Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

aci

Results 1 - 25 of 2046Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: May 05, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
datacenters, tco, capacity, modular design, load, cost, architecture, networking
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 05, 2016
This white paper provides a quantitative TCO analysis of the two architectures, and illustrates the key drivers of both the capex and opex savings of the improved architecture.
Tags : 
datacenters, tco, capacity, modular design, load, cost, architecture, networking
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 05, 2016
In this paper, we focus on quantifying the capital cost differences of a prefabricated vs. traditional 440 kW data center, both built with the same power and cooling architecture, in order to highlight the key cost drivers, and to demonstrate that prefabrication does not come at a capex premium.
Tags : 
datacenters, tco, capacity, modular design, load, cost, architecture, networking
    
Schneider Electric
Published By: Schneider Electric     Published Date: Aug 21, 2017
This 12-page white paper describes what a data center reference design is, what it includes, and explains how the benefits listed above are achieved. A data center reference design acts as a starting point offering a project team several valuable benefits including: • Facilitating and simplifying the planning phase • Reducing time to create buildable designs • Reducing risk, offering predictable performance and improved reliability of the data center once operational
Tags : 
data center, design, reference design
    
Schneider Electric
Published By: Anixter     Published Date: Nov 23, 2015
This report tackles the challenges, standards and best approaches to thermal efficiency in existing facilities largely due to them being more prevalent when compared to a new facility. You will be introduced to four best practices that are absolutely critical to achieving an optimal thermal environment. The report also explores the future of datacenter cooling and introduces emerging technologies.
Tags : 
thermal efficiency, data centers, anixter, data center
    
Anixter
Published By: Server Technology     Published Date: Oct 11, 2016
For many enterprises, the data center powering their workflow is located someplace far removed from where the people using it are located. Typically the data center is either close to inexpensive power, or located in a facility that is off campus somewhere not necessarily convenient to those administering and using it. This brief explores remote power management as a way of ensuring that your data center works for you and not the other way around.
Tags : 
networking, it management, data center
    
Server Technology
Published By: Panduit     Published Date: Sep 03, 2015
Capacity planning is one of the most difficult aspects of building a data center today, given the complexity and number of variables to consider. This new White Paper, from leading solutions and innovation provider Panduit, brings fresh insight into the central issues facing data center planners both for initial “build” and for future growth, with valuable “real life” examples drawn from actual customer case studies. Download now to understand how best to: • Avoid capacity fragmentation: identify areas of “lost” or “stranded” capacity • Establish “best fits” for capacity in your center • Maintain equilibrium between the four critical elements of any effective data center management plan • Implement proactive planning: speed decision-making and deployment • Optimize existing resources • Improve data center operations and efficiency • Reduce OPEX • Avoid unnecessary CAPEX by extending the life of your center.
Tags : 
    
Panduit
Published By: Anixter     Published Date: Sep 23, 2015
This report covers the complex nature of powering the data center. The drive for improved efficiencies and managing variable IT capacity requirements are top priorities for all data center operators and managers. The intelligent power chain achieved via the right hardware configuration coupled with intelligence and analytics can provide robust gains in five key areas.
Tags : 
    
Anixter
Published By: Server Technology     Published Date: Oct 26, 2016
A brand new white paper from DCD and Server Technology.
Tags : 
data center, density, capacity, dcd, server technology, pdu, networking, it management
    
Server Technology
Published By: Interxion     Published Date: May 11, 2017
This briefing paper provides IT and business professionals with insights into the impact of the digital transformation on data center strategies. In particular, it argues that, in the cloud-mobile era, workload location matters more than ever and that placing workloads in colocation centers needs to be a component of the data center strategy of a Digital Enterprise.
Tags : 
colocation, enterprise, digital transformation, interconnection, networking, telecom, data center
    
Interxion
Published By: Interxion     Published Date: Aug 17, 2017
This briefing paper provides IT and business professionals with insights into the impact of the digital transformation on data center strategies. In particular, it argues that, in the cloud-mobile era, workload location matters more than ever and that placing workloads in colocation centers needs to be a component of the data center strategy of a Digital Enterprise.
Tags : 
interxion, digital strategy, transformation, data center, colocation
    
Interxion
Published By: Raritan     Published Date: Sep 05, 2016
Sensors are an easy to install, cost-effective way to reduce energy costs, improve reliability, and increase capacity for future data center growth. See why you should be using them.
Tags : 
data center
    
Raritan
Published By: Raritan     Published Date: Sep 07, 2016
Learn how a simple USB port can save you hundreds of thousands by eliminating copper- based network infrastructure costs, facilitating PDU setup and upgrades, and increasing physical security.
Tags : 
usb, raritan, security physical security, network, ports, networking, security, software development
    
Raritan
Published By: Nlyte     Published Date: Nov 16, 2017
The IT professional’s guide to moving beyond spreadsheets and diagrams.
Tags : 
cooling, power, energy, data center, network, infrastructure, capacity, space, series_of_nytle_nam_white_papers
    
Nlyte
Published By: Nlyte     Published Date: Nov 16, 2017
This case study demonstrates a large US government agency's transformation from an aging, nearing-capacity data center into a modern-day facility.
Tags : 
case study, us government, nlyte, energy efficiency, data center, nlyte_nam_case_studies
    
Nlyte
Published By: Server Technology     Published Date: Dec 07, 2015
It has been obvious for some time that the power distribution system within the data center is the key opportunity to focus upon in order to actively manage the rising costs of power and more specifically, identify problems and waste in real-time. With future-thinking organizations sharing knowledge between Facilities and IT, the push for more intelligence within this rack-based power infrastructure has become urgent with higher rack power densities. In fact, proactive power management at all stages in the distribution chain within enterprise data centers has become the requirement to feed efficiency studies and data center infrastructure management (DCIM) style optimization initiatives.
Tags : 
data centers, power, pdus, dcim, data center design and management
    
Server Technology
Published By: Server Technology     Published Date: Aug 03, 2016
Learn how Sentry Power Manager can help with capacity planning & power management & monitoring or Learn how to use Sentry Power Manager to plan for increased capacity in your data center.
Tags : 
networking, security, data center
    
Server Technology
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.