{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"_type":"localeString","en":"Offer a reference bonus","ru":"Предложить бонус за референс"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"_type":"localeString","en":"Rebate ascending","ru":"По возрастанию скидки"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Поставщик потверждён"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"en":"Popular descending","ru":"По убыванию популярности","_type":"localeString"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register","de":"Registrieren"},"auth-message":{"de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login."},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"en":"By sale","ru":"По продаже","_type":"localeString"},"sort-purchases-desc":{"ru":"По покупке","_type":"localeString","en":"By purchase"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"_type":"localeString","en":"Product producer","ru":"Производитель продукта"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"en":"Filter by price","ru":"Фильтр по цене","_type":"localeString"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"en":"Follow","ru":"Следить","_type":"localeString"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"en":"Сlear","ru":"Очистить","_type":"localeString"},"delivery-type-field":{"_type":"localeString","en":"Delivery type","ru":"Тип поставки"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"en":"Product Categories","ru":"Категории продуктов","_type":"localeString"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"en":"User products vendors","ru":"Производители продуктов пользователя","_type":"localeString"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"_type":"localeString","en":"Find","ru":"Выполнить поиск"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"en":"Add company","ru":"Добавить компанию","_type":"localeString"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"en":"With comments","ru":"С комментариями","_type":"localeString"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"ru":[{"style":"normal","_key":"28241882db7a","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0"}],"_type":"block"}],"_type":"localeBlock","en":[{"_type":"block","style":"normal","_key":"8bebcfb34955","markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span"}]}]}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"en":"ROI4CIO: Products","ru":"ROI4CIO: Продукты","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}},{"name":"description","translations":{"_type":"localeString","en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"}},{"name":"og:description","translations":{"en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"}},{"translations":{"en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString"},"name":"keywords"},{"name":"title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"atlassian-trello":{"id":3079,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/trello-logo-blue-flat.png","logo":true,"scheme":false,"title":"Atlassian Trello","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"atlassian-trello","companyTitle":"Atlassian Software Systems","companyTypes":["supplier","vendor"],"companyId":4158,"companyAlias":"atlassian-software-systems","description":"<p>Trello is project management software that presents a visual collaboration tool. It uses a system of boards and cards that allow teams to create a shared perspective on assigned projects. There is no limit to how many boards, cards, or teams an organization can create. Cards can be dragged and dropped to boards to assign tasks, allowing all team members to see the work that’s getting done and where projects are in the scope of the process. Cards can be color-coded, labeled, filtered, or archived.</p>\r\n<p>Trello eliminates the need for status update meetings. Comments can be shared on cards to give ideas, feedback, or ask questions. Specific team members can be mentioned in a comment and they are notified in the app, by email, through desktop notifications, or via mobile. Notifications sync across all devices. Trello works on your desktop, iOS and Android devices, and even the Slack platform, allowing teams to work from any location.</p>\r\n<p>Trello allows users to break down tasks and share progress by adding checklists to cards. Deadlines and due dates can be added. Unlimited attachments allow teams to share all the files needed in one accessible space. With the use of “Power-Ups”, Trello uses adaptable features and integrates with many apps that teams rely on, such as Salesforce, Slack, GitHub, Google Drive, Evernote, and others, eliminating the need to move back and forth between apps while working on projects.</p>\r\n<p><span style=\"font-weight: bold;\">With Trello, you’ll be able to do the following:</span></p>\r\n<ul>\r\n<li>Use cards for collaboration and file sharing</li>\r\n<li>Manage and oversee projects with the drag-and-drop function</li>\r\n<li>Sync actions and messages in real time across all members</li>\r\n<li>Monitor team and individual tasks and progress on a single board</li>\r\n<li>Get notified and updated instantly across devices, browsers, and email</li>\r\n<li>Invite as many members as you want</li>\r\n<li>Add labels, set due dates, post comments, build checklists, etc</li>\r\n<li>Integrate productivity apps you currently use</li>\r\n</ul>\r\n<p>Not sure Trello is right for your business? Use our Project Management Product Selection Tool to compare other Project Management solutions. Have questions? Call or email one of our unbiased Technology Advisers for a free consultation.</p>","shortDescription":"Trello is project management software that presents a visual collaboration tool.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Atlassian Trello","keywords":"","description":"<p>Trello is project management software that presents a visual collaboration tool. It uses a system of boards and cards that allow teams to create a shared perspective on assigned projects. There is no limit to how many boards, cards, or teams an organization","og:title":"Atlassian Trello","og:description":"<p>Trello is project management software that presents a visual collaboration tool. It uses a system of boards and cards that allow teams to create a shared perspective on assigned projects. There is no limit to how many boards, cards, or teams an organization","og:image":"https://old.roi4cio.com/fileadmin/user_upload/trello-logo-blue-flat.png"},"eventUrl":"","translationId":3079,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":81,"title":"Project and Portfolio Management"}],"testingArea":"","categories":[{"id":363,"title":"Project and Portfolio Management","alias":"project-and-portfolio-management","description":"<span style=\"font-weight: bold;\">Project Portfolio Management (PPM)</span> is the centralized management of the processes, methods, and technologies used by project managers and project management offices (PMOs) to analyze and collectively manage current or proposed projects based on numerous key characteristics. The objectives of PPM are to determine the optimal resource mix for delivery and to schedule activities to best achieve an organization’s operational and financial goals, while honouring constraints imposed by customers, strategic objectives, or external real-world factors. The International standard defines the framework of the Project Portfolio Management.\r\nPPM provides program and project managers in large, program/project-driven organizations with the capabilities needed to manage the time, resources, skills, and budgets necessary to accomplish all interrelated tasks. It provides a framework for issue resolution and risk mitigation, as well as the centralized visibility to help planning and scheduling teams to identify the fastest, cheapest, or most suitable approach to deliver projects and programs. Portfolio Managers define Key Performance Indicators and the strategy for their portfolio.\r\n<span style=\"font-style: italic;\">Pipeline Management.</span> Pipeline management involves steps to ensure that an adequate number of project proposals are not generated and not evaluated to determine whether (and how) a set of projects in the portfolio can be executed with finite development resources in a specified time. There are three major sub-components to pipeline management: ideation, work intake processes, and Phase-Gate reviews. Fundamental to pipeline management is the ability to align the decision-making process for estimating and selecting new capital investment projects with the strategic plan.\r\n<span style=\"font-style: italic;\">Resource Manager.</span> The focus on the efficient and effective deployment of an organization’s resources where and when they are needed. These can include financial resources, inventory, human resources, technical skills, production, and design. In addition to project-level resource allocation, users can also model ‘what-if’ resource scenarios, and extend this view across the portfolio.\r\n<span style=\"font-style: italic;\">Change Control.</span> The capture and prioritization of change requests that can include new requirements, features, functions, operational constraints, regulatory demands, and technical enhancements. PPM provides a central repository for these change requests and the ability to match available resources to evolving demand within the financial and operational constraints of individual projects.\r\n<span style=\"font-style: italic;\">Financial Management.</span> With PPM, the Office of Finance can improve their accuracy for estimating and managing the financial resources of a project or group of projects. In addition, the value of projects can be demonstrated in relation to the strategic objectives and priorities of the organization through financial controls and to assess progress through earned value and other project financial techniques.\r\n<span style=\"font-style: italic;\">Risk Management.</span> An analysis of the risk sensitivities residing within each project, as the basis for determining confidence levels across the portfolio. The integration of cost and schedule risk management with techniques for determining contingency and risk response plans, enable organizations to gain an objective view of project uncertainties.","materialsDescription":" <span style=\"font-weight: bold;\">What’s the difference between Project Management and Project Portfolio Management?</span>\r\nProject management is focused on an individual project, making sure it achieves its objectives and adheres to cost schedule baselines and performance standards. Project portfolio management, on the other hand, takes into consideration all the projects within a portfolio. The primary objective here is to select and maintain the appropriate mix of projects and to assess the costs, risks, and returns of running these projects in relation to how they match with organizational goals. Simply put, project management is about doing the project right, project portfolio management is about doing the right projects.\r\n<span style=\"font-weight: bold;\">What Problems Can Project Portfolio Management Address?</span>\r\nProject Portfolio Management helps companies avoid project overload and work on projects that are not aligned with the ultimate vision. In other words, project portfolio management helps companies to work towards their goals without getting sidetracked by too many shiny pennies (ie. projects that appear to be enticing but actually drain their resources for little return).\r\n<span style=\"font-weight: bold;\">How does Project Portfolio Management help with new product development?</span>\r\nProject Portfolio Management supports companies in assessing, evaluating and ranking new product ideas before they become projects, so that time, money and human resources can be spent working on projects that support strategic objectives. This becomes increasingly important and relevant for companies that receive dozens if not hundreds of project proposals.\r\n<span style=\"font-weight: bold;\">What are the key elements of successful portfolio management?</span>\r\nGoals, objectives, governance, approval processes and monitoring portfolio performance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Project_and_Portfolio_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"azure-data-warehouse":{"id":1546,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/data-warehouse.jpg","logo":true,"scheme":false,"title":"Azure Data Warehouse","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"azure-data-warehouse","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily get started, take advantage of the performance, flexibility, and security of Azure's fully managed services, such as SQL Azure and Azure Databricks.</p>\r\n<h2>Get rid of worries</h2>\r\n<h2><br /><span style=\"font-weight: normal;\">Built-in advanced security features include transparent data encryption, auditing, threat detection, integration with Azure Active Directory and virtual network endpoints. Azure services correspond to more than 50 industry and geographic certifications and are available worldwide in 42 regions to store your data wherever your users are located. Finally, Microsoft offers financially secured service level agreements to spare you any hassle.</span></h2>","shortDescription":"Azure Data Warehouse - is a modern data storage from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Data Warehouse","keywords":"","description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily ","og:title":"Azure Data Warehouse","og:description":"<p>Create a single center for all your data, be it structured, unstructured or streaming data. Provide work of such transformational decisions, as functions of business analytics, reports, the expanded analytics and analytics in real time. To easily ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/data-warehouse.jpg"},"eventUrl":"","translationId":1549,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":24,"title":"IaaS - storage"}],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"azure-resiliency":{"id":1420,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Azure_Resiliency.jpg","logo":true,"scheme":false,"title":"Azure Resiliency","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"azure-resiliency","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<span style=\"font-weight: bold; \">Business continuity with data resiliency</span>\r\nBuild applications on Azure to take advantage of high availability, disaster recovery, and backup on Azure’s global network. Build redundancies at the virtual machine (VM), datacenter, and regional levels based on your business needs. And stay compliant with your country’s or region’s legal and regulatory requirements respective of the location of your data.\r\n<span style=\"font-weight: bold; \">Achieve High Availability faster in the cloud</span>\r\nAs soon as you sign up, access the tools, the infrastructure, and the guidance you need to deploy your applications in the cloud. Support your most demanding mission-critical applications to build always-available sites cost-effectively. And take advantage of an SLA of up to 99.99 percent for your virtual machines.\r\nHigh-availability solutions\r\n<ul><li>Availability Zones</li><li>Availability sets</li><li>Virtual Machine Scale Sets (VMSS)</li></ul>\r\n<span style=\"font-weight: bold; \">Easy disaster recovery and backup</span>\r\nAzure Site Recovery, combined with geo-redundant storage, is natively available for disaster recovery. Protect against bad code, data corruption, and accidental deletion with cost-effective backup. Stay compliant with long retention times, maintain reliability through geo-replicated storage, and simplify your processes with automation.\r\n<span style=\"font-weight: bold; \">Keep your applications up and running</span>\r\nHear from one of our customers about their resiliency experience building on Azure. Plus, our product team talks about our commitment to delivering a service that meets the needs of your resiliency strategy.\r\n<span style=\"font-weight: bold;\">Availability Zones</span> is a high-availability offering that protects your applications and data from datacenter failures. Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions. The physical separation of Availability Zones within a region protects applications and data from datacenter failures. Zone-redundant services replicate your applications and data across Availability Zones to protect from single-points-of-failure. With Availability Zones, Azure offers industry best 99.99% VM uptime SLA.