{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"i-sell-it":{"en":"I sell it","ru":"I sell it","_type":"localeString"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"ru":"По убыванию скидки","_type":"localeString","en":"Rebate descending"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Поставщик потверждён"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"en":"Learn more","ru":"Узнать больше","_type":"localeString"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"ru":"По возростанию популярности","_type":"localeString","en":"Popular ascending"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register","de":"Registrieren"},"auth-message":{"en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"en":"By purchase","ru":"По покупке","_type":"localeString"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"en":"to","ru":"до","_type":"localeString"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"with-discounts-checkbox":{"en":"With discounts","ru":"Со скидками","_type":"localeString"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"_type":"localeString","en":"Bonus 4 Reference","ru":"Бонус за референс"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"en":"User products vendors","ru":"Производители продуктов пользователя","_type":"localeString"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"branch":{"en":" Branch","ru":"Отрасль","_type":"localeString"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"en":"Find","ru":"Выполнить поиск","_type":"localeString"},"deal-date":{"en":"Date","ru":"Дата","_type":"localeString"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"_type":"localeString","en":"Add deployment","ru":"Добавить внедрение"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"_type":"localeString","en":"Supply type","ru":"Тип поставки"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"company-type":{"en":"Company type","ru":"Тип компании","_type":"localeString"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"_type":"localeString","en":"Customers","ru":"Покупатели"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"ru":[{"style":"normal","_key":"28241882db7a","markDefs":[],"children":[{"marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span"}],"_type":"block"}],"_type":"localeBlock","en":[{"style":"normal","_key":"8bebcfb34955","markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span"}],"_type":"block"}]}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"en":"ROI4CIO: Products","ru":"ROI4CIO: Продукты","_type":"localeString"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}},{"name":"description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"}},{"name":"og:description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI"}},{"name":"keywords","translations":{"_type":"localeString","en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги"}},{"translations":{"_type":"localeString","en":"Products","ru":"Продукты"},"name":"title"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"fujitsu-eternus-cd10000":{"id":5937,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu.png","logo":true,"scheme":false,"title":"Fujitsu ETERNUS CD10000","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-eternus-cd10000","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"<p>Organizations are drowning in data as the global amount of information generated and kept online continues to multiply. There are three key problems: increased demands on scalability, greater complexity and cost, and the threat of major disruption when data goes offline during migration between systems, due to physical storage limitations.</p>\r\n<p>Hyperscale, software-defined storage promises a more flexible storage model where data and services must flow more freely when applications change and systems scale up and down.</p>\r\n<p><span style=\"font-weight: bold;\">ETERNUS CD10000</span> provides unlimited, modular scalability of storage capacity and performance at zero downtime for instant and cost-efficient online access to extensive data volumes. Integrating open-source Ceph software into a storage system delivered with end-to-end maintenance from Fujitsu, enables IT organizations to fully benefit from open standards without implementation and operational risks.</p>\r\n<p><span style=\"font-weight: bold;\">ETERNUS CD10000 S2</span> is a hyperscale, software-defined storage system designed to manage vast amounts of data. A configuration can start small and grow in line with the business. The architecture allows individual storage nodes to be added, exchanged and upgraded without downtime. Fujitsu integrates open source Ceph software in a complete and fully supported solution.</p>","shortDescription":"Fujitsu ETERNUS CD10000 - hyperscale, software-defined storage system for the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu ETERNUS CD10000","keywords":"","description":"<p>Organizations are drowning in data as the global amount of information generated and kept online continues to multiply. There are three key problems: increased demands on scalability, greater complexity and cost, and the threat of major disruption when data","og:title":"Fujitsu ETERNUS CD10000","og:description":"<p>Organizations are drowning in data as the global amount of information generated and kept online continues to multiply. There are three key problems: increased demands on scalability, greater complexity and cost, and the threat of major disruption when data","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu.png"},"eventUrl":"","translationId":5938,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":134,"title":"Object Storage"}],"testingArea":"","categories":[{"id":876,"title":"Object Storage","alias":"object-storage","description":"Object storage (also known as object-based storage) is a computer data storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manages data as a file hierarchy, and block storage which manages data as blocks within sectors and tracks. Each object typically includes the data itself, a variable amount of metadata, and a globally unique identifier. Object storage can be implemented at multiple levels, including the device level (object-storage device), the system level, and the interface level. In each case, object storage seeks to enable capabilities not addressed by other storage architectures, like interfaces that can be directly programmable by the application, a namespace that can span multiple instances of physical hardware, and data-management functions like data replication and data distribution at object-level granularity.