- Filter by:
-
Content Type
-
Topic
-
Understanding NIST's Cloud Computing Reference Architecture: Part II
This second white paper in a series on Cloud Computing Reference Architecture focuses on the activities, processes, and requirements that cloud players need to follow in order to ensure a successful delivery of cloud services. It addresses the three active cloud players that may be involved in delivering cloud services...
Learn More -
Understanding NIST's Cloud Computing Reference Architecture: Part I
This white paper examines the NIST Cloud Computing Reference Architecture in a two-part series. The first part covers the cloud players and their roles and responsibilities. The second part focuses on the Reference Architecture components, activities, and functions.
Find Out More -
Stakeholder Perceptions Become Your Project Reality
For project managers, meeting stakeholder expectations means that you have to know what the expectations are to begin with if you are ever expected to meet them. After expectations have been set, follow up with your stakeholders to ensure that the expectations haven't changed. People change their minds often, so...
Read More -
PowerVM Virtualization Essentials
PowerVM is the virtualization environment for AIX, Linux, and IBM i running on the IBM POWER hardware platform. This white paper provides an overview of PowerVM concepts, architecture, terminology, and capabilities.
Learn More -
OpenLMI Improves Management in Red Hat Enterprise Linux (RHEL) 7
Included as an integral part of RHEL 7, OpenLMI offers significant gains in managing the wealth of available Linux tools. The fact that the interface can be accessed via multiple languages, including C/C++, Python, Java, and a CLI further enhances its versatility. In addition, the ability to use OpenLMI on...
Read More -
New Topics on the 2014 Security+ SY0-401 Exam
It has been three years since the last revision of the CompTIA Security+ exam. In early summer of 2014, the latest version SY0-401 was released. This revamped exam retains the same six domains as established in SY0-301, which emphasize security in three main areas: application, data, and host. New topics...
Read More -
Five Ways Network Virtualization Will Revolutionize IT
Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity and perhaps even application development. This white paper is written for networking professionals but it may offer valuable insight for those in cross-functional roles such as DevOps, server virtualization, and data center...
Learn More -
How We Define a Network is about to Change, Again
VMware NSX does for networks and physical network components what virtual machines did for data centers and physical servers. It allows you to use them in very different and more flexible ways. In this white paper, you’ll learn how VMware NSX changes the way you build, manage, and secure your...
Learn More -
Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis
Cisco Unified Computing Solution (UCS) has experienced an enormous growth trend in the last several years becoming the standard server hardware platform in many enterprises and cloud service providers alike. One of the main differentiators in Cisco's server solution is the implementation of stateless computing, which allows all the hardware...
Find Out More -
The Packet Delivery Process: Locally Connected Hosts
Moving data from one networked device to another requires several different functions. Each function has its own protocol or protocols that define how it is accomplished. Also, the process of delivering data from one device to another can vary. The main factor in data delivery is determining whether the two...
Find Out More