Onze pre-sales consultants laten door middel van een demo zien hoe je ervoor kunt zorgen dat alleen die delen van een profiel worden opgestart die een gebruiker op dat moment nodig heeft, zodat inlogtijden flink worden ingekort. Ook laten ze zien waarom het beter is om persoonlijke instellingen op applicatieniveau te streamen en beheren. De grootte van het gebruikersprofiel wordt hierdoor namelijk kleiner en profielgegevens kunnen onafhankelijk worden beheerd waardoor applicaties eenvoudig kunnen worden geupgrade zonder dat de gebruiker daar iets van merkt.
This week on White Space, we look back at the news from DCD Converged conference in London. We’ve also brought back a special guest - Cole Crawford, CEO of Vapor IO and purveyor of unusual rack arrangements.
We discuss various ways to reuse server heat and discover that Coca Cola is apparently using Internet of Things to develop new flavors of the sugary drink.
Peter looks at the reasons behind the Telecity outage in the UK - but this outage has nothing on the recent data center fire in Azerbaijan, that left almost the entire country without access to the Internet.
Also mentioned are the news about CA Technologies getting out of the DCIM business, the reinvention of liquid cooling company Iceotope and the fact that the US government has just discovered another 2000 data centers it didn’t know it had.
Did you know that 80-100% of serious security breaches involve privileged account misuse or compromise?
This, in large part, is due to the fact that enterprises are becoming more complex with an increasing number of users and devices needing network access to privileged accounts. In many cases, advanced attackers are focused on achieving domain administrator privileges because of the unrestricted access and control these credentials have in the IT landscape.
Join (ISC)² and CyberArk in this webinar where we’ll discuss and demonstrate:
-vulnerabilities posed by unsecured privileged accounts
- the state of cyber security and attacker motivations
- lateral movement techniques - using real-world data - that enable an attacker to take over a network
- the expanding threat landscape posed by complex IT environments
Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?
This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 25th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
Analysts have been advising for many years that all businesses are becoming software businesses and one of the key software platforms that organisations invest in to support this is SAP's Enterprise Solutions. With this transformation, the availability of these mission-critical enterprise services increases every day.
During this webinar, you can learn how:
• SAP and SUSE have collaborated for 16 years to make Linux the preferred operating system upon which SAP applications run.
• SUSE can help you unleash the power of Open Source whilst providing the most performant and resilient platform available for your SAP applications
• Highly-Available SAP HANA, the core of SAP's next generation business suite S4/HANA, is ONLY available on SUSE Linux
One of SUSE’s Platinum Partners – Securelinx – who specialise in the deployment, configuration and support of Linux, are sponsoring this webinar.
Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
The virtualization wave is beginning to stall as companies confront application performance problems that can no longer be addressed effectively, even in the short term, by the expensive deployment of silicon storage, brute force caching, or complex log structuring schemes. Simply put, hypervisor-based computing has hit the performance wall established decades ago when the industry shifted from multi-processor parallel computing to unicore/serial bus server computing.
Join industry analyst Jon Toigo and DataCore in this presentation where you will learn how your business can benefit from our Adaptive Parallel I/O software by:
- Harnessing the untapped power of today's multi-core processing systems and efficient CPU memory to create a new class of storage servers and hyper-converged systems
- Enabling order of magnitude improvements in I/O throughput
- Reducing the cost per I/O significantly
- Increasing the number of virtual machines that an individual server can host without application performance slowdowns
To extend Microsoft SCOM for heterogeneous environments that include Citrix, SAP, Siebel, VMware, Oracle, Sybase, DB2, Java, etc., multiple management packs are often deployed - one for each non-Microsoft platform. But the lack of integration between management packs leads to long problem identification and diagnosis cycles, resulting in poor user experience and loss in productivity.
The eG Enterprise Microsoft SCOM Management Pack allows you to centrally monitor performance both across your entire infrastructure and deep throughout each individual tier, automatically identifying the root causes of performance issues, improving service delivery, saving time and increasing IT value.
In this live solution tour, you will learn how to escape siloed monitoring and leverage your SCOM environment to gain real-time insight into every factor that affects your end users’ experience, across your entire infrastructure.
Hear about 5 key storage advancements in this webinar. You'll learn:
--How to enable greater infrastructure agility
--How to cut storage-related costs by 60% or more
--How customers benefit from recent storage innovations
Tom Foremski with featured speakers from the Virtualization Summit
Silicon Valley Watcher editor Tom Foremski moderates a panel of featured speakers from BrightTALK's Virtualization Summit as they respond to questions and engage in a lively discussion of the ins and outs of virtualization.
Now, corporations truly understand that it’s not a matter of if a disaster will occur, but when. Hurricane Katrina is one example of a major disaster that has forced companies to pause and reevaluate their Disaster Recovery strategy. Virtualization technologies have created an affordable DR approach, yielding greater environment flexibility and mobility. However, many manual steps must still be taken to recover or failover an entire IT environment. VMware’s Site Recovery Manager (SRM) can automate most of those manual steps to provide a repeatable, reportable and recoverable solution to complement your corporate DR plan. This presentation will focus on the benefits of SRM and key points of consideration when looking to automate your DR steps.
While the cost, flexibility and scalability benefits of virtualization are undeniable, so are the systems and network management challenges created by the virtual data center. Cautionary tales abound, examples of organizations who have not just figured out how to manage their virtualized environments, but how to use management to maximize their performance and availability are still fewer than one would expect. In this Webcast, Javier Soltero, CEO of Hyperic will address best practices for managing and monitoring your virtualized data center, once created. He will also provide expert input on how to evaluate virtualization management tools, tricks for streamlining application-level management, common misperceptions and pitfalls that can be avoided and much more. Last he will offer clear cut examples of companies that have successfully overcome virtualization management hurdles.
Any IT transformation is complex and high risk, requiring significant change in technology, process and culture. This is why an incremental, plan-driven approach is critical for successful transformation. The Cloud Computing Adoption Model is a graduated, stepwise approach for adoption of cloud technologies. It helps to cut through the hype and lay out a clear game plan incrementing toward cloud without putting projects, budgets and even careers at risk based on a 5-step framework loosely modeled after the Capability Maturity Model (CMM) from the Software Engineering Institute (SEI) at Carnegie Mellon University. For each level, the Model outlines the strategic goals, key investment requirements, expected returns, risk factors, and readiness criteria for graduating to the next step.