\r\nObject storage systems allow retention of massive amounts of unstructured data. Object storage is used for purposes such as storing photos on Facebook, songs on Spotify, or files in online collaboration services, such as Dropbox.\r\nObject storage is a method of data storage that emerged in the mid-1990s as researchers foresaw that existing storage methods would eventually start to show their limitations in certain scenarios. True to its name, object storage treats data as discrete units, or objects, that are accompanied by metadata and a universally unique identifier (UUID). This unstructured data resides in a flat (as opposed to tiered) address space called a storage pool. Object storage is also known for its compatibility with cloud computing, due to its unlimited scalability and faster data retrieval.\r\nToday, as data comes to underpin everything we do, the adoption of object storage systems has increased. It’s common in data centers and popular cloud-based platforms, such as Google cloud storage or Amazon cloud storage, and has become the de facto standard in several enterprise use cases.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is Object Storage?</span>\r\nIn the modern world of cloud computing, object storage is the storage and retrieval of unstructured blobs of data and metadata using an HTTP API. Instead of breaking files down into blocks to store it on disk using a file system, we deal with whole objects stored over the network. These objects could be an image file, logs, HTML files, or any self-contained blob of bytes. They are unstructured because there is no specific schema or format they need to follow.<br />Object storage took off because it greatly simplified the developer experience. Because the API consists of standard HTTP requests, libraries were quickly developed for most programming languages. Saving a blob of data became as easy as an HTTP PUT request to the object store. Retrieving the file and metadata is a normal GET request. Further, most object storage services can also serve the files publicly to your users, removing the need to maintain a web server to host static assets.\r\nOn top of that, object storage services charge only for the storage space you use (some also charge per HTTP request, and for transfer bandwidth). This is a boon for small developers, who can get world-class storage and hosting of assets at costs that scale with use.\r\n<span style=\"font-weight: bold;\">What are the advantages of object storage?</span>\r\n<ul><li>A simple HTTP API, with clients available for all major operating systems and programming languages</li><li>A cost structure that means you only pay for what you use</li><li>Built-in public serving of static assets means one less server for you to run yourself</li><li>Some object stores offer built-in CDN integration, which caches your assets around the globe to make downloads and page loads faster for your users</li><li>Optional versioning means you can retrieve old versions of objects to recover from accidental overwrites of data</li><li>Object storage services can easily scale from modest needs to really intense use-cases without the developer having to launch more resources or rearchitect to handle the load</li><li>Using an object storage service means you don’t have to maintain hard drives and RAID arrays, as that’s handled by the service provider</li><li>Being able to store chunks of metadata alongside your data blob can further simplify your application architecture</li></ul>\r\n<span style=\"font-weight: bold;\">What are the disadvantages of object storage?</span>\r\n<ul><li>You can’t use object storage services to back a traditional database, due to the high latency of such services</li><li>Object storage doesn’t allow you to alter just a piece of a data blob, you must read and write an entire object at once. This has some performance implications. For instance, on a file system, you can easily append a single line to the end of a log file. On an object storage system, you’d need to retrieve the object, add the new line, and write the entire object back. This makes object storage less ideal for data that changes very frequently</li><li>Operating systems can’t easily mount an object store like a normal disk. There are some clients and adapters to help with this, but in general, using and browsing an object store is not as simple as flipping through directories in a file browser</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/jhghj.