physical server

Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach. This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
Tags : 
storage, backup, recovery, best practices
    
Commvault
Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: EMC Converged Platforms     Published Date: Oct 22, 2015
Old Dutch Foods, known for its broad selection of snack foods in the midwest United States and Canada, was struggling to get the right products to the right places at the right time. Its data center included outdated physical servers, and batch processing meant that inventory would not be updated until the end of the day as opposed to real time. In addition, recovering from power outages and disk failures could frequently take up to two weeks. To modernize its data center, Old Dutch Foods invested in EMC Converged Infrastructure. The fast and easy deployment of two VCE VBlock® systems running JD Edwards, MS Exchange, mobile device apps, and operation of a backup site with replicated applications and data. This enhanced the IT department's responsiveness to the business, allowed them to shift to real-time inventory, and reduced CapEx and OpEx costs. Operations were simplified by reducing person-hours needed for infrastructure maintenance by 75 percent.
Tags : 
    
EMC Converged Platforms
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Quantum Corporation     Published Date: Sep 11, 2018
Virtualization is rapidly changing the way business IT operates, from small local businesses to multinational corporations. If you are reading this, chances are good that your company is already taking advantage of virtualization’s benefits. Virtualization means that a single underlying piece of hardware, such as a server, runs multiple guest operating systems to create virtual machines, or VMs, with each of them being oblivious to the others. An administrative application, such as VMware, manages the sharing process, allocating hardware resources, memory, and CPU time to each VM as needed. And all applications look at this software construct exactly as if it were a real, physical server — even the VM thinks it’s a real server! Virtualization makes good financial sense. It enables a single server to offer multiple capabilities that otherwise would require separate servers. It includes native high availability features, so you don’t have to use any more complex clustering tools. This ab
Tags : 
    
Quantum Corporation
Published By: Intel Security     Published Date: May 15, 2015
Your physical and virtualized server instances will be vulnerable to any new security threats. Download this how-to guide and start preparing for Windows Server 2003 end of support.
Tags : 
windows server 2003 eos, vulnerability to security threats, windows end of support
    
Intel Security
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Carbonite     Published Date: Apr 09, 2018
IT admins tasked with restoring servers or lost data during a disruption are consumed with a single-minded purpose: successful recovery. But it shouldn’t take an adverse event to underscore the importance of recovery as part of an overall backup strategy. This is especially true with large datasets. Before you consider how you’re going to back up large datasets, first consider how you may need to recover the data. Variables abound. Is it critical or non-critical data? A simple file deletion or a system-wide outage? A physical server running onsite or a virtual one hosted offsite? These and a handful of other criteria will determine your backup and disaster recovery (BDR) deployment. What do we mean by large? A simple question with a not-so-simple answer. If your total data footprint is 5 TB or more, that’s considered large. But what kind of data is it? How many actual files are there? How frequently do they change? How much can they be compressed? It’s likely that two different 5 TB en
Tags : 
    
Carbonite
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
A hardware and software system specifically designed for the database software to optimize database operations, both for performance and administrative simplicity. An environment that supports workload consolidation, thereby reducing the number of physical servers required for the databases in question. Benefits: Reduced cost and optimal performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: Workday     Published Date: Jul 19, 2017
Multi-tenancy is a key feature of Workday and enables multiple customers to share one physical instance of the Workday system in a highly secure environment. Multi-tenancy is enabled through the Workday Object Management Server (OMS). Workday OMS allows servers to host multiple customer tenants simultaneously and builds “security walls” between each of the tenants. Thanks to Workday OMS, there is no way for any worker in one tenant to access the information of another tenant. Workday delivers its software using a continuous development model. Builds are rolled out weekly that contain new features, bug fixes, or performance improvements. Twice a year, Workday takes all the features put into preview and releases them to production for all customers. Workday customers are never landlocked on an old release, and all customers can utilize new features for the products they purchased as soon as they are live.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
Workday
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 23, 2019
For Japan’s largest medical equipment wholesaler, Mutoh, ensuring its 300,000 products reach hospitals, clinics and health-centres on time is an imperative. Someone’s life depends on it. Without IT that wouldn’t be possible. But Mutoh’s IT infrastructure was unable to keep pace with the demands of the business. Every time an order came in, Mutoh had to pull data from different systems across multiple servers which was time-consuming. It needed an IT infrastructure that was fast, high-performing, reliable, stable, and flexible. Mutoh turned to Lenovo’s hyperconverged infrastructure that helped the company achieve: • The ability to seamlessly extract data from different systems across multiple physical servers helped Mutoh respond to customer orders as quickly as possible, thereby saving lives • A modular hyperconverged solution allowed Mutoh to invest on a need basis, improving ROI and addressing spikes in customer demand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: CDW     Published Date: Nov 12, 2012
A flexible and optimized infrastructure requires unshackling computing from physical servers.
Tags : 
agility, it infrastructure, server virtualization, data centers
    
CDW
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Cloud Direct     Published Date: Jan 17, 2018
Azure Site Recovery replicates your on-premises physical servers and virtual machines to Azure. If an outage occurs in your primary location, you failover to the DRaaS platform within minutes and your applications and workloads will be available. When normal operations resume, you can failback to your primary location. For added reassurance, Cloud Direct is a Microsoft Gold Partner. This means in addition to our own 24/7 support, we also benefit from direct access to Microsoft support for a range of hosting scenarios – including SQL Server, Exchange and SharePoint.
Tags : 
business, cloud solutions, data centre, smb, systems, technical
    
Cloud Direct
Published By: Red Hat     Published Date: Dec 15, 2015
If one technology has changed how companies have done business over the past decade, it’s server virtualization. Virtualization has allowed IT to “run faster and jump higher,” offering IT capabilities that are not available with physical servers. While server virtualization is continuing to advance, organizations are still not embracing virtualization whole-heartedly—perhaps not fully convinced that the benefits outweigh the challenges.
Tags : 
    
Red Hat
Published By: Druva     Published Date: Sep 27, 2017
Virtualization tools are providing storage pros with the ability to overcome the limitations of physical servers and gain more flexibility. While hypervisors are allowing them to leap over these boundaries, they’re simultaneously crumbling traditional data protection walls. It’s time to rethink how we handle backup. Inside, discover 8 essential real-world practices to put in place for hypervisor backup, archiving, and disaster recovery.
Tags : 
vmware, virtualization, hypervisors, data protection, archiving, disaster recovery
    
Druva
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.