\r\n","shortDescription":"Azure Resiliency is a comprehensive business-continuity solution build with confidence with high availability, disaster recovery, and backup","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Resiliency","keywords":"","description":"<span style=\"font-weight: bold; \">Business continuity with data resiliency</span>\r\nBuild applications on Azure to take advantage of high availability, disaster recovery, and backup on Azure’s global network. Build redundancies at the virtual machine (VM), data","og:title":"Azure Resiliency","og:description":"<span style=\"font-weight: bold; \">Business continuity with data resiliency</span>\r\nBuild applications on Azure to take advantage of high availability, disaster recovery, and backup on Azure’s global network. Build redundancies at the virtual machine (VM), data","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Azure_Resiliency.jpg"},"eventUrl":"","translationId":1421,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"},{"id":497,"title":"Backup and Recovery Reporting Software","alias":"backup-and-recovery-reporting-software","description":" Backup and recovery describes the process of creating and storing copies of data that can be used to protect organizations against data loss. This is sometimes referred to as operational recovery. Recovery from a backup typically involves restoring the data to the original location, or to an alternate location where it can be used in place of the lost or damaged data.\r\nA proper backup copy is stored in a separate system or medium, such as tape, from the primary data to protect against the possibility of data loss due to primary hardware or software failure.\r\nThe purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. Primary data failures can be the result of hardware or software failure, data corruption, or a human-caused event, such as a malicious attack (virus or malware), or accidental deletion of data. Backup copies allow data to be restored from an earlier point in time to help the business recover from an unplanned event.\r\nStoring the copy of the data on separate medium is critical to protect against primary data loss or corruption. This additional medium can be as simple as an external drive or USB stick, or something more substantial, such as a disk storage system, cloud storage container, or tape drive. The alternate medium can be in the same location as the primary data or at a remote location. The possibility of weather-related events may justify having copies of data at remote locations.\r\nFor best results, backup copies are made on a consistent, regular basis to minimize the amount data lost between backups. The more time passes between backup copies, the more potential for data loss when recovering from a backup. Retaining multiple copies of data provides the insurance and flexibility to restore to a point in time not affected by data corruption or malicious attacks.","materialsDescription":" <span style=\"font-weight: bold;\">What do Backup and Recovery mean?</span>\r\nBackup and recovery refer to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss. Backing up data requires copying and archiving computer data, so that it is accessible in case of data deletion or corruption. Data from an earlier time may only be recovered if it has been backed up.\r\nData backup is a form of disaster recovery and should be part of any disaster recovery plan.\r\nData backup cannot always restore all of a system's data and settings. For example, computer clusters, active directory servers, or database servers may need additional forms of disaster recovery because a backup and recovery may not be able to reconstitute them fully.\r\nToday, a great deal of data can be backed up when using cloud storage, which means archiving on a local system's hard drive or using external storage is not necessary. Mobile devices, in particular, can be set up using cloud technologies, allowing data to be recovered automatically.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Backup_and_Recovery_Reporting_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"azure-virtual-machines":{"id":1550,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Azure-Virtual-machines.png","logo":true,"scheme":false,"title":"Azure Virtual Machines","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"azure-virtual-machines","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing and autoscaling. <span style=\"color: #505050; font-family: 'Segoe UI', SegoeUI, 'Segoe WP', Tahoma, Arial, sans-serif; font-size: 15px; background-color: #ffffff;\"><br /></span>Azure Virtual Machines - is a proposal that includes various solutions, from an inexpensive B series to virtual machines with the latest GPU optimized for machine learning. It is designed to perform any workloads within any budget.</p>","shortDescription":"Azure Virtual Machines - is a computing service from Microsoft","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Azure Virtual Machines","keywords":"","description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing","og:title":"Azure Virtual Machines","og:description":"<p>Supporting Linux, Windows Server, SQL Server, Oracle, IBM, SAP and other platforms, Azure virtual machines provide the flexibility of virtualization for a wide range of computing solutions. All current-generation virtual machines include load balancing","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Azure-Virtual-machines.png"},"eventUrl":"","translationId":1551,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":26,"title":"IaaS - computing"}],"testingArea":"","categories":[{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-poweredge-mx7000-modular-chassis":{"id":4770,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dell_PowerEdge_MX7000_Modular_Chassis.jpg","logo":true,"scheme":false,"title":"Dell PowerEdge MX7000 Modular Chassis","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-poweredge-mx7000-modular-chassis","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers with unequal flexibility and agility. At the foundation, PowerEdge MX7000 chassis hosts disaggregated blocks of server and storage to create consumable resources on-demand. Shared power, cooling, networking, I/O and in-chassis management provides outstanding efficiencies.\r\n<ul><li>7U modular enclosure with eight slots holds 2S single or four 4S double-width compute sleds and 12Gbs single-width storage sleds</li><li>25Gb Ethernet, 12Gb SAS and 32Gb Fibre Channel I/O options</li><li>Three I/O networking fabrics, two general purpose and one storage specific, each with redundant modules</li><li>Multi-chassis networking up to 10 chassis</li><li>Single management point for compute, storage and networking</li><li>High-speed technology connections, now and into the future, with no midplane upgrade</li><li>At least three server processor microarchitecture generation support assurance</li></ul>\r\n<span style=\"font-weight: bold; \">Dynamically scale and respond with kinetic infrastructure</span>\r\nDesigned with Dell EMC’s kinetic infrastructure, PowerEdge MX creates shared pools of disaggregated compute and storage resources, connected by scalable fabric, from which workloads can draw resources needed to run most quickly and efficiently. Then when no longer needed the resources are returned into the pool. By essentially creating hardware on the fly the capacity can be managed at a data center level instead of a per server level.\r\n<ul><li>Full-featured, no compromise compute sleds with Intel® Xeon® Scalable processors</li><li>Generous, scalable on-board SAS, SATA, and NVMe storage drives, plus substantial, granular SAS direct-attached storage using optional storage sleds</li><li>Scalable fabric architecture with a grow-as-you-need fabric expansion capability for up to 10 chassis in fabric.</li></ul>\r\n<span style=\"font-weight: bold; \">Increase effectiveness and accelerate operations with unified automation</span>\r\nEmbedded Dell EMC OpenManage Enterprise – Modular Edition delivers the key abilities of OpenMange Enterprise systems management within the PowerEdge MX chassis. A unified simple interface manages compute, storage and fabric, reducing costs and the learning curve and consolidates multiple tools. Redundant management modules ensure highest availability.\r\n<ul><li>Automatic expansion from one to multiple chassis; scale management to thousands of PowerEdge MX and rack servers with OpenManage Enterprise</li><li>Flexible, at-the-box management front control panel options include Quick Sync 2 (wireless), touchscreen LCD and traditional crash cart</li><li>Comprehensive RESTful API helps automate multiple tasks and integrates to third-party tools</li><li>Seamlessly integrates with integrated Dell Remote Access Controller 9 (iDRAC9) and Lifecycle Controller (LC)</li></ul>\r\n<span style=\"font-weight: bold;\">Protect infrastructure and investment with responsive design</span>\r\nReduce the risk of infrastructure investment and help make new innovations more easily available with PowerEdge MX7000 future-forward architecture. Designed to maximize longevity and minimize disruptive technology changes support across both generational and architectural transitions is provided.\r\n<ul><li>Multi-generational assurance with support for at least three server processor microarchitecture generations</li><li>Nearly zero throughput limitations, providing high-speed technology connections, and well into the future, with no midplane upgrade</li><li>Industry-leading thermal architecture and mechanical design and control algorithms support dense configurations and future compatibility</li></ul>","shortDescription":"Dynamically assign, move and scale shared pools of compute, storage and fabric, with greater flexibility and efficiency, and deliver optimal value.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell PowerEdge MX7000 Modular Chassis","keywords":"","description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers wi","og:title":"Dell PowerEdge MX7000 Modular Chassis","og:description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers wi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dell_PowerEdge_MX7000_Modular_Chassis.jpg"},"eventUrl":"","translationId":4771,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":4,"title":"Data center","alias":"data-center","description":" A data center (or datacenter) is a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data. A business typically relies heavily upon the applications, services and data contained within a data center, making it a focal point and critical asset for everyday operations.\r\nData centers are not a single thing, but rather, a conglomeration of elements. At a minimum, data centers serve as the principal repositories for all manner of IT equipment, including servers, storage subsystems, networking switches, routers and firewalls, as well as the cabling and physical racks used to organize and interconnect the IT equipment. A data center must also contain an adequate infrastructure, such as power distribution and supplemental power subsystems, including electrical switching; uninterruptable power supplies; backup generators and so on; ventilation and data center cooling systems, such as computer room air conditioners; and adequate provisioning for network carrier (telco) connectivity. All of this demands a physical facility with physical security and sufficient physical space to house the entire collection of infrastructure and equipment.","materialsDescription":" <span style=\"font-weight: bold;\">What are the requirements for modern data centers?</span>\r\nModernization and data center transformation enhances performance and energy efficiency.\r\nInformation security is also a concern, and for this reason a data center has to offer a secure environment which minimizes the chances of a security breach. A data center must therefore keep high standards for assuring the integrity and functionality of its hosted computer environment.\r\nIndustry research company International Data Corporation (IDC) puts the average age of a data center at nine years old. Gartner, another research company, says data centers older than seven years are obsolete. The growth in data (163 zettabytes by 2025) is one factor driving the need for data centers to modernize.\r\nFocus on modernization is not new: Concern about obsolete equipment was decried in 2007, and in 2011 Uptime Institute was concerned about the age of the equipment therein. By 2018 concern had shifted once again, this time to the age of the staff: "data center staff are aging faster than the equipment."\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Meeting standards for data centers</span></span>\r\nThe Telecommunications Industry Association's Telecommunications Infrastructure Standard for Data Centers specifies the minimum requirements for telecommunications infrastructure of data centers and computer rooms including single tenant enterprise data centers and multi-tenant Internet hosting data centers. The topology proposed in this document is intended to be applicable to any size data center.\r\nTelcordia GR-3160, NEBS Requirements for Telecommunications Data Center Equipment and Spaces, provides guidelines for data center spaces within telecommunications networks, and environmental requirements for the equipment intended for installation in those spaces. These criteria were developed jointly by Telcordia and industry representatives. They may be applied to data center spaces housing data processing or Information Technology (IT) equipment. The equipment may be used to:\r\n<ul><li>Operate and manage a carrier's telecommunication network</li><li>Provide data center based applications directly to the carrier's customers</li><li>Provide hosted applications for a third party to provide services to their customers</li><li>Provide a combination of these and similar data center applications</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Data center transformation</span></span>\r\nData center transformation takes a step-by-step approach through integrated projects carried out over time. This differs from a traditional method of data center upgrades that takes a serial and siloed approach. The typical projects within a data center transformation initiative include standardization/consolidation, virtualization, automation and security.\r\n<ul><li>Standardization/consolidation: Reducing the number of data centers and avoiding server sprawl (both physical and virtual) often includes replacing aging data center equipment, and is aided by standardization.</li><li>Virtualization: Lowers capital and operational expenses, reduce energy consumption. Virtualized desktops can be hosted in data centers and rented out on a subscription basis. Investment bank Lazard Capital Markets estimated in 2008 that 48 percent of enterprise operations will be virtualized by 2012. Gartner views virtualization as a catalyst for modernization.</li><li>Automating: Automating tasks such as provisioning, configuration, patching, release management and compliance is needed, not just when facing fewer skilled IT workers.</li><li>Securing: Protection of virtual systems is integrated with existing security of physical infrastructures.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Machine room</span></span>\r\nThe term "Machine Room" is at times used to refer to the large room within a Data Center where the actual Central Processing Unit is located; this may be separate from where high-speed printers are located. Air conditioning is most important in the machine room.\r\nAside from air-conditioning, there must be monitoring equipment, one type of which is to detect water prior to flood-level situations. One company, for several decades, has had share-of-mind: Water Alert. The company, as of 2018, has 2 competing manufacturers (Invetex, Hydro-Temp) and 3 competing distributors (Longden,Northeast Flooring, Slayton). ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_center.png"},{"id":471,"title":"Hardware","alias":"hardware","description":" Computer hardware includes the physical, tangible parts or components of a computer, such as the cabinet, central processing unit, monitor, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is instructions that can be stored and run by hardware. Hardware is so-termed because it is "hard" or rigid with respect to changes or modifications; whereas software is "soft" because it is easy to update or change. Intermediate between software and hardware is "firmware", which is software that is strongly coupled to the particular hardware of a computer system and thus the most difficult to change but also among the most stable with respect to consistency of interface. The progression from levels of "hardness" to "softness" in computer systems parallels a progression of layers of abstraction in computing.