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-identity-as-a-service-idaas":{"id":725,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_Identity_as_a_Service__IDaaS_.gif","logo":true,"scheme":false,"title":"Fujitsu Identity as a Service (IDaaS)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-identity-as-a-service-idaas","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Users have dozens if not hundreds of usernames and passwords for on-premise systems and cloud services and in many cases utilize various identity management systems. \r\nFujitsu Identity as a Service provides users with access to systems, applications, data and resources. It ensures convenient access to resources in heterogeneous IT environments and ensures that all compliance requirements are fulfilled. With Fujitsu Identity as a Service, your organization’s passwords and identities are safe and under control. \r\nFujitsu Identity as a Service provides end-to-end identity management and comprises\r\nSelf-service interfaces allow users to manage, create, adjust and remove permissions, procedures for approval of permissions are included in the service\r\nAuthentication with multiple methods, including strong authentication methods like biometric identity and access management\r\nSingle sign-on capabilities which will facilitate users’ daily work and reduce the efforts for the administration of user accounts\r\nFujitsu Identity as a Service supports open interfaces and standards, e.g. single sign-on utilizes federation standards like Security Assertion Markup Language (SAML) and Web Services Federation (WS-Federation) and highest scalability which e.g. allows the inclusion of different user groups, such as partners and customers and thus supports entire ecosystems across organizational borders. Benefits\r\nIncreased user satisfaction – with single sign-on, fast and easy login to different systems\r\nCost savings – as automation and self-service capabilities reduce manual and time consuming support efforts\r\nIncreased level of security as Identity as a Service allows the execution of strict information security policies and provides real-time monitoring and reporting of permissions and usage","shortDescription":"Fujitsu Identity as a Service (IDaaS) provides users with access to systems, applications, data and resources. It ensures convenient access to resources in heterogeneous IT environments and ensures that all compliance requirements are fulfilled. With Fujitsu Identity as a Service, your organization’s passwords and identities are safe and under control. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Identity as a Service (IDaaS)","keywords":"Service, Identity, Fujitsu, systems, sign-on, provides, identity, user","description":"Users have dozens if not hundreds of usernames and passwords for on-premise systems and cloud services and in many cases utilize various identity management systems. \r\nFujitsu Identity as a Service provides users with access to systems, applications, data","og:title":"Fujitsu Identity as a Service (IDaaS)","og:description":"Users have dozens if not hundreds of usernames and passwords for on-premise systems and cloud services and in many cases utilize various identity management systems. \r\nFujitsu Identity as a Service provides users with access to systems, applications, data","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_Identity_as_a_Service__IDaaS_.gif"},"eventUrl":"","translationId":726,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-integrated-system-primeflex-for-storage-spaces-direct":{"id":823,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Integrated_System_PRIMEFLEX_for_Storage_Spaces_Direct.png","logo":true,"scheme":false,"title":"FUJITSU Integrated System PRIMEFLEX for Storage Spaces Direct","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-integrated-system-primeflex-for-storage-spaces-direct","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"For a quick setup of a Microsoft-based hyper-converged IT infrastructure, Fujitsu offers with PRIMEFLEX for Storage Spaces Direct an integrated system including all hardware and software to simplify procurement and deployment of a Microsoft-based hyper-converged IT infrastructure. The solution leverages high performance and energy-efficient Fujitsu PRIMERGY standard x86 servers and software-defined server and storage technology integrated in Microsoft Windows Server 2016 to reduce complexity and TCO in data center infrastructure operations. In order to meet specific customer requirements, Fujitsu offers a range of validated server configurations including single point of contact for support. Customer benefits at a glance:\r\nFast time to production for your virtual infrastructure\r\nEasy to order, deploy, operate and scale\r\nHigh performance, availability and efficiency\r\nGrow as you go with no large upfront investments\r\nReduce storage costs, save floor space, power and cooling expenses\r\nSingle point of contact for support","shortDescription":"Fast track to your Microsoft hyper-converged IT infrastructure\r\nWhile converged infrastructure deployment models have greatly improved data center operations in the last couple of years, many organizations are now looking at hyper-converged infrastructures (HCI) as the next step forward by leveraging the software defined design principles to further streamline the convergence of infrastructure. These systems are designed to be simple, resilient, and agile in order for IT organizations to respond to the needs of their business through the ability to easily adapt their infrastructure to the actual demand.