Servers

There's no shortage of ways to design infrastructure to solve a specific problem. Look at server choices and ways to maintain them.

  • White Papers // Nov 2014

    EMC VNX Case Study: SK Telecom

    See how EMC VNX technology helped a leading global communications company to improve customer satisfaction by enhancing communication services and making the smart device environment more flexible and responsive.

    Provided By EMC

  • White Papers // Nov 2014

    Unleash the full power of Flash

    Harness the power of flash storage by building in innovations, like content based data placement and dual-stage metadata.

    Provided By EMC

  • White Papers // Nov 2014

    Make an informed flash decision

    Discover how to make all-flash array a reality. Performance, agility, scale, reliability, and advanced capabilities come together to transform IT operations as never before.

    Provided By EMC

  • White Papers // Nov 2014

    EMC’s Comprehensive Flash Strategy

    How fast is fast enough!? Discover how EMC is demonstrating, once again, its core competency for dramatic—and necessary—change within the flash storage space.

    Provided By EMC

  • White Papers // Nov 2014

    Flash: The disruptive technology powering your mobile life

    Did you know 78% of CMOs and CTOs think that custom content is the future of marketing? Learn how flash technology is transforming industries today.

    Provided By EMC

  • White Papers // Nov 2014

    Redefine Flash

    Find out why XtremIO is the industry’s leading solution, unmatched in the all-flash array market.

    Provided By EMC

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Provided By Symantec

  • White Papers // Oct 2014

    Cybersecurity's Maginot Line

    This report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures alone. Security teams must be able to see the alerts that matter. And they must complement those with rapid endpoint response expertise to confirm and contain attacks as...

    Provided By FireEye

  • White Papers // Oct 2014

    Providing Enterprise-ready and Cost-Effective Extranets with SharePoint

    These days, extranet access for employees, partners, vendors, and clients is vital. Most organizations are already using SharePoint to facilitate internal collaboration, so using SharePoint for extranet collaboration as well seems like a \"No-brainer\". That's because the same things that make SharePoint a great intranet platform also make it a...

    Provided By PremierPoint Solutions

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • White Papers // Oct 2014

    DBAs: Control the Cloud

    DBAs know that staying vital in their profession means working with, and in, the cloud. In this new white paper, see how DBAs can avoid “database isolation management,” and how a broad perspective gives DBAs control over any database environment . Get this paper today.

    Provided By Dell Software

  • White Papers // Oct 2014

    Ovum Decision Matrix: Selecting a Virtualization and Cloud Management Solution

    This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective. It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled. Learn...

    Provided By HP

  • White Papers // Oct 2014

    Ovum InfoGraphic - Tame the Cloud with Cloud Management

    The role of cloud virtualization is expanding into apps, servers, storage and networks. A pain point of Cloud Fragmentation can be resolved with Virtualization and Cloud Management. This infograph helps to explain the features and capabilities, execution and market impact of HP CloudSystem.

    Provided By HP

  • White Papers // Sep 2014

    Performance Benchmark Report 2014

    PassMark Software® conducted objective performance testing on 8 security software products using 13 performance metrics. Find out how Webroot’s SecureAnywhere Business Endpoint Protection product performs against 7 competitor products. Download this research to learn more.

    Provided By Webroot

  • White Papers // Sep 2014

    Ovum Report: New Versions of IBM Notes and Domino Show Microsoft the Way Forward

    Ovum's assessments of IBM's collaboration portfolio over the last four years have put IBM ahead of the field in terms of technical capability. Read how Ovum believes this momentum will translate to improved market leadership for IBM Notes and Domino as well.

    Provided By IBM

  • White Papers // Sep 2014

    The Future of Email and Applications is Social - (RTE)

    A social email and application experience takes advantage of the impact of social networking technologies on business processes and worker expectations.

    Provided By IBM

  • White Papers // Sep 2014

    Case Study- Keolis Orléans

    The Lyon metro; The Lille, Le Mans, or Melbourne tram systems? Keolis helped to design these transport systems and operates them on a daily basis. Keolis Orléans wanted a solution that is able to anticipate business evolution: the number of virtualized desktops will not be known in advance, and the...

    Provided By EMC

  • Research // Sep 2014

    IDC 13G Overview White Paper

    Industries have seen tremendous change in the dynamics of IT datacenters and workloads. But companies require servers that can deliver faster application performance, provide better availability to meet stringent SLAs, handle complex and evolving workloads, and maximize operational efficiency. This white paper also outlines how Dell is delivering improvements in...

    Provided By Dell and Intel®

  • White Papers // Sep 2014

    Get Maximum Benefit from Windows Server 2012

    Microsoft Windows Server 2012 is poised to be the cornerstone of today’s more modern, scalable and functionally advanced IT environment. Getting the maximum benefit from the operating system starts with having a clear understanding of all the potential advantages Windows Server 2012 can provide. Download this CIO Guide to learn...

    Provided By Dell and Intel®

  • Videos // Sep 2014

    Ubuntu Demo – POWER8 Launch Event (feat. Mark Shuttleworth)

    The right IT infrastructure choices are critical to business success, more so than ever before. Mobile, social, cloud, big data and analytics are fueling an explosion of data, and spawning new workloads and business models that are putting unprecedented demands on our IT environments. In this changed world the expectations...