\r\nHardware is typically directed by the software to execute any command or instruction. A combination of hardware and software forms a usable computing system, although other systems exist with only hardware components.\r\nThe template for all modern computers is the Von Neumann architecture, detailed in a 1945 paper by Hungarian mathematician John von Neumann. This describes a design architecture for an electronic digital computer with subdivisions of a processing unit consisting of an arithmetic logic unit and processor registers, a control unit containing an instruction register and program counter, a memory to store both data and instructions, external mass storage, and input and output mechanisms. The meaning of the term has evolved to mean a stored-program computer in which an instruction fetch and a data operation cannot occur at the same time because they share a common bus. This is referred to as the Von Neumann bottleneck and often limits the performance of the system.","materialsDescription":" <span style=\"font-weight: bold; \">What does Hardware (H/W) mean?</span>\r\nHardware (H/W), in the context of technology, refers to the physical elements that make up a computer or electronic system and everything else involved that is physically tangible. This includes the monitor, hard drive, memory and CPU. Hardware works hand-in-hand with firmware and software to make a computer function.\r\n<span style=\"font-weight: bold; \">What are the types of computer systems?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Personal computer</span></span>\r\nThe personal computer, also known as the PC, is one of the most common types of computer due to its versatility and relatively low price. Laptops are generally very similar, although they may use lower-power or reduced size components, thus lower performance.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Case</span></span>\r\nThe computer case encloses and holds most of the components of the system. It provides mechanical support and protection for internal elements such as the motherboard, disk drives, and power supplies, and controls and directs the flow of cooling air over internal components. The case is also part of the system to control electromagnetic interference radiated by the computer, and protects internal parts from electrostatic discharge. Large tower cases provide extra internal space for multiple disk drives or other peripherals and usually stand on the floor, while desktop cases provide less expansion room. All-in-one style designs include a video display built into the same case. Portable and laptop computers require cases that provide impact protection for the unit. A current development in laptop computers is a detachable keyboard, which allows the system to be configured as a touch-screen tablet. Hobbyists may decorate the cases with colored lights, paint, or other features, in an activity called case modding.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power supply</span></span>\r\nA power supply unit (PSU) converts alternating current (AC) electric power to low-voltage direct current (DC) power for the internal components of the computer. Laptops are capable of running from a built-in battery, normally for a period of hours. The PSU typically uses a switched-mode power supply (SMPS), with power MOSFETs (power metal–oxide–semiconductor field-effect transistors) used in the converters and regulator circuits of the SMPS.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Motherboard</span></span>\r\nThe motherboard is the main component of a computer. It is a board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the ports or the expansion slots. The integrated circuit (IC) chips in a computer typically contain billions of tiny metal–oxide–semiconductor field-effect transistors (MOSFETs).\r\nComponents directly attached to or to part of the motherboard include:\r\n<ul><li><span style=\"font-weight: bold; \">The CPU (central processing unit)</span>, which performs most of the calculations which enable a computer to function, and is referred to as the brain of the computer which get a hold of program instruction from random-access memory (RAM), interprets and processes it and then send it backs to computer result so that the relevant components can carry out the instructions. The CPU is a microprocessor, which is fabricated on a metal–oxide–semiconductor (MOS) integrated circuit (IC) chip. It is usually cooled by a heat sink and fan, or water-cooling system. Most newer CPU include an on-die graphics processing unit (GPU). The clock speed of CPU governs how fast it executes instructions, and is measured in GHz; typical values lie between 1 GHz and 5 GHz. Many modern computers have the option to overclock the CPU which enhances performance at the expense of greater thermal output and thus a need for improved cooling.</li><li><span style=\"font-weight: bold; \">The chipset</span>, which includes the north bridge, mediates communication between the CPU and the other components of the system, including main memory; as well as south bridge, which is connected to the north bridge, and supports auxiliary interfaces and buses; and, finally, a Super I/O chip, connected through the south bridge, which supports the slowest and most legacy components like serial ports, hardware monitoring and fan control.</li><li><span style=\"font-weight: bold; \">Random-access memory (RAM)</span>, which stores the code and data that are being actively accessed by the CPU. For example, when a web browser is opened on the computer it takes up memory; this is stored in the RAM until the web browser is closed. It is typically a type of dynamic RAM (DRAM), such as synchronous DRAM (SDRAM), where MOS memory chips store data on memory cells consisting of MOSFETs and MOS capacitors. RAM usually comes on dual in-line memory modules (DIMMs) in the sizes of 2GB, 4GB, and 8GB, but can be much larger.</li><li><span style=\"font-weight: bold; \">Read-only memory (ROM)</span>, which stores the BIOS that runs when the computer is powered on or otherwise begins execution, a process known as Bootstrapping, or "booting" or "booting up". The ROM is typically a nonvolatile BIOS memory chip, which stores data on floating-gate MOSFET memory cells.</li><li><span style=\"font-weight: bold; \">The BIOS (Basic Input Output System)</span> includes boot firmware and power management firmware. Newer motherboards use Unified Extensible Firmware Interface (UEFI) instead of BIOS.</li><li><span style=\"font-weight: bold; \">Buses</span> that connect the CPU to various internal components and to expand cards for graphics and sound.</li><li><span style=\"font-weight: bold; \">The CMOS</span> (complementary MOS) battery, which powers the CMOS memory for date and time in the BIOS chip. This battery is generally a watch battery.</li><li><span style=\"font-weight: bold; \">The video card</span> (also known as the graphics card), which processes computer graphics. More powerful graphics cards are better suited to handle strenuous tasks, such as playing intensive video games or running computer graphics software. A video card contains a graphics processing unit (GPU) and video memory (typically a type of SDRAM), both fabricated on MOS integrated circuit (MOS IC) chips.</li><li><span style=\"font-weight: bold; \">Power MOSFETs</span> make up the voltage regulator module (VRM), which controls how much voltage other hardware components receive.</li></ul>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Expansion cards</span></span>\r\nAn expansion card in computing is a printed circuit board that can be inserted into an expansion slot of a computer motherboard or backplane to add functionality to a computer system via the expansion bus. Expansion cards can be used to obtain or expand on features not offered by the motherboard.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Storage devices</span></span>\r\nA storage device is any computing hardware and digital media that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device. Data storage is a core function and fundamental component of computers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Fixed media</span></span>\r\nData is stored by a computer using a variety of media. Hard disk drives (HDDs) are found in virtually all older computers, due to their high capacity and low cost, but solid-state drives (SSDs) are faster and more power efficient, although currently more expensive than hard drives in terms of dollar per gigabyte, so are often found in personal computers built post-2007. SSDs use flash memory, which stores data on MOS memory chips consisting of floating-gate MOSFET memory cells. Some systems may use a disk array controller for greater performance or reliability.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Removable media</span></span>\r\nTo transfer data between computers, an external flash memory device (such as a memory card or USB flash drive) or optical disc (such as a CD-ROM, DVD-ROM or BD-ROM) may be used. Their usefulness depends on being readable by other systems; the majority of machines have an optical disk drive (ODD), and virtually all have at least one Universal Serial Bus (USB) port.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input and output peripherals</span></span>\r\nInput and output devices are typically housed externally to the main computer chassis. The following are either standard or very common to many computer systems.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input</span></span>\r\nInput devices allow the user to enter information into the system, or control its operation. Most personal computers have a mouse and keyboard, but laptop systems typically use a touchpad instead of a mouse. Other input devices include webcams, microphones, joysticks, and image scanners.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Output device</span></span>\r\nOutput devices display information in a human readable form. Such devices could include printers, speakers, monitors or a Braille embosser.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Mainframe computer</span></span>\r\nA mainframe computer is a much larger computer that typically fills a room and may cost many hundreds or thousands of times as much as a personal computer. They are designed to perform large numbers of calculations for governments and large enterprises.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Departmental computing</span></span>\r\nIn the 1960s and 1970s, more and more departments started to use cheaper and dedicated systems for specific purposes like process control and laboratory automation.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supercomputer</span></span>\r\nA supercomputer is superficially similar to a mainframe, but is instead intended for extremely demanding computational tasks. As of June 2018, the fastest supercomputer on the TOP500supercomputer list is the Summit, in the United States, with a LINPACK benchmarkscore of 122.3 PFLOPS Light, by around 29 PFLOPS.\r\nThe term supercomputer does not refer to a specific technology. Rather it indicates the fastest computations available at any given time. In mid 2011, the fastest supercomputers boasted speeds exceeding one petaflop, or 1 quadrillion (10^15 or 1,000 trillion) floating point operations per second. Supercomputers are fast but extremely costly, so they are generally used by large organizations to execute computationally demanding tasks involving large data sets. Supercomputers typically run military and scientific applications. Although costly, they are also being used for commercial applications where huge amounts of data must be analyzed. For example, large banks employ supercomputers to calculate the risks and returns of various investment strategies, and healthcare organizations use them to analyze giant databases of patient data to determine optimal treatments for various diseases and problems incurring to the country. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Hardware.jpg"},{"id":513,"title":"Networking","alias":"networking","description":" Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network. Specifically, they mediate data transmission in a computer network. Units which are the last receiver or generate data are called hosts or data terminal equipment.\r\nNetworking devices may include gateways, routers, network bridges, modems, wireless access points, networking cables, line drivers, switches, hubs, and repeaters; and may also include hybrid network devices such as multilayer switches, protocol converters, bridge routers, proxy servers, firewalls, network address translators, multiplexers, network interface controllers, wireless network interface controllers, ISDN terminal adapters and other related hardware.\r\nThe most common kind of networking hardware today is a copper-based Ethernet adapter which is a standard inclusion on most modern computer systems. Wireless networking has become increasingly popular, especially for portable and handheld devices.\r\nOther networking hardware used in computers includes data center equipment (such as file servers, database servers and storage areas), network services (such as DNS, DHCP, email, etc.) as well as devices which assure content delivery.\r\nTaking a wider view, mobile phones, tablet computers and devices associated with the internet of things may also be considered networking hardware. As technology advances and IP-based networks are integrated into building infrastructure and household utilities, network hardware will become an ambiguous term owing to the vastly increasing number of network capable endpoints.","materialsDescription":" <span style=\"font-weight: bold;\">What is network equipment?</span>\r\nNetwork equipment - devices necessary for the operation of a computer network, for example: a router, switch, hub, patch panel, etc. You can distinguish between active and passive network equipment.\r\n<span style=\"font-weight: bold;\">What is an active network equipment?</span>\r\nActive networking equipment is equipment followed by some “smart” feature. That is, a router, switch (switch), etc. are active network equipment.\r\n<span style=\"font-weight: bold;\">What is passive network equipment?</span>\r\nPassive network equipment - equipment not endowed with "intellectual" features. For example - cable system: cable (coaxial and twisted pair (UTP/STP)), plug / socket (RG58, RJ45, RJ11, GG45), repeater (repeater), patch panel, hub (hub), balun (balun) for coaxial cables (RG-58), etc. Also, passive equipment can include mounting cabinets and racks, telecommunication cabinets.\r\n<span style=\"font-weight: bold;\">What are the main network components?</span>\r\nThe main components of the network are workstations, servers, transmission media (cables) and network equipment.\r\n<span style=\"font-weight: bold;\">What are workstations?</span>\r\nWorkstations are network computers where network users implement application tasks.\r\n<span style=\"font-weight: bold;\">What are network servers?</span>\r\nNetwork servers - hardware and software systems that perform the functions of controlling the distribution of network shared resources. A server can be any computer connected to the network on which the resources used by other devices on the local network are located. As the server hardware, fairly powerful computers are used.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Networking.png"},{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-precision-workstations":{"id":67,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Rabochie_stancii_Dell_Precision.jpg","logo":true,"scheme":false,"title":"Dell Precision Workstations","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-precision-workstations","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-size: 1.153em; font-weight: 300; line-height: 1.3em; text-rendering: optimizeLegibility; font-family: Museo, "Trebuchet MS", Arial !important; \">Precision Mobile Workstations - For professional creators</h2>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \">Highest performing and fully customizable workstations certified with professional applications.</p>\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-size: 1.153em; font-weight: 300; line-height: 1.3em; text-rendering: optimizeLegibility; font-family: Museo, "Trebuchet MS", Arial !important; \">Precision Fixed Workstations - For professional creators</h2>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \">Highest performing and fully customizable workstations certified with professional applications.