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FUJITSU Integrated System PRIMEFLEX for Storage Spaces Direct","keywords":"infrastructure, Fujitsu, contact, offers, integrated, including, server, storage","description":"For a quick setup of a Microsoft-based hyper-converged IT infrastructure, Fujitsu offers with PRIMEFLEX for Storage Spaces Direct an integrated system including all hardware and software to simplify procurement and deployment of a Microsoft-based hyper-converg","og:title":"FUJITSU Integrated System PRIMEFLEX for Storage Spaces Direct","og:description":"For a quick setup of a Microsoft-based hyper-converged IT infrastructure, Fujitsu offers with PRIMEFLEX for Storage Spaces Direct an integrated system including all hardware and software to simplify procurement and deployment of a Microsoft-based hyper-converg","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Integrated_System_PRIMEFLEX_for_Storage_Spaces_Direct.png"},"eventUrl":"","translationId":823,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-notebook-lifebook-u937":{"id":710,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Noutbuki_Fujitsu_LIFEBOOK_U937.jpg","logo":true,"scheme":false,"title":"FUJITSU Notebook LIFEBOOK U937","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-notebook-lifebook-u937","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Features and Benefits\r\nWindows\r\nWindows 10 Pro. Fujitsu recommends Windows 10 Pro.\r\n\r\nEasy integration into customers’ existing infrastructure\r\nOutstanding ultra-slim and robust design \r\nA remarkably slim 15.5mm notebook weighing only 920g with a robust magnesium housing\r\nThe best viewing experience is guaranteed by an anti-glare 13.3-inch FHD (1920 x 1080) display, optionally with glare touch\r\n\r\nExtraordinarily lightweight design for business professionals who are always on the move\r\nUltimate security features\r\nEmbedded palm vein or fingerprint sensor, SmartCard reader, TPM 2.0\r\n\r\nProtect your notebook and business data from unauthorized access at all times\r\nExcellent connectivity\r\nFull set of interfaces with a full-sized HDMI, full-sized LAN connector and USB Type-C\r\nEmbedded WLAN, Bluetooth, optional 4G/LTE and DDR4 memory technology up to 20 GB\r\n\r\nBe flexible and stay productive in a hyper-connected world\r\nConvenient mobility on the go\r\nAll-day battery runtime offers you exceptional mobility that you need when on the move\r\nAnytime USB Charge functionality to charge telephones and other media devices even when the system is turned off\r\nPowerful performance, thanks to integrated SSDs, helps process data faster","shortDescription":"Fujitsu LIFEBOOK U937 with extraordinarily light design, weighing only 920g and an all-day battery runtime, the Fujitsu Notebook LIFEBOOK U937 is an ultra-mobile notebook for business professionals who are always on the move. The solid magnesium housing ensures durability while security features such as the integrated palm vein sensor keep your business data protected. The powerful performance and the optional embedded 4G/LTE provide you with best-in-class user experience.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FUJITSU Notebook LIFEBOOK U937","keywords":"Windows, with, robust, design, Embedded, when, business, move","description":"Features and Benefits\r\nWindows\r\nWindows 10 Pro. Fujitsu recommends Windows 10 Pro.\r\n\r\nEasy integration into customers’ existing infrastructure\r\nOutstanding ultra-slim and robust design \r\nA remarkably slim 15.5mm notebook weighing only 920g with a robust m","og:title":"FUJITSU Notebook LIFEBOOK U937","og:description":"Features and Benefits\r\nWindows\r\nWindows 10 Pro. Fujitsu recommends Windows 10 Pro.\r\n\r\nEasy integration into customers’ existing infrastructure\r\nOutstanding ultra-slim and robust design \r\nA remarkably slim 15.5mm notebook weighing only 920g with a robust m","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Noutbuki_Fujitsu_LIFEBOOK_U937.jpg"},"eventUrl":"","translationId":711,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-palmsecure-id-login":{"id":976,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_PalmSecure_ID_Login.jpg","logo":true,"scheme":false,"title":"Fujitsu PalmSecure ID Login","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-palmsecure-id-login","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Do you want to experience the power of biometric enhanced Active Directory? If you are already working with Fujitsu devices with built-in palm vein sensors, this is easy. Download evaluation package \r\nDownload the software, install and configure and experience the power of biometric authentication. The evaluation package comes with three user licenses. Installation and connection to Active Directory require administration rights and should be taken care of by the IT department. Find links to software and detailed instructions in the download section below.\r\n<span style=\"font-weight: bold;\">Benefits of PalmSecure ID Login</span>\r\nImproved security by biometric technology with highest accuracy\r\nFast enrollment and verification process\r\nEasy-to-use, touchless and hygienic – ensures highest user acceptance","shortDescription":"FUJITSU PalmSecure ID Login enhances password-based Active Directory login network wide with biometric technology. PalmSecure, Fujitsu’s contactless palm vein pattern recognition technology accurately identifies individuals by scanning the complex vein pattern in the palm of the hand. Instead of common credentials like user names and passwords Fujitsu PalmSecure ID Login offers centralized biometric user authentication with Active Directory support. All biometric palm vein data is managed and stored centrally in the Active Directory service. Once users are enrolled they log in to the system by providing user name and scanning the palm vein pattern of their hand at any device within the Active Directory environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu PalmSecure ID Login","keywords":"with, biometric, Fujitsu, Directory, user, Download, PalmSecure, evaluation","description":"Do you want to experience the power of biometric enhanced Active Directory? If you are already working with Fujitsu devices with built-in palm vein sensors, this is easy. Download evaluation package \r\nDownload the software, install and configure and exper","og:title":"Fujitsu