: Top 10 Criteria

    A white paper discussing the benefits of outsourcing managed security services and outlining effective strategies, as well as 10 of the most important criteria to consider, when choosing a managed security services provider.

    Sponsored By IBM

  • White Papers // Oct 2014

    Server Managed Services - Integrated Managed Infrastructure

    This service profile provides an overview of Server Managed Services - Integrated managed infrastructure and explains what you can expect from implementation. The paper includes an overview, information on planning and implementation, service delivery, and detailed service descriptions.

    Sponsored By IBM

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    Preparing for IEEE 802.11ac

    This business white paper discusses the history that led to the IEEE 802.11ac standard and the considerations you need to weigh before you decide to deploy it. This new WLAN technology is being introduced in the market in two waves. Topics that will be addressed in this paper are: ...

    Provided By HP US

  • White Papers // Jan 2014

    Moving Virtual Desktops to the Cloud

    Physical desktop computer infrastructures no longer make sense for the corporate world. Not only are they expensive, insecure and maintenance-heavy, they also cannot effectively support the changing business IT landscape. The ground-swell of Windows 7 migration plans, expanding virtual workforce, growing popularity of mobile devices and demand for BYOD (Bring...

    Provided By Desktone

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to radically simplify your...

    Provided By Druva

  • White Papers // Nov 2004

    SQL Server 2000 Enterprise Edition (64-bit): Advantages of a 64-Bit Environment

    HP has partnered with Microsoft to provide information about the advantages of a 64-Bit Environment. Microsoft SQL Server 2000 Enterprise Edition (64-bit) offers dramatic improvements in memory availability and parallel processing performance compared with SQL Server software running in a 32-bit environment. This paper describes the capabilities of the 64-bit...

    Provided By Hewlett-Packard (HP)

  • eBooks // Feb 2014

    Achieve Deeper Network Security and Application Control (ebook)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

    Provided By Dell Software

  • White Papers // Oct 2013

    HP ProLiant DL360p & DL380p Gen8 Servers: Power, Flexibility and Serviceability

    Explore the Power, Flexibility and Serviceability HP ProLiant DL360p and DL380p Gen8 Servers The DL360p and DL380p deliver innovative advances in performance, serviceability and lifecycle automation to address the pressing demands of today’s data-intensive and virtualized IT environments. Based on the HP ProActive Insight architecture, these intelligent servers can...

    Provided By HP & Intel® Xeon® Processor

  • White Papers // Jun 2014

    IBM Server Managed Services Benefit Assessment Tool

    Use IBM's assessment tool to learn how you can increase server efficiency and availability while lowering costs. The IBM Server Managed Services Benefit Assessment helps you identify how an IBM Managed Services solution can: Lower Total Cost of Ownership (TCO) of Server Management Improve Server Resource...

    Provided By IBM

  • Downloads // Sep 2014

    Your FREE 60-Day Trial Starts Here

    Get instant access to the Brocade Vyatta 5400 vRouter. Download your free virtual router trial now and enjoy 24/7 support. KEY FEATURES INCLUDE: Advanced IPv4 and IPv6 Unicast and Multicast Stateful firewall, IPsec, SSL-Based OpenVPN and DMVPN Linux-based extensible network OS Hypervisors Supported: VMware ESX, Citrix...

    Provided By Brocade

  • Downloads // Feb 2010

    Network, PC, and server audit checklist

    IT consultants should complete the fields within this checklist to catalog critical client network, workstation, and server information, identify weaknesses and issues that must be addressed, prioritize the issues the checklist reveals, and assign cost estimates to needed upgrades and repairs. This download is also available as an entry in...

    Provided By Erik Eckel

  • Downloads // Jun 2007

    Price comparison: Zimbra vs. Exchange

    Get a detailed look at how the cost of implementing Zimbra compares to the cost of using Exchange. This worksheet looks at base OS cost, base application cost, total user cost, total upfront cost, and additional yearly cost -- as well as total cost for one through five years.See "Introducing...