</p>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \"></p>","shortDescription":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Precision Workstations","keywords":"professional, Workstations, Precision, workstations, performing, Highest, -For, creators","description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image:","og:title":"Dell Precision Workstations","og:description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image:","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Rabochie_stancii_Dell_Precision.jpg"},"eventUrl":"","translationId":96,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":453,"title":"Desktop PC","alias":"desktop-pc","description":" A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements. The most common configuration has a case that houses the power supply, motherboard (a printed circuit board with a microprocessor as the central processing unit (CPU), memory, bus, and other electronic components), disk storage (usually one or more hard disk drives, solid state drives, optical disc drives, and in early models a floppy disk drive); a keyboard and mouse for input; and a computer monitor, speakers, and, often, a printer for output. The case may be oriented horizontally or vertically and placed either underneath, beside, or on top of a desk.\r\nDesktop computers are designed to work at the table. Usually, they are bigger and more powerful than other types of personal computers. Desktop computers are made up of individual components. The main component is called the system unit - usually, it is a rectangular case that is on or under the table. Other components, such as the monitor, mouse and keyboard, are connected to the system unit.\r\nAs a rule, all additional external devices are connected to the PC system unit using special connectors. Their main part is located on its rear wall. Some, the most popular ones, are brought to the front, for example, USB connectors and audio outputs. The system unit itself consists of internal devices, called components.","materialsDescription":" Main components of the desktop system unit:\r\n<ul><li><span style=\"font-weight: bold;\">A CPU</span> is the main information processing and computer control device.</li><li><span style=\"font-weight: bold;\">A video card</span> is a device for processing two-dimensional and three-dimensional graphics, as well as displaying an image on a monitor (screen).</li><li><span style=\"font-weight: bold;\">RAM</span> - used for short-term storage of data during operation of the computer. When it is turned off, the information recorded in the RAM disappears.</li><li><span style=\"font-weight: bold;\">A storage device (hard disk)</span> - used as the primary means for storing all user data and programs. Its capacity is much more than the amount of RAM, however, the speed of reading and writing information is less than when working with RAM.</li><li><span style=\"font-weight: bold;\">A motherboard</span> is a complex device that combines all the components of a personal computer and ensures their well-coordinated work.</li><li><span style=\"font-weight: bold;\">An optical drive</span> - a device for reading and writing information on optical CDs, DVDs and Blue-ray discs.</li><li><span style=\"font-weight: bold;\">A case</span> - protects all components from harmful external influences (for example, moisture) and gives an aesthetic look to your computer.</li><li><span style=\"font-weight: bold;\">A power supply unit</span> converts the alternating current of ordinary electric networks of high voltage (220 Volt) into direct current of low voltage (12 V, 5 V and 3 V), required for powering computer components.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_PC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-wyse-3040-thin-client":{"id":769,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg","logo":true,"scheme":false,"title":"Dell Wyse 3040 Thin Client","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-wyse-3040-thin-client","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of virtual desktops including Citrix, Microsoft and VMware environments and provides essential protocol and peripheral support, including optional PCoIP.\r\nWyse 3040 Thin Client - Save energy. Save money<span style=\"white-space:pre\">\t</span>Save energy. Save money: An affordable price point keeps your initial investment low while power-efficient operation of less than 5 watts maintains cost-effectiveness from one day to the next.\r\nWyse 3040 Thin Client - Makes management a snap<span style=\"white-space:pre\">\t</span>Makes management a snap: Easily manage your Wyse 3040 thin client with Dell Wyse Device Manager (WDM) or Cloud Client Manager (CCM). Powerful, easy-to-use and highly scalable, WDM software enables you to configure, monitor and manage Dell Wyse devices.","shortDescription":"At the top of its class: With strong performance featuring Intel® Quad Core processors, Wyse 3040 delivers the best virtual desktop experience of any thin client solution in its class.\r\nWell connected: Wyse 3040 features wireless and wired network connectivity, with two DisplayPort interfaces, 4 USB ports—including 1 USB 3.1 and an AC wireless with optional Bluetooth.\r\nPick the OS that works for you: Wyse 3040 supports both ThinOS and ThinLinux (coming soon), so task and productivity users can choose the system that fits their needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Wyse 3040 Thin Client","keywords":"Wyse, 3040, Client, Save, Thin, Dell, setup, management","description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of","og:title":"Dell Wyse 3040 Thin Client","og:description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg"},"eventUrl":"","translationId":770,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-bleid-massiv-equallogic-ps-m4110":{"id":865,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Bleid-massiv_EqualLogic_PS-M4110.png","logo":true,"scheme":false,"title":"DELL Блейд-массив EqualLogic PS-M4110","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-bleid-massiv-equallogic-ps-m4110","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к питанию и охлаждению.\r\n\r\nИнтеграция системы хранения данных корпоративного класса с блейд-серверами\r\nПолучите максимально гибкую систему хранения данных для блейд-среды благодаря блейд-массиву двойной ширины и половинной высоты, который можно установить в любом отсеке корпуса PowerEdge M1000e.\r\n\r\nПростое расширение системы хранения данных\r\nОтличная одноранговая архитектура EqualLogic, обеспечивающая линейное масштабирование, позволит сэкономить время благодаря одновременному масштабированию емкости и производительности системы хранения данных.\r\n\r\nУпрощение управления и снижение риска\r\nПоложитесь на возможности централизованного мониторинга и составления отчетов, а также мощные средства защиты данных, реализованные благодаря комплексному набору расширенных функций блейд-массива EqualLogic PS-M4110.\r\n\r\nСистема хранения данных Equallogic PS M4110 \r\nБлейд-массив EqualLogic PS-M4110 предлагается в четырех различных конфигурациях.\r\n\r\nPS-M4110E\r\nПовысьте емкость и производительность, а также расширьте возможности подключения системы хранения данных на вашем малом или среднем предприятии, воспользовавшись экономичными блейд-массивами с протоколом iSCSI 10GbE EqualLogic PS-M4110E.\r\n\r\nPS-M4110X\r\nРазверните блейд-массив iSCSI Dell EqualLogic PS-M4110X 10GbE с отличным сочетанием экономичной производительности и емкости для различных приложений.\r\nБолее подробная информация\r\n\r\nPS-M4110XV\r\nВысокопроизводительные блейд-массивы iSCSI Dell EqualLogic PS-M4110XV 10GbE обеспечат эффективную работу ваших критически важных приложений.\r\n\r\nPS-M4110XS\r\nПриобретите блейд-массив 10GbE iSCSI Dell EqualLogic PS-M4110XS, и вы получите решение с расширенными функциями многоуровневого хранения данных, объединяющее в себе производительные твердотельные накопители с небольшой задержкой и жесткие диски большой емкости.","shortDescription":"Объедините системы хранения, блейд-серверы и сетевые компоненты в масшабируемый виртуализированный центр обработки данных с помощью блейд-массива Dell™ EqualLogic™ PS-M4110.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Блейд-массив EqualLogic PS-M4110","keywords":"данных, хранения, EqualLogic, системы, 10GbE, iSCSI, благодаря, PS-M4110","description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к пит","og:title":"DELL Блейд-массив EqualLogic PS-M4110","og:description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к пит","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Bleid-massiv_EqualLogic_PS-M4110.png"},"eventUrl":"","translationId":7014,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-obshchaja-infrastruktura-konvergentnye-platformy":{"id":868,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Obshchaja_infrastruktura_-_Konvergentnye_platformy.jpg","logo":true,"scheme":false,"title":"DELL Общая инфраструктура - Конвергентные платформы","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-obshchaja-infrastruktura-konvergentnye-platformy","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые задачи.\r\n\r\nБлейд-сервер PowerEdge M520\r\nСервер PowerEdge™ M520 предлагает невероятно эффективную работу и исключительные преимущества для бизнес-приложений, а также беспрецедентный набор функций корпоративного класса.\r\n\r\nБлейд-сервер PowerEdge M620\r\nБлейд-сервер PowerEdge™ M620 справится с самыми ресурсоемкими рабочими нагрузками. Это идеальное сочетание высокой плотности установки, производительности, эффективности и масштабируемости.\r\n\r\nБлейд-сервер PowerEdge M915\r\nПовысьте эффективность, производительность и гибкость центра обработки данных благодаря блейд-серверу максимальной высоты PowerEdge M915 с процессорами AMD, максимальной полосой пропускания и функциями управления корпоративного класса.","shortDescription":"Dell PowerEdge VRTX PowerEdge VRTX интегрирует серверы, системы хранения данных, сетевые компоненты и средства управления в компактной инфраструктуре совместного использования, оптимизированной для офисных сред.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Общая инфраструктура - Конвергентные платформы","keywords":"Блейд-сервер, PowerEdge, PowerEdge™, эффективность, M520, корпоративного, класса, M620","description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые за","og:title":"DELL Общая инфраструктура - Конвергентные платформы","og:description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые за","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Obshchaja_infrastruktura_-_Konvergentnye_platformy.jpg"},"eventUrl":"","translationId":7016,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"},{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-servery-poweredge-v-korpuse-tower":{"id":855,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Servery_PowerEdge_v_korpuse_Tower.jpg","logo":true,"scheme":false,"title":"DELL Серверы PowerEdge в корпусе Tower","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-servery-poweredge-v-korpuse-tower","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для консолидации данных и ускорения работы приложений в масштабах малого или среднего предприятия, небольшого офиса или домашнего офиса.\r\nПодробнее\r\nPowerEdge T20\r\nИдеальный вариант для обеспечения совместной работы, хранения файлов, обмена данными и их защиты внутри компактного и бесшумного сервера в корпусе Mini-Tower.\r\nПодробнее\r\nНовинка Сервер PowerEdge T30 в корпусе Mini-Tower\r\nИдеальный вариант для совместной работы, хранения файлов, общего доступа и защиты данных в небольших и домашних офисах.\r\n\r\nСервер PowerEdge T320 в корпусе Tower\r\nОбеспечьте надежную работу основных бизнес-приложений, используя надежность и гибкость сервера PowerEdge™ T320 в корпусе Tower.\r\n\r\nСервер PowerEdge T330 в корпусе Tower\r\nМощный и расширяемый однопроцессорный сервер в корпусе Tower позволяет ускорить работу приложений, используемых на малых и средних предприятиях, а также в удаленных офисах и филиалах, и развиваться в соответствии с вашими потребностями в данных.\r\n\r\nСервер PowerEdge T420 в корпусе Tower\r\nБлагодаря высокой мощности, большому объему памяти и расширенной пропускной способности ввода-вывода, которые отличают сервер PowerEdge™ T420 в корпусе Tower, вашей организации будет обеспечена высокая производительность, масштабируемость и надежность.\r\n\r\nСервер PowerEdge T430 в корпусе Tower\r\nПовышение производительности в офисной среде благодаря с помощью мощного двухпроцессорного сервера в корпусе Tower с расширяемой конструкцией и низким уровнем шума.\r\n\r\nСервер PowerEdge T630 в корпусе Tower\r\nСправляйтесь с широким диапазоном ресурсоемких рабочих нагрузок благодаря гибкому двухпроцессорному серверу с максимальной производительностью и огромной емкостью внутренней системы хранения данных.","shortDescription":"Независимо от того, работаете ли вы дома или в небольшом офисе, серверы Dell PowerEdge в корпусе Tower идеально подойдут для ваших потребностей в области ИТ. Ознакомьтесь с нашими продуктами уже сегодня. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Серверы PowerEdge в корпусе Tower","keywords":"корпусе, Tower, PowerEdge, Сервер, данных, сервер, Mini-Tower, работы","description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для к","og:title":"DELL Серверы PowerEdge в корпусе Tower","og:description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для к","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Servery_PowerEdge_v_korpuse_Tower.jpg"},"eventUrl":"","translationId":7010,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-stoechnyi-server-poweredge-c6320":{"id":866,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Modulnaja_infrastruktura.png","logo":true,"scheme":false,"title":"DELL Стоечный сервер PowerEdge C6320","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-stoechnyi-server-poweredge-c6320","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью, оснащенное процессорами Intel® Xeon® E5-2600 v4 нового поколения с увеличенным числом ядер по сравнению с предыдущими моделями E5-2600 v3, а также с поддержкой памяти объемом до 512 Гбайт на серверный узел с общим объемом до 2 Тбайт.\r\nИнтегрированный контроллер удаленного доступа Dell iDRAC8 с контроллером жизненного цикла (оптимальная стоимость при использовании с C6320) для обеспечения стабильного, эффективного управления серверами в физических, виртуальных, локальных и удаленных средах\r\nУниверсальные конфигурации с жесткими дисками высокой емкости с шириной 2,5 и 3,5 дюйма\r\n16 разъемов для модулей памяти DIMM позволяют адаптировать объем памяти (до 512 Гбайт1) под ваши потребности\r\nПамять DDR4 обеспечивает увеличение пропускной способности на 15% и сокращение энергопотребления до 30% по сравнению с ОЗУ DDR3\r\n\r\nМаксимальная универсальность\r\n\r\nЭкономия пространства и поддержка меняющихся нагрузок за счет оптимального сочетания производительности процессоров, вариантов узлов и функций энергосбережения, а также благодаря возможности использования до четырех независимых салазок (серверных узлов) и поддержке различного числа жестких дисков в одном шасси с форм-фактором 2U.\r\nДо 44 ядер на узел, 176 ядер на шасси\r\nДо 24 (шириной 2,5 дюйма) или 12 (шириной 3,5 дюйма) накопителей SAS, SATA или твердотельных накопителей с возможностью горячей замены в каждом шасси\r\nДва высокоэффективных блока питания мощностью 1 400 Вт и 1 600 Вт с возможностью горячей замены\r\nОпциональное встроенное загрузочное устройство SATA DOM (64 Гбайта) позволяет освободить ценное пространство на жестком диске для данных\r\nОдин разъем x16 PCIe 3.0 и один мезонинный разъем x8 PCIe 3.0 для салазок с форм-фактором 1U\r\nВстроенный модуль LOM: 2 порта 10GbE (SFP+)\r\n\r\nПовышение эффективности работы\r\n\r\nПростое управление серверами PowerEdge C6320 благодаря автоматическому выполнению стандартных задач по управлению жизненным циклом с помощью технологий Dell OpenManage на основе iDRAC8 со встроенным контроллером жизненного цикла без использования агентов, который работает как автономно, так и в сочетании с другими компонентами Dell OpenManage и средствами управления сторонних производителей, включая следующие:\r\nOpenManage Essentials\r\nИнтеграция Dell для BMC BladeLogic\r\nMicrosoft System Center\r\nVMware vCenter\r\nЭти средства позволяют оптимизировать операции в существующей среде управления ИТ.