PalmSecure ID Login","og:description":"Do you want to experience the power of biometric enhanced Active Directory? If you are already working with Fujitsu devices with built-in palm vein sensors, this is easy. Download evaluation package \r\nDownload the software, install and configure and exper","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_PalmSecure_ID_Login.jpg"},"eventUrl":"","translationId":977,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-server-primequest":{"id":204,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Servery_Fujitsu_PRIMEQUEST.png","logo":true,"scheme":false,"title":"Fujitsu Server PRIMEQUEST","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-server-primequest","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Combining the power of Intel® Xeon® E7 family processors, the standard specifications of Microsoft Windows and Linux operating systems and the wealth of market solutions with innovative fault immune system architecture for highest availability and business continuity, Fujitsu Server PRIMEQUEST systems provide a new operational efficiency for business critical computing with truly open standards. \r\n\r\nThe Fujitsu Server PRIMEQUEST 2800B is the successor of the PRIMERGY RX900 S2, offering an unprecedented performance and memory capacity combined with high reliability thanks to built-in advanced RAS features for advanced error circumvention. This makes it ideal for big data applications and in-memory solutions like SAP HANA. \r\nIn addition, the Fujitsu Server PRIMEQUEST 2400E and 2800E feature self-healing capabilities and unique features such as Dynamic Reconfiguration which result in outstanding platform reliability, best availability and serviceability. The Dynamic Reconfiguration feature allows the changes of resources while systems are still up and running. Isolated physical partitions enable high availability, where any hardware failures do not have an impact on other partitions. In the unlikely event of a failure, the affected system board can be automatically replaced by a reserved system board and thus instantly recover applications and services.","shortDescription":"Fujitsu Server PRIMEQUEST systems provide a new operational efficiency for business critical computing with truly open standards.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Server PRIMEQUEST","keywords":"Fujitsu, PRIMEQUEST, Server, availability, systems, with, system, advanced","description":"Combining the power of Intel® Xeon® E7 family processors, the standard specifications of Microsoft Windows and Linux operating systems and the wealth of market solutions with innovative fault immune system architecture for highest availability and business con","og:title":"Fujitsu Server PRIMEQUEST","og:description":"Combining the power of Intel® Xeon® E7 family processors, the standard specifications of Microsoft Windows and Linux operating systems and the wealth of market solutions with innovative fault immune system architecture for highest availability and business con","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Servery_Fujitsu_PRIMEQUEST.png"},"eventUrl":"","translationId":204,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-server-primergy":{"id":389,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg","logo":true,"scheme":false,"title":"FUJITSU Server PRIMERGY","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-server-primergy","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type of workload. This includes expandable PRIMERGY tower servers for remote and branch offices, versatile rack-mount servers, compact and scalable blade systems, as well as density-optimized scale-out servers. They convince by business proven quality with a wide range of innovations, highest efficiency cutting operational cost and complexity, and provide more agility in daily operations in order to turn IT faster into a business advantage. FUJITSU Server PRIMERGY RX rack systems are versatile rack-optimized servers providing best-inclass performance and energy efficiency, and thus form the “standard” in each data center. PRIMERGY RX servers deliver 20 years of development and production know-how resulting in extremely low failure rates below market average, and lead to continuous operations and outstanding hardware availability.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \"><br /></span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Blade Servers </span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">To stay competitive, your business needs an IT environment that drives success through cost reduction, maximum performance and enhanced agility. PRIMERGY Blade Servers help you achieve this for your midsize organization, branch office or large data center.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Rack Servers</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Simplified operation, enhanced quality and faster productive deployment thanks to our supply model and build-to-order process are the primary advantages of our PRIMERGY RX rack servers and can be integrated in PRIMECENTER racks with common infrastructure.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Tower Servers</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY TX tower servers provide SMEs and branch offices with the perfect combination of record-breaking performance, outstanding energy efficiency, rock-solid reliability and investment protection.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Scale out Servers</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">The PRIMERGY CX Cloud eXtension servers are Fujitsu´s platform for Cloud computing, HPC High Performance Computing, Service Provider and large scale-out computing server farms. They focus on providing large datacenters with massive scale-out x86 server power while at the same time delivering new datacenter economics for server density, energy consumption, heat optimization and lower overall operational costs.