Is Your x86 Infrastructure Best-in-Class for Data-Intensive Workloads?

Kirk Bresniker, HP - VP, Business Critical Systems, HP and Rory McInerney, Intel - VP, Intel Architecture Group
Data-intensive workloads, such as business processing and decision support, are placing x86 enterprise application environments under tremendous stress - inadequate scaling to handle demanding workloads and exponential data growth; insufficient reliability to handle large single system databases and high density virtualization; and increased management complexity due to server sprawl. Join HP's Kirk Bresniker, Chief Technologist VP, Business Critical Systems, and Intel's Rory McInerney, VP, Intel Architecture Group, as they discuss the features inside the Xeon E7 processor & the ProLiant DL980 G7 server that enable greater scalability and reliability, break-through management efficiencies, & leadership performance, and what this can mean for your business.
Jan 19 2012
62 mins
Is Your x86 Infrastructure Best-in-Class for Data-Intensive Workloads?
DL980 Xeon HP Intel
Join us for this summit:
More from this community:

Data Center Management

Webinars and videos

  • Live and recorded (2244)
  • Upcoming (56)
  • Date
  • Rating
  • Views
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • This webinar will discuss some of the latest deployments, trends, pricing and advances in the CDN market for commercial CDNs and telco/carrier CDN buildouts.

    Why you should Attend:
    - Learn the latest data on the size of the content delivery market for video.
    - Find out growth forecasts for both revenue and traffic volumes.
    - Hear about the market drivers and trends that will determine the future of the CDN market.
  • Extend the reach of your Service Desk to your Mobile Support Teams.

    Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.

    We know that service desk technicians can’t always be tied to a desk.
    As needs arise, they may be travelling, working remotely or moving around your building completing assignments and solving problems for customers, often with reduced access to the service desk.
    With FrontRange™ HEAT Mobile Field Service there’s no reason for your technicians to go off the grid when they’re on a service call.
    HEAT Mobile Field Service turns a handheld smart-phone into a mobile service desk client, allowing technicians to take the office with them wherever they go.

    Register today to hear how HEAT Mobile Field Service can:
    •Empower your technicians
    •Lower service costs
    •Improve response times

    Missed our LIVE webcast?
    Catch up with the rest of the series and more on the FrontRange BrightTALK Channel.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • How many logs files do you have?
    • Ever use them?
    • Wonder what they might contain?
    • Are they lying around unexploited, cropped or deleted to save space?
    • Do you ever try to exploit all the log data your systems produce?
    • Do you have home grown tools to manage them, only to find it’s a nightmare to keep these tools up-to-date?

    HP OLi (Operations Log Intelligence) is here to help. Based on industry leading log file management technology from ArcSight, now operations data in log files can be collected, centralized, archived and searched. The intuitive, visually-compelling dashboards provide easy, fast and powerful access to ALL your log files.

    In this webinar we'll discuss the advantages of centralizing log file management like this, and show you a quick demonstration of this new and exciting product from HP Software.
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Virtualization-ready
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Industry Trends for Business-Critical Apps with Virtualization and the Cloud Recorded: May 15 2013 49 mins
    Many organizations have been taking advantage of virtualization and cloud technologies to reduce server counts, and gain operational advantages. When it comes to business critical workloads such as those running Oracle, migration to virtualization and the cloud has encountered more resistance, and roadblocks.

    This presentation will examine industry trends in virtualization and cloud computing for enterprise workloads, such as Oracle, SAP, PeopleSoft, MS SQL Server, etc. Case studies will be presented that explore the advantages of a cloud strategy for mission-critical applications. Strategies for minimizing risk, and maximizing benefits will be provided.
  • Forrester and IT Execs Discuss Big Workloads Recorded: May 8 2012 45 mins
    Are you considering an x86 server for a new business-critical application, or are you thinking of migrating an existing Unix RISC application to x86? x86 systems and CPU technology have evolved rapidly over the last several years and this platform is now capable of running workloads previously associated with larger proprietary UNIX systems. In addition, both Windows and Linux, the principal operating environments for these servers, have matured to the point where the combination of x86 server and these OS' can handle workloads associated with the largest UNIX systems from as little as three years ago.

    Tune into this live webcast with our guest Forrester analyst Richard Fichera as he speaks to the underlying trends driving modern infrastructure, when to consider moving from Unix to Windows or Linux changing principal operating environments, what to look for in an x86 platform and porting guidance. Rich will be joined by two IT executives who will share their business challenges, their decision-making process, and the business benefits they have achieved with their chosen database server solution, followed by a live Q & A.
  • Taking Your Database Performance To The Next Level Recorded: May 3 2012 32 mins
    IT departments are under constant pressure to decrease time-to-data that drives business decisions and allows quick reaction to new market opportunities. Exponential database growth has led to a performance and availability crisis for business critical applications that cannot be solved with software tuning. The problem is I/O and can be solved only by increased I/O through a combination of more powerful servers and a breakthrough in storage performance.

    Please join us on this webcast to introduce you to a new, integrated high performance database solution from HP, Violin Memory and Red Hat that solves the I/O issues for business-critical OLTP and BI/DW applications.
  • Is Your x86 Infrastructure Best-in-Class for Data-Intensive Workloads? Recorded: Jan 19 2012 62 mins
    Data-intensive workloads, such as business processing and decision support, are placing x86 enterprise application environments under tremendous stress - inadequate scaling to handle demanding workloads and exponential data growth; insufficient reliability to handle large single system databases and high density virtualization; and increased management complexity due to server sprawl. Join HP's Kirk Bresniker, Chief Technologist VP, Business Critical Systems, and Intel's Rory McInerney, VP, Intel Architecture Group, as they discuss the features inside the Xeon E7 processor & the ProLiant DL980 G7 server that enable greater scalability and reliability, break-through management efficiencies, & leadership performance, and what this can mean for your business.
Optimizing your IT Investment
Access on-line technical content easily and conveniently.
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is Your x86 Infrastructure Best-in-Class for Data-Intensive Workloads?
  • Live at: Jan 19 2012 6:00 pm
  • Presented by: Kirk Bresniker, HP - VP, Business Critical Systems, HP and Rory McInerney, Intel - VP, Intel Architecture Group
  • From:
Your email has been sent.
or close
You must be logged in to email this