\r\nУпрощение задач управления\r\n\r\nIDRAC с контроллером жизненного цикла предоставляет полный набор функций управления сервером (включая конфигурацию, развертывание ОС, обновления микропрограмм, мониторинг состояния и техническое обслуживание), которые работают независимо от состояния операционной системы и наличия гипервизора.\r\n <span style=\"white-space:pre\">\t</span>\r\nБез агентов — мониторинг производительности основной памяти, ЦП и системы ввода-вывода и настройка пользовательских пороговых значений для оповещения по протоколу SNMP, Racadm или WSman — и все это без агентов ОС или какого-либо влияния на операционную систему или серверные компоненты.\r\n \r\nКонтроллер жизненного цикла — локальное развертывание и упрощенное обслуживание с помощью средства, интегрируемого с Dell OpenManage Essentials и консолями сторонних производителей.\r\n poweredge-c6320-Автоматическое развертывание и выделение ресурсов <span style=\"white-space:pre\">\t</span>Автоматическое развертывание и выделение ресурсов — автоматическая настройка серверов и опциональная возможность планирования проверок работоспособности с автоматическими изменениями конфигурации (требуется iDRAC Enterprise Edition).\r\n\r\nКрупномасштабные среды\r\n\r\nИспользуйте возможности гипермасштабирования C6320 для сред с высокими требованиями к производительности и с интенсивной рабочей нагрузкой.\r\n \r\nВысокопроизводительные вычисления — внедрение высокопроизводительных массово-параллельных вычислений с малой задержкой для кластеров с высокой плотностью, которым требуется высокая масштабируемость с максимальной производительностью на одно стойко-место.\r\nАналитика и большие объемы данных — поддержка крупномасштабного анализа данных благодаря максимальной плотности вычислений и возможности адаптации серверных конфигураций к изменяющимся нагрузкам.\r\nОблако — существенная масштабируемость и высокая плотность помогают поставщикам облачных сервисов и услуг хостинга сократить капитальные расходы и максимально повысить уровень производительности на кв. фут из расчета на ватт.\r\nWeb 2.0 — обеспечение соответствия серверной инфраструктуры крупным нагрузкам веб-хостинга, а также исключение выделения избыточных ресурсов благодаря высокой масштабируемости и универсальным вариантам быстрой конфигурации.","shortDescription":"Оптимизация производительности вычислений.\r\nМаксимизируйте производительность гипермасштабируемых систем благодаря поддержке до четырех независимых серверных узлов, различных конфигураций накопителей и общей инфраструктуры в компактном корпусе с форм-фактором 2U.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Стоечный сервер PowerEdge C6320","keywords":"Dell, управления, C6320, производительности, OpenManage, высокой, развертывание, памяти","description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью,","og:title":"DELL Стоечный сервер PowerEdge C6320","og:description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью,","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Modulnaja_infrastruktura.png"},"eventUrl":"","translationId":7015,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-upravlenie-klientskimi-sistemami":{"id":869,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Upravlenie_klientskimi_sistemami.jpg","logo":true,"scheme":false,"title":"DELL Управление клиентскими системами","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-upravlenie-klientskimi-sistemami","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для развертывания Dell KACE K2000\r\nУстройства для развертывания Dell KACE K2000 удовлетворяют потребности в развертывании систем, включая оценку ресурсов, развертывание ОС, установку приложений, настройку и восстановление.","shortDescription":"С помощью упрощенного комплексного подхода к развертыванию систем организации стремятся сэкономить время и деньги и повысить эффективность работы ИТ-отделов.\r\nЗащита данных\r\nDell KACE K1000\r\nDell KACE K2000","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Управление клиентскими системами","keywords":"Dell, KACE, развертывания, Устройства, управления, удовлетворяют, K2000, K1000","description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для разве","og:title":"DELL Управление клиентскими системами","og:description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для разве","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Upravlenie_klientskimi_sistemami.jpg"},"eventUrl":"","translationId":7017,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"jira":{"id":1372,"logoURL":"https://old.roi4cio.com/fileadmin/content/JIRA-Logo-1.jpg","logo":true,"scheme":false,"title":"Jira","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"jira","companyTitle":"Atlassian Software Systems","companyTypes":["supplier","vendor"],"companyId":4158,"companyAlias":"atlassian-software-systems","description":"Jira is a commercial error tracking system designed to organize interaction with users, although in some cases it is used to manage projects. Developed by Atlassian, it is one of its two main products (along with Confluence wiki). It has a web interface. The system is based on Java EE and works on several popular database management systems and operating systems. The main element of accounting in the system is the task (English ticket or issue). The task contains the project name, topic, type, priority, components and content. A task can be expanded with additional fields (new user fields can also be defined), applications (for example, photos, screenshots) or comments. The task can be edited or simply change the status, for example, from “open” to “closed”. What transitions between states are possible is determined through a custom workflow. Any changes to the task are logged. Jira has a large number of configuration options: for each application, a separate type of task can be defined with its own workflow, a set of statuses, one or several types of views (English screens). In addition, using the so-called “schemes”, you can define for each individual Jira project your own access rights, the behavior and visibility of fields, and much more. Thanks to the universal approach, Jira can be adapted for many non-core tasks, for example, requirements management, risk management, up to the implementation of a small reservation system, and automation of the recruiting process.","shortDescription":"Jira Software allows you to fix, track and fix bugs, as well as perform assigned tasks at all stages of the software development process.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Jira","keywords":"","description":"Jira is a commercial error tracking system designed to organize interaction with users, although in some cases it is used to manage projects. Developed by Atlassian, it is one of its two main products (along with Confluence wiki). It has a web interface. The s","og:title":"Jira","og:description":"Jira is a commercial error tracking system designed to organize interaction with users, although in some cases it is used to manage projects. Developed by Atlassian, it is one of its two main products (along with Confluence wiki). It has a web interface. The s","og:image":"https://old.roi4cio.com/fileadmin/content/JIRA-Logo-1.jpg"},"eventUrl":"","translationId":1784,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":43,"title":"QA Bug tracking systems"}],"testingArea":"","categories":[{"id":808,"title":"Bug tracking systems","alias":"bug-tracking-systems","description":" A bug tracking system or defect tracking system is a software application that keeps track of reported software bugs in software development projects. It may be regarded as a type of issue tracking system.\r\nMany bug tracking systems, such as those used by most open-source software projects, allow end-users to enter bug reports directly. Other systems are used only internally in a company or organization doing software development. Typically bug tracking systems are integrated with other project management software.\r\nA bug tracking system is usually a necessary component of a good software development infrastructure, and consistent use of a bug or issue tracking system is considered one of the "hallmarks of a good software team".\r\nA major component of a bug tracking system is a database that records facts about known bugs. Facts may include the time a bug was reported, its severity, the erroneous program behavior, and details on how to reproduce the bug; as well as the identity of the person who reported it and any programmers who may be working on fixing it.\r\nTypical bug tracking systems support the concept of the life cycle for a bug which is tracked through the status assigned to the bug. A bug tracking system should allow administrators to configure permissions based on status, move the bug to another status, or delete the bug. The system should also allow administrators to configure the bug statuses and to what extent a bug in a particular status can be moved. Some systems will e-mail interested parties, such as the submitter and assigned programmers, when new records are added or the status changes.\r\nThe main benefit of a bug-tracking system is to provide a clear centralized overview of development requests (including both bugs and improvements, the boundary is often fuzzy), and their state. The prioritized list of pending items (often called backlog) provides valuable input when defining the product road map, or maybe just "the next release".\r\nIn a corporate environment, a bug-tracking system may be used to generate reports on the productivity of programmers at fixing bugs. However, this may sometimes yield inaccurate results because different bugs may have different levels of severity and complexity. The severity of a bug may not be directly related to the complexity of fixing the bug. There may be different opinions among the managers and architects.\r\nA local bug tracker (LBT) is usually a computer program used by a team of application support professionals (often a help desk) to keep track of issues communicated to software developers. Using an LBT allows support professionals to track bugs in their "own language" and not the "language of the developers." In addition, an LBT allows a team of support professionals to track specific information about users who have called to complain — this information may not always be needed in the actual development queue. Thus, there are two tracking systems when an LBT is in place.","materialsDescription":" <span style=\"font-weight: bold;\">What does Bug Tracking mean?</span>\r\nBug tracking is a process used by quality assurance personnel and programmers to keep track of software problems and resolutions. A bug tracking system is normally put in place to store information about reported bugs. This type of issue-tracking system provides a clear, centralized overview of development requests and their corresponding states.\r\nBug tracking enables users to enter bug reports directly into a system that logs and tracks them. Diligent use of a bug tracking system provides a record of a software team's effectiveness. Local bug trackers are often used by teams of application support professionals to keep track of issues communicated to software developers.\r\nBug tracking systems include a database, which keeps track of facts pertaining to each bug. These facts might include the time a bug was reported, its severity, incorrect program behavior, details on how to recreate the bug,who reported the bug and what the programmers did to fix it. Bug tracking systems are associated with a bug's life cycle, which is tracked through the status assigned to each bug. This allows administrators to set permissions based on a bug's status, move bugs to other statuses or delete them.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon-bug-tracking-systems.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"luisai":{"id":4105,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Luis.ai","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"luisai","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Language Understanding (LUIS) is a machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.</p>\r\n<p><span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">Benefits:</span></span></p>\r\n<p><span style=\"font-weight: bold;\">Add natural language to your apps</span></p>\r\n<p>Designed to identify valuable information in conversations, LUIS interprets user goals (intents) and distills valuable information from sentences (entities), for a high quality, nuanced language model. LUIS integrates seamlessly with the Azure Bot Service, making it easy to create a sophisticated bot.</p>\r\n<p><span style=\"font-weight: bold;\">Quickly build a custom language solution</span></p>\r\n<p>Powerful developer tools are combined with customizable pre-built apps and entity dictionaries, such as Calendar, Music, and Devices, so you can build and deploy a solution more quickly. Dictionaries are mined from the collective knowledge of the web and supply billions of entries, helping your model to correctly identify valuable information from user conversations.</p>\r\n<p><span style=\"font-weight: bold;\">Always learning and improving</span></p>\r\n<p>Active learning is used to continuously improve the quality of natural language models. Once the model starts processing input, LUIS begins active learning, allowing you to constantly update and improve the model.</p>\r\n<p><span style=\"font-weight: bold;\">Enterprise-ready, available worldwide</span></p>\r\n<p>The service is ready to be deployed in commercial applications and can scale with enterprise quality and performance. The service meets international compliance standards, supports 13 languages and available worldwide, making it highly accessible around the world.</p>","shortDescription":"A machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Luis.ai","keywords":"","description":"<p>Language Understanding (LUIS) is a machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.</p>\r\n<p><span style=\"text-decoration: underline;\"><span s","og:title":"Luis.ai","og:description":"<p>Language Understanding (LUIS) is a machine learning-based service to build natural language into apps, bots, and IoT devices. Quickly create enterprise-ready, custom models that continuously improve.</p>\r\n<p><span style=\"text-decoration: underline;\"><span s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":4106,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":103,"title":"Chatbot Development"}],"testingArea":"","categories":[{"id":842,"title":"Chatbot Development","alias":"chatbot-development","description":"A chatbot is a piece of software that conducts a conversation via auditory or textual methods. Such programs are often designed to convincingly simulate how a human would behave as a conversational partner, although as of 2019, they are far short of being able to pass the Turing test. Chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition. Some chatbots use sophisticated natural language processing systems, but many simpler ones scan for keywords within the input, then pull a reply with the most matching keywords, or the most similar wording pattern, from a database.\r\nThe term "ChatterBot" was originally coined by Michael Mauldin (creator of the first Verbot, Julia) in 1994 to describe these conversational programs. Today, most chatbots are accessed via virtual assistants such as Google Assistant and Amazon Alexa, via messaging apps such as Facebook Messenger or WeChat, or via individual organizations' apps and websites. Chatbots can be classified into usage categories such as conversational commerce (e-commerce via chat), analytics, communication, customer support, design, developer tools, education, entertainment, finance, food, games, health, HR, marketing, news, personal, productivity, shopping, social, sports, travel and utilities.\r\nBeyond chatbots, Conversational AI refers to the use of messaging apps, speech-based assistants and chatbots to automate communication and create personalized customer experiences at scale.\r\nThe process of building, testing and deploying chatbots can be done on cloud-based chatbot development platforms offered by cloud Platform as a Service (PaaS) providers such as Oracle Cloud Platform SnatchBot and IBM Watson. These cloud platforms provide Natural Language Processing, Artificial Intelligence and Mobile Backend as a Service for chatbot development.