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Rack Technology</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">The 19-inch PRIMECENTER Racks are the basis for rack configurations, such as server, storage systems as well as operating controls, such as consoles, switches, power distribution units (PDUs) and uninteruptible power supplies (UPS).</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Energy Efficient</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Reduce the power consumption of your IT infrastructure</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Long Lifecycle (LLC) Versions</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu offers selected models as a long lifecycle version. With an extended availability of up to 5 years, optimized configurations are supported and guaranteed – including maintenance, service and spare part availability.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Server Virtualization</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">To provide you with an appropriate solution for any of your requirements Fujitsu cooperates closely with all market leaders regarding server virtualization.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu Server PRIMERGY - System Management</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Intelligent, easy-to-use system management. Enhance productivity with the Fujitsu Software ServerView Suite.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Operating Systems</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">This is the age of e-business: Digital infrastructures are increasingly becoming the indispensable backbone supporting worldwide eBusiness processes. To ensure reliability and high availability, Fujitsu provides you with computing systems one can trust!</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu x86 Server Benchmarks</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">We detail the results of standardized benchmarks run on the PRIMERGY server family and PRIMEQUEST 2000 family. These reports not only verify the superb performance of our PRIMERGY and PRIMEQUEST platforms, but can also help you select a specific server system and configuration.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu Value Calculator App</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px;\">The Fujitsu Value Calculator is a simple to use App which helps to pick out the business advantages of the Fujitsu hardware and to find a server or storage system that suits your personal requirements</span>\r\n","shortDescription":"FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type of workload.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FUJITSU Server PRIMERGY","keywords":"PRIMERGY, Fujitsu, server, servers, with, Server, your, Servers","description":"<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type ","og:title":"FUJITSU Server PRIMERGY","og:description":"<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg"},"eventUrl":"","translationId":389,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-server-primergy-rx":{"id":2039,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg","logo":true,"scheme":false,"title":"Fujitsu Server Primergy RX","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-server-primergy-rx","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.\r\nPrimergy RX servers deliver approximately 20 years of development and production know-how resulting in extremely low failure rates below market average, and leading to continuous operations and outstanding hardware availability.\r\nThe proven data centre technology of Primergy RX rack servers ensures carefree and continuous operation. Top performance and a long operating life are certain thanks to the latest processor technology and innovative "cool-safe" air flow cooling concept.\r\n<span style=\"font-weight: bold;\"> The product line of Primergy RX includes:</span>\r\n<span style=\"font-weight: bold;\">Primergy RX2510 M2.</span> The server is a dual-socket rack server optimized to meet demanding requirements of service providers and hosters. Balanced dual-socket Intel Xeon E5-2600 v4 family processor performance, easy manageability and top energy efficiency ensure cost-efficient operation. The 1U small-size housing delivers optimal density for large scale-out installations including up to 384 GB DDR4 memory meet demands emerging in the field of web hosting, managed CRM services, shared, managed or private cloud environments, or other XaaS solutions.\r\n<span style=\"font-weight: bold;\">Primergy RX2520 M1.</span> It is an efficient and scalable platform featuring the latest Intel Xeon processor E5-2400 v2 product family and up to 192 GB RAM. Its compact Primergy 2U modular chassis provides up to twelve 3.5-inch or sixteen 2.5-inch storage drives. Lower costs are ensured thanks to modular upgrade options, 96 % efficient power supply and the enhanced iRMC S4 management.\r\n<span style=\"font-weight: bold;\">Primergy RX2530 M1.</span> The server is a dual-socket rack server that provides high performance of the new Intel Xeon processor E5-2600 v3 product family, expandability of up to 1536 GB of DDR4 memory and up to 10x 2.5-inch storage devices - all in a 1U space saving housing. Accordingly, the Primergy RX2530 M1 is the optimal system for virtualization and scale-out scenarios, small databases and also for high performance computing.\r\n<span style=\"font-weight: bold;\">Primergy RX2530 M2.