Skip Links

Network World

Resource Library

  • Realizing the Full Potential of Hybrid Cloud Computing
    Source: EMC
    White Paper: Hybrid cloud merges cloud benefits - agility, elasticity, availability and simplicity - with the flexibility to choose your platform. Read this exclusive survey from EMC and IDG to learn why IT leaders are opting for Hybrid Cloud in growing numbers, and how a vendor partner can help you on your Hybrid Cloud Journey.
  • Virtualization and Cloud Computing: Optimized Power, Cooling, and Management Maximizes Benefits
    Source: APC by Schneider Electric
    White Paper: IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure (DCPI). Higher power densities that often result can challenge the cooling capabilities of an existing system. Reduced overall energy consumption that typically results from physical server consolidation may actually worsen the data center's power usage effectiveness (PUE). Dynamic loads that vary in time and location may heighten the risk of downtime if rack-level power and cooling health are not understood and considered. Finally, the fault-tolerant nature of a highly virtualized environment could raise questions about the level of redundancy required in the physical infrastructure. These particular effects of virtualization are discussed and possible solutions or methods for dealing with them are offered.
  • Practical Options for Deploying IT Equipment in Small Server Rooms and Branch Offices
    Source: APC by Schneider Electric
    White Paper: Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to "close calls" that get management's attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
  • Standardization and Modularity in Data Center Physical Infrastructure
    Source: APC by Schneider Electric
    White Paper: Failure to adopt modular standardization as a design strategy for data center physical infrastructure (DCPI) is costly on all fronts: unnecessary expense, avoidable downtime, and lost business opportunity. Standardization and its close relative, modularity, create wide-ranging benefits in DCPI that streamline and simplify every process from initial planning to daily operation, with significant positive effects on all three major components of DCPI business value - availability, agility, and total cost of ownership.
  • Standardization and Modularity in Data Center Physical Infrastructure
    Source: APC by Schneider Electric
    White Paper: Failure to adopt modular standardization as a design strategy for data center physical infrastructure (DCPI) is costly on all fronts: unnecessary expense, avoidable downtime, and lost business opportunity. Standardization and its close relative, modularity, create wide-ranging benefits in DCPI that streamline and simplify every process from initial planning to daily operation, with significant positive effects on all three major components of DCPI business value - availability, agility, and total cost of ownership.
  • Data Center Projects: Advantages of Using a Reference Design
    Source: APC by Schneider Electric
    White Paper: It is no longer practical or cost-effective to completely engineer all aspects of a unique data center. Re-use of proven, documented subsystems or complete designs is a best practice for both new data centers and for upgrades to existing data centers. Adopting a well-conceived reference design can have a positive impact on both the project itself, as well as on the operation of the data center over its lifetime. Reference designs simplify and shorten the planning and implementation process and reduce downtime risks once up and running. In this paper reference designs are defined and their benefits are explained.
  • Building Higher IT Business Continuity in the Face of Disaster
    Source: Dell Software
    White Paper: Discover the necessary steps you should be taking to upgrade your disaster preparedness and to prevent your business from coming to a grinding halt. Read this paper and learn how to prevent forces of nature, malicious acts or simple mistakes from having a lasting negative effect on your business.
  • Choosing the Right Deduplication Solution
    Source: Dell Software
    White Paper: Nearly every backup-and-recovery solution on the market today includes deduplication and compression capabilities. Read this paper and learn how to weigh the advantages of appliance-based vs. software-based deduplication, and find the right fit for your organization.
  • Cost-effective disaster recovery without a DR site? You bet.
    Source: Dell Software
    Webcast: Achieving cost-effective disaster recovery (DR) services without a physical DR site, or having to extend your DR footprint, is possible. View our partner webcast with Microsoft and see how to effectively manage the growth of your backup archives while enabling multiple disaster recovery options.
  • Be a C-Suite Hero With These 5 Key Virtual & Physical Data Protection Takeaways
    Source: Dell Software
    White Paper: Redefine your business goals and drivers for data protection, and think like a CIO when you apply the five key takeaways in this eBook. Discover alternative approaches to protect your hybrid, virtual and physical environments, and embrace new solutions to secure your data assets.
  • Solving Data Growth Issues using Deduplication
    Source: Dell Software
    White Paper: Learn the basic principles of deduplication and the beneficial role it plays within a corporate environment. Read this paper and discover how you can back up systems within the required maintenance windows while keeping storage costs low through deduplication and replication.
  • Superior VMware® Protection for Limited IT Budgets
    Source: Dell Software
    White Paper: A complete VMware data-protection strategy should offer protection for mission-critical applications, along with automated nightly backup and replication for less critical data. Find out the four major criteria for implementing cost-effective data protection in your own VMware environment. Read the White Paper.
  • Entrust Datacard
    Source: Entrust, Inc.
    Webcast: Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking "ok" on their device, eliminating the hassle of a tradition hard token or physical cards.
  • The Next Generation Threat Protection Challenge
    Source: Cisco, Damballa, Fortinet, HP
    White Paper: More sophisticated hackers are causing major headaches for enterprises. They have developed advanced techniques to get by the perimeter defense and slowly unfold their attacks deep within the enterprise. CSOs need to respond and put in defenses so they don't end up being the new victims creating negative headlines.

    The question is, "What is required to stop the hackers?" The Challenge hosts a lively debate on the role of vendor research, sandboxing and what the next generation of threat protection solutions must incorporate to be effective. The discussion will help you understand what is required from a top-notch solution to stop the hackers and answer the question: "Which next generation advanced threat protection solution is right for my enterprise?"

    I have assembled four leading security vendors to shed light on the issues and solutions. Cisco, Damballa, Fortinet and HP help you understand the challenges you face. Attend this "conference session on paper" and learn the views of group experts on meeting the challenges of protecting your enterprise.
  • Best Practices for Dealing with Phishing and Next-Gen Malware
    Source: KnowBe4
    White Paper: Phishing and malware threats are skyrocketing. To combat these attacks, read this new Osterman Research white paper that gives you a list of high-priority actionable items, all related to IT security.

Results 1 - 15 of 705