\r\nSome Companies like Microsoft Azure and AARC are currently providing their Bot Engines through which chatbot Platforms or Software can be developed.","materialsDescription":"New tools designed to simplify the interaction between humans and computers have hit the market: Chatbots or Virtual Assistants. In banking, chatbots and virtual assistants are some of the industry’s newest tools designed to simplify the interaction between humans and computers.\r\n<span style=\"font-weight: bold;\">What is a chatbot?</span>\r\nA chatbot is artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.\r\n<span style=\"font-weight: bold;\">Why are chatbots important?</span>\r\nA chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question-Answering system leveraging Natural Language Processing (NLP). Formulating responses to questions in natural language is one of the most typical examples of Natural Language Processing applied in various enterprises’ end-use applications.\r\n<span style=\"font-weight: bold;\">How does a chatbot work?</span>\r\nThere are two different tasks at the core of a chatbot:\r\n<ol><li>user request analysis</li><li>returning the response</li></ol>\r\nUser request analysis: this is the first task that a chatbot performs. It analyzes the user’s request to identify the user intent and to extract relevant entities.\r\nThe ability to identify the user’s intent and extract data and relevant entities contained in the user’s request is the first condition and the most relevant step at the core of a chatbot: If you are not able to correctly understand the user’s request, you won’t be able to provide the correct answer.\r\nReturning the response: once the user’s intent has been identified, the chatbot must provide the most appropriate response for the user’s request. The answer may be:\r\n<ul><li>a generic and predefined text;</li><li>a text retrieved from a knowledge base that contains different answers;</li><li>a contextualized piece of information based on data the user has provided;</li><li>data stored in enterprise systems;</li><li>the result of an action that the chatbot performed by interacting with one or more backend application;</li><li>a disambiguating question that helps the chatbot to correctly understand the user’s request.</li></ul>\r\n<span style=\"font-weight: bold;\">In what is the benefit of chatbots?</span>\r\nChatbot applications streamline interactions between people and services, enhancing the customer experience. At the same time, they offer companies new opportunities to improve the customer's engagement process and operational efficiency by reducing the typical cost of customer service.\r\nTo be successful, a chatbot solution should be able to effectively perform both of these tasks. Human support plays a key role here: Regardless of the kind of approach and the platform, human intervention is crucial in configuring, training and optimizing the chatbot system.\r\n<span style=\"font-weight: bold;\">Which chatbot application is right for you?</span>\r\nThere are different approaches and tools that you can use to develop a chatbot. Depending on the use case you want to address, some chatbot technologies are more appropriate than others. In order to achieve the desired results, the combination of different AI forms such as natural language processing, machine learning, and semantic understanding may be the best option.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Chatbot_Development.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-365":{"id":64,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_365.jpg","logo":true,"scheme":false,"title":"Microsoft 365","vendorVerified":0,"rating":"4.00","implementationsCount":8,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-365","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p><span style=\"font-weight: bold;\">Microsoft 365</span> is the productivity cloud that brings together best-in-class Office apps with powerful cloud services, device management, and advanced security.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Be more productive wherever you are</span></p>\r\n<p>Connect employees to the people, information, and content they need to do their best work, from any device.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Comes with Office apps</span></span></p>\r\n<p>Stay up to date with the latest versions of Word, Excel, PowerPoint, and more.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Email and calendaring</span></span></p>\r\n<p>Connect with customers and coworkers using Outlook and Exchange.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Chat, call, and meet</span></span></p>\r\n<p>Keep your team on the same page with group chat, online meetings, and calling in Microsoft Teams.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Cloud storage</span></span></p>\r\n<p>Manage your files from anywhere with 1 TB of OneDrive storage.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Don’t drown in paperwork</span></p>\r\n<p>Transform the way you manage your business and simplify the way work gets done with modern tools that streamline business processes.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Manage customer appointments</span></span></p>\r\n<p>Simplify how customers schedule and manage appointments with Bookings.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capture employee and customer insights</span></span></p>\r\n<p>Create surveys, polls, and questionnaires to gather data and insights with Microsoft Forms.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Make repetitive tasks easy</span></span></p>\r\n<p>Automate everyday business processes with Power Automate.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Works with what you have</span></span></p>\r\n<p>Sign in once to access all your tools. Microsoft 365 integrates with hundreds of third-party cloud apps.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Protect what matters most</span></p>\r\n<p>Help protect your employees, data, and customer information with enterprise-grade security you can trust.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Defend against cyberthreats</span></span></p>\r\n<p>Protect against phishing attempts, ransomware, spam, malware, viruses, malicious links, and other threats.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Keep customer data safe</span></span></p>\r\n<p>Protect sensitive business information from cybercriminals, unauthorized access, and accidental deletion.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Secure your devices</span></span></p>\r\n<p>Help keep your data safe, even when accessed on employees’ personal devices.</p>\r\n<p><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Simplify IT management</span></span></p>\r\n<p>Easily setup and manage your users, devices, and data, giving you time back to focus on running your business.</p>","shortDescription":"Microsoft 365 combines premium Office apps with Outlook, cloud storage and more, to help you make more of your time.","type":null,"isRoiCalculatorAvaliable":true,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":13,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft 365","keywords":"Office, Microsoft, software, services, storage, Server, Skype, service","description":"<p><span style=\"font-weight: bold;\">Microsoft 365</span> is the productivity cloud that brings together best-in-class Office apps with powerful cloud services, device management, and advanced security.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Be","og:title":"Microsoft 365","og:description":"<p><span style=\"font-weight: bold;\">Microsoft 365</span> is the productivity cloud that brings together best-in-class Office apps with powerful cloud services, device management, and advanced security.</p>\r\n<p> </p>\r\n<p><span style=\"font-weight: bold;\">Be","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_365.jpg"},"eventUrl":"","translationId":99,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":124,"title":"Collaboration Applications"}],"testingArea":"","categories":[{"id":267,"title":"Collaborative Applications","alias":"collaborative-applications","description":" <span style=\"font-weight: bold; \">Collaborative applications, </span>collaborative software or groupware is application software designed to help people involved in a common task to achieve their goals. One of the earliest definitions of collaborative software is "intentional group processes plus software to support them".\r\nIn terms of the level of interaction it allows, collaborative software may be divided into: real-time collaborative editing (RTCE) platforms that allow multiple users to engage in live, simultaneous and reversible editing of a single file, like document collaboration app, and version control (also known as revision control and source control) platforms, which allow separate users to make parallel edits to a file, while preserving every saved edit by every user as multiple files (that are variants of the original file). The use of collaborative software in the work space creates a collaborative working environment (CWE). \r\n<span style=\"font-weight: bold; \">There are three main categories</span> of collaboration software based on their functional capabilities. Knowing how does collaboration software work can be gleaned from the tools employed.<br /><span style=\"font-weight: bold; \">Communication.</span> Helps in the exchange of communication between groups. The most common communication tools that are used are systems and applications for email hosting, file sharing, project management and a website or online collaboration applications platform that can be readily accessed. Research findings have shown that file sharing is the most common and needed feature in collaboration software. <span style=\"font-weight: bold; \">Example tools:</span> email, voicemail, instant messaging, VoIP or video calls.\r\n<span style=\"font-weight: bold; \">Conferencing.</span> Allows real-time collaboration among members. Groupware software tools make possible real-time discussions among project members through a virtual meeting room with a moderator who oversees the sharing of information. These web based collaboration applications meetings are helpful when there are important matters to be decided on by project members who are in various locations. <span style=\"font-weight: bold; \">Example tools:</span> video conferencing, IM conferencing, online forums, social media group chats, community boards, application sharing.\r\n<span style=\"font-weight: bold; \">Coordination.</span> Assists in group activities, schedule and deliverables. Coordination software solutions are used for complex interdependent tasks to realize a common goal. Typical business collaboration app suits for time management, project management and online proofing so that team members are aware of deadlines, are properly coordinated, and can monitor the status of projects. <span style=\"font-weight: bold; \">Example tools:</span> calendars, time trackers, spreadsheets, client portals, alerts and status updates<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\">What does collaboration software do?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Internal Communication System.</span> Teams need an efficient communication system to be able to stay on task and not miss crucial aspects of ongoing projects. With many tools built into web based collaboration apps that allow all forms of communication – email, IM, voice, video – as well as mechanisms to review and retrieve conversations and discussions, team members are assured of uninterrupted coordination and kept in sync.</li><li><span style=\"font-weight: bold; \">File Sharing.</span> Like communication, the ability to share files, documents, data and all other forms of media is one of the most important features of collaboration software. Many groupware now carry robust document management systems, providing you and your team members a convenient means to share, access, view and retrieve files</li><li><span style=\"font-weight: bold; \">Content Creation.</span> Several all-in-one collaboration platforms offer content creation functionality that allows producing and publishing content both for internal and external audiences. This is useful for inbound marketing activities like creating blogs and informative content to attract new audience and enhance your business’ online presence.</li><li><span style=\"font-weight: bold; \">Powerful Search.</span> Finding old files, previous conversation or past blog post are facilitated by the robust search feature of web based collaboration software. What was previously a time-consuming process, now you can use tags and search filters to find what you’re looking for in quickly and efficiently.</li><li><span style=\"font-weight: bold; \">Personal and Group Calendars.</span> Keeping track of numerous meetings, events and other important matters that need your attention is a sure headache-inducer. Personal as well as group calendars are integral features in most collaborative platforms and mobile collaboration apps to help you and your team members stay attuned, involved and present at all times, wherever they may be.</li></ul>\r\n<h1 class=\"align-center\">What are the benefits of collaboration software? </h1>\r\nThere are a number of benefits of collaboration software that can result in more efficient and effective completion of tasks and goals. Understanding what does a collaboration software do will help you justify its implementation in your organization and bolster its adoption with your employees. The successful execution of good collaboration software will afford you many advantages. Why use collaboration software? Here are four good reasons why.\r\n<ul><li><span style=\"font-weight: bold; \">Save time</span> – Time is gold, and in a business that is tantamount to money. The more you save time, the more you save on unwanted expenses, and the better it is for your organization. Collaboration among employees makes possible the quicker completion of end goals that wouldn’t otherwise be achievable in other ways. Embracing collaboration methods cuts disparate, uncoordinated work on a particular project from different contributing members and saves not only time but also resources and efforts. If you are looking to cut costs on projects, collaboration software can help in that respect.</li><li><span style=\"font-weight: bold; \">Enhance project management</span> – Keeping a handle on a project, a team and its members and their progress are never easy to work. Coordination and communication are of paramount importance if you want a project completed. Collaboration is one of the most optimal means to guarantee that you get the most out of your team. It opens lines of communication and makes sure everything is on track in order to avoid mistakes and confusion that can delay projects.</li><li><span style=\"font-weight: bold; \">Strengthen team relationships</span> – One sure-fire way to build effective working relationships among employees is to have them work together to complete tasks and projects. Collaboration programs are designed to do that, making it easy for teams to work almost like a concerted unit with a singular purpose. This makes teams comfortable and confident in working with one another when it comes to completing common objectives.</li><li><span style=\"font-weight: bold; \">Improve organization</span> – The process of keeping things and tasks in order has always been a problem for businesses. It is typical to lose track of what has been done and what needs to be done in project workflows simply because everything is a mess. Collaborative programs assist in maintaining order and managing the stages in workflows through open communication and coordination among concerned individuals and team.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Collaborative_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-advanced-threat-analytics":{"id":2144,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Advanced_Threat_Analytics.png","logo":true,"scheme":false,"title":"Microsoft Advanced Threat Analytics","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-advanced-threat-analytics","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<p>Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats by using information from multiple data-sources in your network to learn the behavior of users and other entities in the organization and build a behavioral profile about them and by leveraging ATA's proprietary network parsing engine to capture and parse network traffic of multiple protocols.</p>\r\n<p><span style=\"font-weight: bold;\">Get peace of mind all day with advanced threat protection</span></p>\r\n<p><span style=\"font-weight: bold;\">Detect threats fast with behavioral analytics</span></p>\r\n<p>No need to create rules, fine-tune, or monitor a flood of security reports with self-learning and advanced, ready-to-analyze intelligence.