</span> The server is a dual-socket rack server that provides high performance of the new Intel Xeon processor E5-2600 v4 product family, expandability of up to 1536 GB (3TB release planned for end 2016) of DDR4 memory and up to 10x 2.5-inch storage devices - all in a 1U space saving housing. Accordingly, the Primergy RX2530 M2 is the optimal system for virtualization and scale-out scenarios, small databases and also for high performance computing.\r\n<span style=\"font-weight: bold;\">Primergy RX2540 M1.</span> The server is a dual-socket rack server that provides high performance of the new Intel Xeon processor E5-2600 v4 product family, expandability of up to 1536 GB (3TB release planned for end 2016) of DDR4 memory and up to 10x 2.5-inch storage devices - all in a 1U space saving housing. Accordingly, the Primergy RX2530 M2 is the optimal system for virtualization and scale-out scenarios, small databases and also for high performance computing.\r\n<span style=\"font-weight: bold;\">Primergy RX2540 M2.</span> The server is the new 2U dual socket rack server for high usability, scalability and cost-efficiency. Its Intel Xeon E5-2600 v4 processors in conjunction with DDR4 memory technology with up to 1.5 TB (3TB release planned for end 2016) increases performance to meet the requirements for data center processing, enterprise applications as well as collaboration. The modular design offers excellent expandability of up to 24 disk drives, up to 8 PCIe Gen3 expansion cards, and best-in-class energy efficiency thanks to two hot-plug power supplies with up to 96% efficiency meet the future demands of data growth. To complete the picture, DynamicLoM makes network connections more flexible and ready for future modifications. Operation in higher ambient temperatures is ensured by the Cool-safe® Advanced Thermal Design resulting in lower OPEX.\r\n<span style=\"font-weight: bold;\">Primergy RX2560 M2.</span> The server offers maximum performance, best expandability and highest availability without any compromises. Branches, data centers and SMEs value the performance of the two Intel Xeon E5 v4 processors and 1536 GB (3TB release planned for end 2016) DDR4 memory support. Up to 10 extension slots and the redundant power supply enable top availability levels and excellent expandability options. The server is thus ideal for computing-intensive applications, virtualization solutions and databases.\r\n<span style=\"font-weight: bold;\">Primergy RX4770 M2.</span> The server defines four-socket rack server technology without compromising performance, scalability, and expandability. Featuring the latest Intel Xeon processor E7-4800/8800 v3 product family with up to 72 cores as well as superfast DDR4 main memory, the Primergy RX4770 M2 fulfills the requirements of solutions operating ‘in-memory’ such as SAP HANA. It is ideal for virtualization, server consolidation, databases, business processing, and general 4-socket data-intensive applications where price/performance and highest realibility is paramount.\r\n<span style=\"font-weight: bold;\">Primergy RX4770 M3.</span> The server defines four-socket rack server technology without compromising performance, scalability, and expandability. Featuring the latest Intel Xeon processor E7-4800/8800 v4 product family with up to 24 cores as well as superfast DDR4 main memory, the Primergy RX4770 M3 fulfills the requirements of solutions operating ‘in-memory’ such as SAP HANA. It is ideal for virtualization, server consolidation, databases, business processing, and general 4-socket data-intensive applications where price/performance and highest realibility is paramount.","shortDescription":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Server Primergy RX","keywords":"","description":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.\r\nPrimergy RX servers deliver approximately 20 years of development and prod","og:title":"Fujitsu Server Primergy RX","og:description":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.\r\nPrimergy RX servers deliver approximately 20 years of development and prod","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg"},"eventUrl":"","translationId":2040,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":62,"title":"Rack server"}],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-storage-eternus-cs200c-s4":{"id":1097,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Storage_ETERNUS_CS200c_S4.png","logo":true,"scheme":false,"title":"Fujitsu Storage ETERNUS CS200c S4","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-storage-eternus-cs200c-s4","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"<span style=\"font-weight: 700; \">Features<span style=\"white-space:pre\">\t</span>and Benefits:</span>\r\n<span style=\"font-weight: 700; \">Integrates correctly-sized system technology and leading data protection software </span>\r\nEasy and fast deployment, simple to purchase\r\nMaximizes resources\r\nBudget security\r\n<span style=\"font-weight: 700; \">Backup, archiving and deduplication capabilities </span><span style=\"font-weight: 700;\">within one appliance</span>\r\nManaging the complete data lifecycle efficiently\r\nReduces network requirements and storage costs\r\n<span style=\"font-weight: 700; \">Protects a wide range of applications, virtual and hyper-converged infrastructures with a single integrated solution</span>\r\nIncreases availability and recoverability meeting highest RTO/RPO demands\r\nCuts cost and downtime","shortDescription":"The FUJITSU Storage ETERNUS CS200c simplifies data protection and management in a single integrated solution for the digital world. Industry-leading software from Commvault is perfectly aligned with powerful Fujitsu system technology providing excellent features for business efficiency and continuity. The appliance addresses