    Provided By Justin James

  • Downloads // Apr 2008

    How do I... Install and configure a DNS server in Windows Server 2008?

    As many of you are probably aware, DNS is now the name resolution system of choice in Windows. Without it, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on WINS for name resolution on local area networks and some have little...

    Provided By Steven Warren

  • White Papers // Jan 2014

    The 2014 Firewall Buyers Guide

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: The fundamentals of modern firewall technology The ten critical business requirements your next firewall needs to address Information on how to create a vendor request...

    Provided By Palo Alto Networks

  • Book chapters // Jan 2007

    Use the Group Policy Management Console (GPMC) to view and manage Group Policy in your Active Directory

    If you've done any work at all with Group Policy and Active Directory, you're probably already familiar with the "usual" Group Policy interface, which is "in the box." But there's more. In this sample chapter from Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows...

    Provided By Sybex

  • eBooks // Mar 2014

    Executive's guide to microservers in the data center (free ebook)

    Microservers may not have enough muscle to carry out heavy-duty data center tasks, but they’re good at handling certain lightweight workloads -- saving space and reducing energy costs in the process. This ZDNet/TechRepublic ebook looks at how microservers are being used, their benefits and limitations, and how decision makers are...

    Provided By TechRepublic

  • White Papers // Feb 2008

    Optimizing AIX 6.1 Performance Tuning: Tuning Methodology, General Enhancements, Monitoring, and Tuning

    Just when they thought they understood performance tuning on AIX Version 5.3, here comes AIX 6.1 on its heels to throw they a curveball. In this paper, get up-to-date information on the recent changes to performance monitoring and tuning in AIX 6.1, including CPU, virtual memory, and I/O (disk and...

    Provided By IBM

  • Book chapters // Aug 2006

    Manage computers in Active Directory with these quick and easy recipes

    Learn quick and easy recipes for managing computers with Active Directory in this sample chapter from Active Directory Cookbook, Second Edition, now updated for Windows Server 2003 SP1 and R2 versions. The recipes address common day-to-day tasks: Creating a computer account Creating a computer account for a specific...

    Provided By O'Reilly Media

  • Downloads // Sep 2009

    10 ways to tweak Windows 7 using the Local Group Policy Editor

    You can customize Windows 7 by setting local group policies to control the way the OS looks and acts. Paul McFedries offers 10 handy tweaks.This download is also available as an entry in our 10 Things blog.

    Provided By Paul McFedries

  • Case Studies // Feb 2014

    University of Maryland Case Study

    To enhance IT services for faculty and staff across the United States, University of Maryland University College (UMUC) needed to replace out-of-lifecycle desktop hardware and software quickly and efficiently, and with minimal risk of downtime to staff services. Read this case study to learn how UMUC leveraged new technology and...

    Provided By Dell & Microsoft

  • White Papers // Jan 2013

    Your IT Environment for Today and Tomorrow: What You Need to Know about the New Windows

    Windows 8.1 is ready to give your business the tools you need to meet your workers' changing IT needs in a way that's reliable, productive and secure. Designed to respond equally well to touch as it does to a keyboard and mouse, read this paper to learn more about how...

    Provided By Dell & Microsoft

  • White Papers // Aug 2013

    Top Five Reasons Why You Must Migrate Away From Windows XP Today

    With the end of Windows XP support, a surprising number of organizations have yet to migrate to modern Windows. This white paper highlights some of the top reasons why now is the time to make changes to lower migration costs, assess key application testing and validation, and realize benefits of...

    Provided By Dell & Microsoft

  • White Papers // May 2014

    HP Takes World Record in Virtualization Performance for 4 Processors, 2 Nodes

    The new HP ProLiant DL560 Gen8 offers the ideal 4-processor dense form factor without compromising on performance as proved by the VMmark 2.1.1 world record benchmark result of 18.27 @18 tiles. Utilizing fewer disks drives than competitors, the ProLiant DL560 Gen8 offers customers enormous savings on power and rack real...

    Provided By HP and Intel®