</p>\r\n<p><span style=\"font-weight: bold;\">Adapt as fast as your attackers</span></p>\r\n<p>Rely on continually updated learning that adapts to the changing nature of your users and business.</p>\r\n<p><span style=\"font-weight: bold;\">Focus on only important events</span></p>\r\n<p>Review the attack timeline for a clear and convenient view of suspicious activity or persistent threats.</p>\r\n<p><span style=\"font-weight: bold;\">Reduce false positive fatigue</span></p>\r\n<p>Receive alerts only after suspicious activities are contextually aggregated and verified.</p>\r\n<p><span style=\"font-weight: bold;\">Prioritize and plan for next steps</span></p>\r\n<p>Get recommendations for investigation and remediation of each suspicious activity.</p>","shortDescription":"ATA is an on-premises platform to help you protect your enterprise from advanced targeted attacks by automatically\r\nanalyzing, learning, and identifying normal and abnormal entity behavior.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Advanced Threat Analytics","keywords":"","description":"<p>Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats by using information from multiple data-sources in your network to learn the behavior of","og:title":"Microsoft Advanced Threat Analytics","og:description":"<p>Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats by using information from multiple data-sources in your network to learn the behavior of","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Advanced_Threat_Analytics.png"},"eventUrl":"","translationId":2145,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":30,"title":"UEBA - User and Entity Behavior Analytics"}],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"Developments in UBA technology led Gartner to evolve the category to user and entity behavior analytics (UEBA). In September 2015, Gartner published the Market Guide for User and Entity Analytics by Vice President and Distinguished Analyst, Avivah Litan, that provided a thorough definition and explanation. UEBA was referred to in earlier Gartner reports but not in much depth. Expanding the definition from UBA includes devices, applications, servers, data, or anything with an IP address. It moves beyond the fraud-oriented UBA focus to a broader one encompassing "malicious and abusive behavior that otherwise went unnoticed by existing security monitoring systems, such as SIEM and DLP." The addition of "entity" reflects that devices may play a role in a network attack and may also be valuable in uncovering attack activity. "When end users have been compromised, malware can lay dormant and go undetected for months. Rather than trying to find where the outsider entered, UEBAs allow for quicker detection by using algorithms to detect insider threats."\r\nParticularly in the computer security market, there are many vendors for UEBA applications. They can be "differentiated by whether they are designed to monitor on-premises or cloud-based software as a service (SaaS) applications; the methods in which they obtain the source data; the type of analytics they use (i.e., packaged analytics, user-driven or vendor-written), and the service delivery method (i.e., on-premises or a cloud-based)." According to the 2015 market guide released by Gartner, "the UEBA market grew substantially in 2015; UEBA vendors grew their customer base, market consolidation began, and Gartner client interest in UEBA and security analytics increased." The report further projected, "Over the next three years, leading UEBA platforms will become preferred systems for security operations and investigations at some of the organizations they serve. It will be—and in some cases already is—much easier to discover some security events and analyze individual offenders in UEBA than it is in many legacy security monitoring systems."","materialsDescription":"<span style=\"font-weight: bold;\">What is UEBA?</span>\r\nHackers can break into firewalls, send you e-mails with malicious and infected attachments, or even bribe an employee to gain access into your firewalls. Old tools and systems are quickly becoming obsolete, and there are several ways to get past them.\r\nUser and entity behavior analytics (UEBA) give you more comprehensive way of making sure that your organization has top-notch IT security, while also helping you detect users and entities that might compromise your entire system.\r\nUEBA is a type of cybersecurity process that takes note of the normal conduct of users. In turn, they detect any anomalous behavior or instances when there are deviations from these “normal” patterns. For example, if a particular user regularly downloads 10 MB of files every day but suddenly downloads gigabytes of files, the system would be able to detect this anomaly and alert them immediately.\r\nUEBA uses machine learning, algorithms, and statistical analyses to know when there is a deviation from established patterns, showing which of these anomalies could result in, potentially, a real threat. UEBA can also aggregate the data you have in your reports and logs, as well as analyze the file, flow, and packet information.\r\nIn UEBA, you do not track security events or monitor devices; instead, you track all the users and entities in your system. As such, UEBA focuses on insider threats, such as employees who have gone rogue, employees who have already been compromised, and people who already have access to your system and then carry out targeted attacks and fraud attempts, as well as servers, applications, and devices that are working within your system.\r\n<span style=\"font-weight: bold;\">What are the benefits of UEBA?</span>\r\nIt is the unfortunate truth that today's cybersecurity tools are fast becoming obsolete, and more skilled hackers and cyber attackers are now able to bypass the perimeter defenses that are used by most companies. In the old days, you were secure if you had web gateways, firewalls, and intrusion prevention tools in place. This is no longer the case in today’s complex threat landscape, and it’s especially true for bigger corporations that are proven to have very porous IT perimeters that are also very difficult to manage and oversee.\r\nThe bottom line? Preventive measures are no longer enough. Your firewalls are not going to be 100% foolproof, and hackers and attackers will get into your system at one point or another. This is why detection is equally important: when hackers do successfully get into your system, you should be able to detect their presence quickly in order to minimize the damage.\r\n<span style=\"font-weight: bold;\">How Does UEBA Work?</span>\r\nThe premise of UEBA is actually very simple. You can easily steal an employee’s user name and password, but it is much harder to mimic the person’s normal behavior once inside the network.\r\nFor example, let’s say you steal Jane Doe’s password and user name. You would still not be able to act precisely like Jane Doe once in the system unless given extensive research and preparation. Therefore, when Jane Doe’s user name is logged in to the system, and her behavior is different than that of typical Jane Doe, that is when UEBA alerts start to sound.\r\nAnother relatable analogy would be if your credit card was stolen. A thief can pickpocket your wallet and go to a high-end shop and start spending thousands of dollars using your credit card. If your spending pattern on that card is different from the thief’s, the company’s fraud detection department will often recognize the abnormal spending and block suspicious purchases, issuing an alert to you or asking you to verify the authenticity of a transaction.\r\nAs such, UEBA is a very important component of IT security, allowing you to:\r\n1. Detect insider threats. It is not too far-fetched to imagine that an employee, or perhaps a group of employees, could go rogue, stealing data and information by using their own access. UEBA can help you detect data breaches, sabotage, privilege abuse and policy violations made by your own staff.\r\n2. Detect compromised accounts. Sometimes, user accounts are compromised. It could be that the user unwittingly installed malware on his or her machine, or sometimes a legitimate account is spoofed. UEBA can help you weed out spoofed and compromised users before they can do real harm.\r\n3. Detect brute-force attacks. Hackers sometimes target your cloud-based entities as well as third-party authentication systems. With UEBA, you are able to detect brute-force attempts, allowing you to block access to these entities.\r\n4. Detect changes in permissions and the creation of super users. Some attacks involve the use of super users. UEBA allows you to detect when super users are created, or if there are accounts that were granted unnecessary permissions.\r\n5. Detect breach of protected data. If you have protected data, it is not enough to just keep it secure. You should know when a user accesses this data when he or she does not have any legitimate business reason to access it.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_User_and_Entity_Behavior_Analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-azure":{"id":792,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Cloud-Azure.jpg","logo":true,"scheme":false,"title":"Microsoft Azure","vendorVerified":0,"rating":"2.70","implementationsCount":7,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-azure","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine images for popular software packages. App services, platform as a service (PaaS) environment letting developers easily publish and manage Web sites. Websites, high density hosting of websites allows developers to build sites using ASP.NET, PHP, Node.js, or Python and can be deployed using FTP, Git, Mercurial, Team Foundation Server or uploaded through the user portal. This feature was announced in preview form in June 2012 at the Meet Microsoft Azure event.[5] Customers can create websites in PHP, ASP.NET, Node.js, or Python, or select from several open source applications from a gallery to deploy. This comprises one aspect of the platform as a service (PaaS) offerings for the Microsoft Azure Platform. It was renamed to Web Apps in April 2015. WebJobs, applications that can be deployed to a Web App to implement background processing. That can be invoked on a schedule, on demand or can run continuously. The Blob, Table and Queue services can be used to communicate between Web Apps and Web Jobs and to provide state. Mobile services Mobile Engagement collects real-time analytics that highlight users’ behavior. It also provides push notifications to mobile devices. HockeyApp can be used to develop, distribute, and beta-test mobile apps Storage services Storage Services provides REST and SDK APIs for storing and accessing data on the cloud. Table Service lets programs store structured text in partitioned collections of entities that are accessed by partition key and primary key. It's a NoSQL non-relational database. Blob Service allows programs to store unstructured text and binary data as blobs that can be accessed by a HTTP(S) path. Blob service also provides security mechanisms to control access to data. Queue Service lets programs communicate asynchronously by message using queues. File Service allows storing and access of data on the cloud using the REST APIs or the SMB protocol. Data management Azure Search provides text search and a subset of OData's structured filters using REST or SDK APIs. DocumentDB is a NoSQL database service that implements a subset of the SQL SELECT statement on JSON documents. Redis Cache is a managed implementation of Redis. StorSimple manages storage tasks between on-premises devices and cloud storage. SQL Database, formerly known as SQL Azure Database, works to create, scale and extend applications into the cloud using Microsoft SQL Server technology. It also integrates with Active Directory and Microsoft System Center and Hadoop. SQL Data Warehouse is a data warehousing service designed to handle computational and data intensive queries on datasets exceeding 1TB. Messaging The Microsoft Azure Service Bus allows applications running on Azure premises or off premises devices to communicate with Azure. This helps to build scalable and reliable applications in a service-oriented architecture (SOA). Event Hubs, which provide event and telemetry ingress to the cloud at massive scale, with low latency and high reliability. For example an event hub can be used to track data from cell phones such as a GPS location coordinate in real time. Queues, which allow one-directional communication. A sender application would send the message to the service bus queue, and a receiver would read from the queue. Though there can be multiple readers for the queue only one would process a single message. Topics, which provide one-directional communication using a subscriber pattern. It is similar to a queue, however each subscriber will receive a copy of the message sent to a Topic. Optionally the subscriber can filter out messages based on specific criteria defined by the subscriber. Relays, which provide bi-directional communication. Unlike queues and topics, a relay doesn't store in-flight messages in its own memory. Instead, it just passes them on to the destination application.","shortDescription":"Microsoft Azure is a cloud computing service created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":11,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Azure","keywords":"Azure, Microsoft, service, using, data, cloud, Service, which","description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine image","og:title":"Microsoft Azure","og:description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine image","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Cloud-Azure.jpg"},"eventUrl":"","translationId":793,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":21,"title":"Cloud - IaaS"}],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-bot-framework":{"id":4097,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft Bot Framework","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-bot-framework","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Azure Bot Service enables you to build intelligent, enterprise-grade bots with ownership and control of your data. Begin with a simple Q&A bot or build a sophisticated virtual assistant.\r\nUse comprehensive open-source SDK and tools to easily connect your bot to popular channels and devices. Give your bot the ability to speak, listen, and understand your users with native integration to Azure Cognitive Services.\r\n<span style=\"font-weight: bold;\">AI and natural language</span>\r\nCreate a bot with the ability to speak, listen, understand, and learn from your users with Azure Cognitive Services.\r\n<span style=\"font-weight: bold;\">Open & Extensible</span>\r\nBenefit from open-source SDK and tools to build, test, and connect bots that interact naturally with users, wherever they are.\r\n<span style=\"font-weight: bold;\">Enterprise-grade solutions</span>\r\nBuild secure, global, scalable solutions that integrate with your existing IT ecosystem.\r\n<span style=\"font-weight: bold;\">Ownership and control</span>\r\nCreate an AI experience that can extend your brand and keep you in control of your own data.","shortDescription":"Microsoft Bot Framework is a comprehensive framework for building enterprise-grade conversational AI experiences.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Bot Framework","keywords":"","description":"Azure Bot Service enables you to build intelligent, enterprise-grade bots with ownership and control of your data. Begin with a simple Q&A bot or build a sophisticated virtual assistant.\r\nUse comprehensive open-source SDK and tools to easily connect your b","og:title":"Microsoft Bot Framework","og:description":"Azure Bot Service enables you to build intelligent, enterprise-grade bots with ownership and control of your data. Begin with a simple Q&A bot or build a sophisticated virtual assistant.