Skip Links

Network World

Resource Library

  • Monitoring Physical Threats in the Data Center
    Source: APC by Schneider Electric
    White Paper: Traditional methodologies for monitoring the data center environment are no longer sufficient. With technologies such as blade servers driving up cooling demands and regulations such as Sarbanes-Oxley driving up data security requirements, the physical environment in the data center must be watched more closely. While well understood protocols exist for monitoring physical devices such as UPS systems, computer room air conditioners, and fire suppression systems, there is a class of distributed monitoring points that is often ignored. This paper describes this class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.
  • A Framework for Developing and Evaluating Data Center Maintenance Programs
    Source: APC by Schneider Electric
    White Paper: Inadequate maintenance and risk mitigation processes can quickly undermine a facility's design intent. It is, therefore, crucial to understand how to properly structure and implement an operations and maintenance (O&M;) program to achieve the expected level of performance. This paper defines a framework, known as the Tiered Infrastructure Maintenance Standard (TIMS), for aligning an existing or proposed maintenance program with a facility's operational and performance requirements. This framework helps make the program easier to understand, communicate, and implement throughout the organization.
  • Site Selection for Mission Critical Facilities
    Source: APC by Schneider Electric
    White Paper: When selecting a new site or evaluating an existing site, there are dozens of risk factors that must be considered if optimal availability is to be obtained. Geographic, site-related, building, and economic risks need to be understood and mitigated to lessen the downtime effects on your business. In this paper guidelines are established for selecting a new site or assessing an existing one. Common risks that affect the availability of a business are defined and techniques for minimizing these risks are presented.
  • Cooling Strategies for Ultra-High Density Racks and Blade Servers
    Source: APC by Schneider Electric
    White Paper: Rack power of 10 kW per rack or more can result from the deployment of high density information technology equipment such as blade servers. This creates difficult cooling challenges in a data center environment where the industry average rack power consumption is under 2 kW. Five strategies for deploying ultra-high power racks are described, covering practical solutions for both new and existing data centers.
  • Making Large UPS Systems More Efficient
    Source: APC by Schneider Electric
    White Paper: As energy resources become scarcer and more expensive, electrical efficiency is becoming a more important performance factor in the specification and selection of large UPS systems. There are three subtle but significant factors that can materially affect a company's cost of operating a UPS system and particularly the electrical bill. Unfortunately, the people who specify systems often fail to recognize these factors, which leads to increased costs to the owner because operational efficiencies are not correctly considered. This paper discusses the common errors and misunderstandings in evaluating UPS efficiency. UPS efficiency curves are explained, compared, and their cost implications quantified.
  • The Top 9 Mistakes in Data Center Planning
    Source: APC by Schneider Electric
    White Paper: Why do so many data center builds and expansions fail? This white paper answers the question by revealing the top 9 mistakes organizations make when designing and building new data center space, and examines an effective way to achieve success through the Total Cost of Ownership (TCO) approach.
  • One Size Doesn't Fit All with Flexible B2B Integration
    Source: IBM
    White Paper: From software to cloud to hybrid options, learn how IBM delivers tools to effectively connect with partners across your value chain, automate processes for increased cost savings & customer satisfaction, & enhance collaboration to drive greater success for your organization.
  • What You Need to Know About Network Performance Management
    Source: Riverbed
    White Paper: Choosing the right network performance management tool shouldn't be so hard, in fact there are pretty simple steps to consider when choosing the right solution. Check out this -What you need to know about Network Performance Management - Infographic to learn more.
  • Total Economic Impact of Dimension Data's Uptime IT Support
    Source: Dimension Data
    White Paper: Dimension Data commissioned Forrester Consulting to examine the total economic impact & potential return on investment organisations may realise by using Uptime. The TEI case study scenarios will help you understand the potential financial impact that Uptime services could have on your organisation.
  • Do You Need Help Uncovering the Hidden Costs of IT Support?
    Source: Dimension Data
    White Paper: The price of your ICT maintenance contract is not all you pay for support. Not because of inaccurate billing; but more because of costs incurred by your organisation's teams and structures. This guide offers steps you can take to support your environment with fewer hidden costs to think about.
  • High Performance Computing eGuide
    Source: HP & IntelĀ®
    White Paper: High performance computing (HPC) is being leveraged today to help enterprises accelerate innovation, from mainstream applications to highly specialized scientific projects. HPC meets the needs of these different ends of the spectrum and many demanding applications in between with the scalable performance to speed advancements via a converged infrastructure. The technology allows for maximum efficiency and instant-on agility so organizations can easily deploy systems that adapt quickly to change and significantly improve quality of service.

    In this eGuide, articles from Computerworld and InfoWorld offer case studies, examples and opinions of how HPC can be applied to real-world problems today, and what the future of the technology is likely to hold.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • The Great Video Conferencing Debate: Cost Vs. Quality
    Source: Polycom
    White Paper: With new video conferencing solutions available for small and medium businesses, it is possible to have a higher standard of video conferencing without the quality issues presented by consumer products. Are these higher quality business grade solutions worth the higher cost, or do savings from consumer grade versions justify their lower quality?
  • The Top 10 Reports for Managing Vulnerabilities
    Source: Qualys
    White Paper: This paper cuts through the data overload generated by some vulnerability detection solutions and introduces The Top 10 Reports for Managing Vulnerabilities. This free guide covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organizations are using to reduce risks on their network infrastructure.
  • SANS Survey on Application Security Policies in Enterprises
    Source: Qualys
    White Paper: Over the past five years, applications particularly web applications have been increasingly leveraged as a top vector of attack. With the trend toward mobile applications and cloud computing, SANS decided to conduct this first SANS survey on application security to focus on understanding what works in application security (aka "appsec") and why.
  • Web Application Security: How to Minimize the Risk of Attacks
    Source: Qualys
    White Paper: To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security. The guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution an on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications.

Results 1 - 15 of 106