    Provided By IBM

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Provided By IBM

  • White Papers // Sep 2014

    CSO: Safeguarding the Next-Generation Data Centre

    Read this research-based white paper to learn how to build a security solution that addresses the full spectrum of challenges a hybrid data centre faces when securing physical, virtual and cloud environments.

    Provided By Intel Security McAfee

  • White Papers // Sep 2014

    Is your server security system leaving you hanging in the cloud?

    Are you in need of a server security system that can protect your cloud servers, as well as physical and virtual environments? The new McAfee Server Security Suite can.

    Provided By Intel Security McAfee

  • White Papers // Sep 2014

    McAfee on Top

    AV-TEST performed a comparative review of three leading Endpoint Protection solutions to determine how they fared on proactively protecting against kernel-mode and MBR rootkits, the so called "day zero attacks". Once again, McAfee achieved the highest scores.

    Provided By Intel Security McAfee

  • White Papers // Sep 2014

    A Buyers Guide to Endpoint Protection Platforms

    Endpoint protection platforms offer a diverse array of features. Leading analyst firm Gartner produced a comprehensive guide to help you pinpoint the solution which best prioritize their requirements to address the needs of your specific business, technical and regulatory environment.

    Provided By Intel Security McAfee

  • White Papers // Sep 2014

    Video: HP 5400R Switch Series

    Watch this three minute video about the key features and benefits of the HP 5400R zl2 Switch Series. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s privacy statement.

    Provided By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    Blog: Infonetics Research on How HP is Best Positioned to Take on Cisco

    Infonetics Research’s report titled “Data Center and Campus Ethernet Switch Vendor Leadership: North American Enterprise Survey” provides insight on IT decision makers opinions about switch vendors, factors considered during product evaluation, and deployment plans. The results of the survey showed HP making a strong showing in enterprises that are evaluating...

    Provided By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    HP Powers Test Equipment for The Technology Revolution

    Read what the Director of IT Infrastructure at Teradyne has to say about HP’s solutions for his company. Teradyne is a leader in the field of automatic test equipment, with business lines that develop test solutions for wireless products, semiconductors and systems. HP is the sponsor of this material....

    Provided By Hewlett-Packard (HP)

  • White Papers // Sep 2014

    Process Powered Change Management - Japanese

    Deliver change with accuracy and speed. This new infographic shows how companies have achieved 50% improvement in speed and accuracy with server change management. Get more facts and insights by downloading the infographic now.

    Provided By HP

  • Research // Sep 2014

    Secrets of Effective Server Change Management - Japanese

    Take control of change. Only 23% of IT organizations have an acceptable change-related incident rate. Download HP’s new eBook and learn how to dramatically decrease the number of incidents caused by poor server change management.

    Provided By HP

  • Research // Sep 2014

    効果的なサーバー変更管理の秘けつ

    変更管理において主導権を握ることはきわめて重要です。許容できる変更関連インシデント発生率を達成しているのは、IT組織のうちわずか23%に過ぎません。 HPの新しい電子ブックでは、不適切なサーバー変更管理に起因するインシデント発生件数を大幅に削減する方法をご紹介しています。ぜひダウンロードしてご一読ください。

    Provided By HP

  • White Papers // Sep 2014

    Disposing of Digital Debris: Information Governance Strategy and Practice in Action

    Read this report from the Compliance, Governance and Oversight Council (CGOC) to learn how to reduce costs and increase performance by disposing of digital debris.

    Provided By IBM

  • White Papers // Sep 2014

    Testing Times for Ecommerce

    For development organizations to remain competitive, their developers and testers require an enterprise-class solution that delivers automated software application performance and load testing. In this whitepaper, learn how to deliver realistic, dependable performance tests across the latest technologies, including front and back-office systems, by simulating loads and network speeds for...

    Provided By Micro Focus

  • White Papers // Sep 2014

    Three Ways to Achieve Fast and Affordable IT in an Always-On World

    In this new era, your IT organization needs to meet strict service level agreements (SLAs) while containing the costs of IT operations. This is a difficult proposition. How can you ensure availability, increase performance, and boost ROI all at the same time? In short, you need a comprehensive virtualization...

    Provided By VMware APAC

  • White Papers // Aug 2014

    Is "Scalable Blade" an Oxymoron?

    Blade servers solved the problem of density for businesses, but they did so with compromises that limited their appeal for many applications. As complexity of both applications and environments grew, blade infrastructures were limited in their effectiveness for the task. Customers were relegated to lower-density rack servers for their more...

    Provided By IBM

  • White Papers // Aug 2014

    ESG Lab Validation Report - Best Practices for Virtual Machine Backup and Recovery

    In recent ESG research, more than three-quarters (77%) of respondents reported that they were currently using server virtualization. More often IT organizations struggle to find the best methods for protecting virtual and physical machines. This ESG Lab Validation report looks at achieving best practices for virtual machine backup and recovery...

    Provided By Symantec

  • White Papers // Aug 2014

    Promise Healthcare Case Study

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

    Provided By Dell Software

  • White Papers // Aug 2014

    NGFW Critical to SMB Network

    In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.

    Provided By Dell Software

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Provided By Dell Software

  • White Papers // Aug 2014

    Why Threat Intelligence is Critical for Next Generation Firewalls

    A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

    Provided By Dell Software