\r\nUse comprehensive open-source SDK and tools to easily connect your b","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":4098,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":103,"title":"Chatbot Development"}],"testingArea":"","categories":[{"id":842,"title":"Chatbot Development","alias":"chatbot-development","description":"A chatbot is a piece of software that conducts a conversation via auditory or textual methods. Such programs are often designed to convincingly simulate how a human would behave as a conversational partner, although as of 2019, they are far short of being able to pass the Turing test. Chatbots are typically used in dialog systems for various practical purposes including customer service or information acquisition. Some chatbots use sophisticated natural language processing systems, but many simpler ones scan for keywords within the input, then pull a reply with the most matching keywords, or the most similar wording pattern, from a database.\r\nThe term "ChatterBot" was originally coined by Michael Mauldin (creator of the first Verbot, Julia) in 1994 to describe these conversational programs. Today, most chatbots are accessed via virtual assistants such as Google Assistant and Amazon Alexa, via messaging apps such as Facebook Messenger or WeChat, or via individual organizations' apps and websites. Chatbots can be classified into usage categories such as conversational commerce (e-commerce via chat), analytics, communication, customer support, design, developer tools, education, entertainment, finance, food, games, health, HR, marketing, news, personal, productivity, shopping, social, sports, travel and utilities.\r\nBeyond chatbots, Conversational AI refers to the use of messaging apps, speech-based assistants and chatbots to automate communication and create personalized customer experiences at scale.\r\nThe process of building, testing and deploying chatbots can be done on cloud-based chatbot development platforms offered by cloud Platform as a Service (PaaS) providers such as Oracle Cloud Platform SnatchBot and IBM Watson. These cloud platforms provide Natural Language Processing, Artificial Intelligence and Mobile Backend as a Service for chatbot development.\r\nSome Companies like Microsoft Azure and AARC are currently providing their Bot Engines through which chatbot Platforms or Software can be developed.","materialsDescription":"New tools designed to simplify the interaction between humans and computers have hit the market: Chatbots or Virtual Assistants. In banking, chatbots and virtual assistants are some of the industry’s newest tools designed to simplify the interaction between humans and computers.\r\n<span style=\"font-weight: bold;\">What is a chatbot?</span>\r\nA chatbot is artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.\r\n<span style=\"font-weight: bold;\">Why are chatbots important?</span>\r\nA chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question-Answering system leveraging Natural Language Processing (NLP). Formulating responses to questions in natural language is one of the most typical examples of Natural Language Processing applied in various enterprises’ end-use applications.\r\n<span style=\"font-weight: bold;\">How does a chatbot work?</span>\r\nThere are two different tasks at the core of a chatbot:\r\n<ol><li>user request analysis</li><li>returning the response</li></ol>\r\nUser request analysis: this is the first task that a chatbot performs. It analyzes the user’s request to identify the user intent and to extract relevant entities.\r\nThe ability to identify the user’s intent and extract data and relevant entities contained in the user’s request is the first condition and the most relevant step at the core of a chatbot: If you are not able to correctly understand the user’s request, you won’t be able to provide the correct answer.\r\nReturning the response: once the user’s intent has been identified, the chatbot must provide the most appropriate response for the user’s request. The answer may be:\r\n<ul><li>a generic and predefined text;</li><li>a text retrieved from a knowledge base that contains different answers;</li><li>a contextualized piece of information based on data the user has provided;</li><li>data stored in enterprise systems;</li><li>the result of an action that the chatbot performed by interacting with one or more backend application;</li><li>a disambiguating question that helps the chatbot to correctly understand the user’s request.</li></ul>\r\n<span style=\"font-weight: bold;\">In what is the benefit of chatbots?</span>\r\nChatbot applications streamline interactions between people and services, enhancing the customer experience. At the same time, they offer companies new opportunities to improve the customer's engagement process and operational efficiency by reducing the typical cost of customer service.\r\nTo be successful, a chatbot solution should be able to effectively perform both of these tasks. Human support plays a key role here: Regardless of the kind of approach and the platform, human intervention is crucial in configuring, training and optimizing the chatbot system.\r\n<span style=\"font-weight: bold;\">Which chatbot application is right for you?</span>\r\nThere are different approaches and tools that you can use to develop a chatbot. Depending on the use case you want to address, some chatbot technologies are more appropriate than others. In order to achieve the desired results, the combination of different AI forms such as natural language processing, machine learning, and semantic understanding may be the best option.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Chatbot_Development.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-cloud-app-security":{"id":3344,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Cloud_App_Security.jpg","logo":true,"scheme":false,"title":"Microsoft Cloud App Security","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-cloud-app-security","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Microsoft Cloud App Security is a multimode Cloud Access Security Broker (CASB). It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.\r\nMicrosoft Cloud App Security natively integrates with leading Microsoft solutions. It is designed with security professionals in mind—providing simple deployment, centralized management, and innovative automation capabilities.\r\n<span style=\"font-weight: bold;\">FEATURES:</span>\r\n<span style=\"font-weight: bold;\">Discover and control the use of Shadow IT</span>\r\nIdentify cloud apps and services used by your organization. Assess their risk levels and business readiness of >16,000 apps against >70 risk and start managing them to ensure security and compliance.\r\n<span style=\"font-weight: bold;\">Protect your sensitive information anywhere in the cloud</span>\r\nUnderstand, classify and protect the exposure of sensitive information at rest, or leverage out-of-the box policies and automated processes to apply controls in real-time - across all your cloud apps.\r\n<span style=\"font-weight: bold;\">Protect against cyberthreats and anomalies</span>\r\nDetect unusual behavior across cloud apps to identify ransomware, compromised users or rogue applications, analyze high-risk usage and remediate automatically to limit the risk to your organization.\r\n<span style=\"font-weight: bold;\">Assess the compliance of your cloud apps</span>\r\nAssess if your cloud apps meet relevant compliance requirements including regulatory compliance and industry standards. Prevent data leaks to non-compliant apps, and limit access to regulated data.","shortDescription":"Microsoft Cloud App Security provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Cloud App Security","keywords":"","description":"Microsoft Cloud App Security is a multimode Cloud Access Security Broker (CASB). It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.\r\nMicrosoft Cloud App Securit","og:title":"Microsoft Cloud App Security","og:description":"Microsoft Cloud App Security is a multimode Cloud Access Security Broker (CASB). It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services.\r\nMicrosoft Cloud App Securit","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Cloud_App_Security.jpg"},"eventUrl":"","translationId":3345,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":95,"title":"Cloud Access Security Broker (CASB)"}],"testingArea":"","categories":[{"id":832,"title":"CASB - Cloud Access Security Broker","alias":"casb-cloud-access-security-broker","description":"A cloud access security broker (CASB) (sometimes pronounced cas-bee) is on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies. A CASB can offer a variety of services, including but not limited to monitoring user activity, warning administrators about potentially hazardous actions, enforcing security policy compliance, and automatically preventing malware.\r\nA CASB may deliver security, the management or both. Broadly speaking, "security" is the prevention of high-risk events, whilst "management" is the monitoring and mitigation of high-risk events.\r\nCASBs that deliver security must be in the path of data access, between the user and the cloud. Architecturally, this might be achieved with proxy agents on each end-point device, or in agentless fashion without requiring any configuration on each device. Agentless CASB allows for rapid deployment and delivers security on all devices, company-managed or unmanaged BYOD. Agentless CASB also respects user privacy, inspecting only corporate data. Agent-based CASB is difficult to deploy and effective only on devices that are managed by the corporation. Agent-based CASB typically inspects both corporate and personal data.\r\nCASBs that deliver management may use APIs to inspect data and activity in the cloud to alert of risky events after the fact. Another management capability of a CASB is to inspect firewall or proxy logs for the usage of cloud applications.","materialsDescription":"<span style=\"font-weight: bold;\">What is CASB?</span> A Cloud Access Security Broker (CASB) is a policy enforcement point that secures data & apps in the cloud and on any device, anywhere.\r\n<span style=\"font-weight: bold;\">What is the difference between security and management?</span> Security is preventing risky events from happening, management is cleaning up after high-risk events.\r\n<span style=\"font-weight: bold;\">What is Shadow IT?</span> Cloud applications used by business users without IT oversight, also known as unmanaged apps.\r\n<span style=\"font-weight: bold;\">What are managed apps?</span> Cloud Applications that are managed by IT, e.g.Office 365.\r\n<span style=\"font-weight: bold;\">What are the types of CASB?</span> Three types of Cloud Access Security Broker\r\n<ul><li>a) API-only CASB offer basic management</li><li>b) multi-mode first-gen CASB offer management & security</li><li>c) Next-Gen CASB deliver management, security & Zero-Day protection.</li></ul>\r\n<span style=\"font-weight: bold;\">What is a forward proxy?</span> A proxy where traffic must be forwarded by the end-point Such proxies requires agents and configuration on client devices.\r\n<span style=\"font-weight: bold;\">What is a reverse proxy?</span> A proxy where traffic is automatically routed, requiring no agent or configuration on the end-point.\r\n<span style=\"font-weight: bold;\">What is AJAX-VM?</span> Acronym for "Adaptive Javascript and XML- Virtual Machine." AJAX-VM virtualizes cloud apps on the fly so they can be proxied without agents. Reverse-proxy CASB are brittle without AJAX-VM and break frequently with app changes.\r\n<span style=\"font-weight: bold;\">What are the types of CASB architecture?</span> There are three types of CASB architecture: API-only, forward proxy, and reverse proxy. Some CASB are API-only, others API and forward proxy. Next-Gen CASBs offer all three with AJAX-VM.\r\n<span style=\"font-weight: bold;\">What is CASB encryption?</span> Encryption/decryption of data prior to upload/download to a cloud application.\r\n <span style=\"font-weight: bold;\">What is searchable encryption?</span> An encryption system that combines full encryption with a clear-text index to enable search and sort without compromising encryption strength.\r\n<span style=\"font-weight: bold;\">What is tokenization?</span> Obfuscation by encoding each input string as a unique output string.\r\n<span style=\"font-weight: bold;\">What is agentless MDM?</span> Mobile security for BYOD that does not require agents. Easy to deploy and has no access to personal data or apps, thereby preserving user privacy.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CASB.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"microsoft-coco-framework":{"id":1034,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Coco_Framework.png","logo":true,"scheme":false,"title":"Microsoft Coco Framework","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-coco-framework","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalability, distributed governance and enhanced confidentiality they need without sacrificing the inherent security and immutability they expect.\r\nLeveraging the power of existing blockchain protocols, trusted execution environments (TEEs) such as Intel SGX and Windows Virtual Secure Mode (VSM), distributed systems and cryptography, Coco enables enterprise-ready blockchain networks that deliver:\r\n\r\n<ul><li>Throughput and latency approaching database speeds.</li><li>Richer, more flexible, business-specific confidentiality models.</li><li>Network policy management through distributed governance.</li><li>Support for non-deterministic transactions.</li></ul>\r\nBy providing these capabilities, Coco offers a trusted foundation with which existing blockchain protocols can be integrated to deliver complete, enterprise-ready ledger solutions, opening up broad, high scale scenarios across industries, and furthering blockchain's ability to digital transform business.\r\nWe have already begun exploring Coco’s potential across a variety of industries, including retail, supply chain and financial services.\r\nWhether a customer is designing an end-to-end trade finance solution, using blockchain to ensure security at the edge or leveraging Enterprise Smart Contracts to drive back office efficiencies, Coco enables them to meet their enterprise requirements. Microsoft is the only cloud provider that delivers consistency across on-premises and the public cloud at hyperscale while providing access to the rich Azure ecosystem for the wide range of applications that will be built on top of blockchain as a shared data layer.\r\nAn open approach\r\nBy design, Coco is open and compatible with any blockchain protocol. Microsoft has already begun integrating Ethereum into Coco and we’re thrilled to announce that J.P. Morgan Chase, Intel and R3 have committed to integrating enterprise ledgers, Quorum, Hyperledger Sawtooth and Corda, respectively. This is just the beginning, and we look forward to exploring integration opportunities with other ledgers in the near future.\r\n","shortDescription":"Microsoft Coco Framework is an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Coco Framework","keywords":"Coco, blockchain, that, with, distributed, Microsoft, across, existing","description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalabil","og:title":"Microsoft Coco Framework","og:description":"Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalabil","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Microsoft_Coco_Framework.png"},"eventUrl":"","translationId":1035,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["atlassian-trello","azure-data-warehouse","azure-resiliency","azure-virtual-machines","dell-poweredge-mx7000-modular-chassis","dell-precision-workstations","dell-wyse-3040-thin-client","dell-bleid-massiv-equallogic-ps-m4110","dell-obshchaja-infrastruktura-konvergentnye-platformy","dell-servery-poweredge-v-korpuse-tower","dell-stoechnyi-server-poweredge-c6320","dell-upravlenie-klientskimi-sistemami","jira","luisai","microsoft-365","microsoft-advanced-threat-analytics","microsoft-azure","microsoft-bot-framework","microsoft-cloud-app-security","microsoft-coco-framework"]},"links":{"first":"http://apis.roi4cio.com/api/products?page=1","last":"http://apis.roi4cio.com/api/products?page=3","prev":null,"next":"http://apis.roi4cio.com/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":3,"path":"http://apis.roi4cio.com/api/products","per_page":20,"to":20,"total":53},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"21":{"id":21,"title":"Cloud - IaaS"},"24":{"id":24,"title":"IaaS - storage"},"26":{"id":26,"title":"IaaS - computing"},"30":{"id":30,"title":"UEBA - User and Entity Behavior Analytics"},"43":{"id":43,"title":"QA Bug tracking systems"},"81":{"id":81,"title":"Project and Portfolio Management"},"95":{"id":95,"title":"Cloud Access Security Broker (CASB)"},"103":{"id":103,"title":"Chatbot Development"},"124":{"id":124,"title":"Collaboration Applications"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}