the challenges in protecting business applications, virtualized and hyper-converged environments and facilitates compliance with regulations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Storage ETERNUS CS200c S4","keywords":"data, range, wide, hyper-converged, virtual, applications, costs, Reduces","description":"<span style=\"font-weight: 700; \">Features<span style=\"white-space:pre\">\t</span>and Benefits:</span>\r\n<span style=\"font-weight: 700; \">Integrates correctly-sized system technology and leading data protection software </span>\r\nEasy and fast deployment, simp","og:title":"Fujitsu Storage ETERNUS CS200c S4","og:description":"<span style=\"font-weight: 700; \">Features<span style=\"white-space:pre\">\t</span>and Benefits:</span>\r\n<span style=\"font-weight: 700; \">Integrates correctly-sized system technology and leading data protection software </span>\r\nEasy and fast deployment, simp","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Storage_ETERNUS_CS200c_S4.png"},"eventUrl":"","translationId":1098,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"fujitsu-storage-eternus-dx":{"id":390,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_ETERNUS_DX.png","logo":true,"scheme":false,"title":"Fujitsu Storage ETERNUS DX","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-storage-eternus-dx","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Combining leading performance architecture with automated quality of service management the Fujitsu Storage ETERNUS DX series aligns storage resources with business priorities, thus enabling higher system utilization and delivering increased system consolidation capabilities and a faster ROI. Unified scalable entry-level and midrange systems, a seamless family concept enabling system upgrades and ETERNUS SF, the unified management suite across the product line, reduce operational and migration costs. ETERNUS SF provides enterprise-class functionalities in the entry and midrange class and allows flexible disaster recovery and business continuity concepts for the different model sizes, thus decreasing investment costs.","shortDescription":"Fujitsu ETERNUS DX - Business-centric Storage","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Storage ETERNUS DX","keywords":"ETERNUS, system, enabling, business, Storage, midrange, Fujitsu, costs","description":"Combining leading performance architecture with automated quality of service management the Fujitsu Storage ETERNUS DX series aligns storage resources with business priorities, thus enabling higher system utilization and delivering increased system consolidati","og:title":"Fujitsu Storage ETERNUS DX","og:description":"Combining leading performance architecture with automated quality of service management the Fujitsu Storage ETERNUS DX series aligns storage resources with business priorities, thus enabling higher system utilization and delivering increased system consolidati","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_ETERNUS_DX.png"},"eventUrl":"","translationId":391,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":" Ready-made entry-level storage systems are often used in various solutions for the SMB segment: disk space consolidation, virtualization, various cluster solutions requiring shared block access.\r\nKey architecture features of most entry-level storage systems on the market:\r\n<ul><li>Use one or two hot-swap controllers that use disk sharing. The controller means a specialized server in a special form factor that provides storage operation (working with disks, servicing arrays and providing volumes to hosts, etc.).</li><li>The presence of two controllers provides an increase in the overall reliability of storage - the ability to avoid downtime during the planned shutdown or failure of one of the controllers) and additional scaling of performance when distributing volumes across different controllers. When using the write cache, its integrity is protected: power protection (regular battery or ionistors plus flash memory reset) and duplication of content between controllers.</li><li>The choice of host interfaces: 16 and 8 Gb FiberChannel, 1 and 10 Gb Ethernet (iSCSI, some models may have FCoE support), SAS. For some models, there are combined options, for example, FC + SAS.</li><li>It is possible to connect additional disk shelves (simple cases with SAS expanders) through the SAS interface. To increase the reliability of the connection, a 2-way connection can be applied (below is an example of one of the possible connection schemes).</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What Is Entry-Level Storage?</span>\r\nEntry-level flash storage is simple, smart, secure, affordable, high-performance data storage for enterprises to start small and grow with seamless cloud connectivity as business requirements increase.\r\nOrganizations large and small are navigating at a rapid pace of change in a data-driven economy. Delivering data simply, quickly, and cost-effectively is essential to driving business growth, and the hybrid cloud has emerged as the most efficient way to meet changing business needs. Every IT organization is trying to determine how to modernize with hybrid cloud, and all-flash storage systems are critical on-premises to speed up enterprise applications. However, small enterprises have continued to use hard disk storage systems because of the high cost of all-flash solutions.\r\nAn entry-level storage system offers compact, dense, cost-effective, and easy-to-use storage. These storage systems can be deployed in small offices, small enterprises, and remote locations to run both file and block workloads effectively and efficiently. A simple storage system should support multiple protocols, including FC, NFS, SMB/CIFS, iSCSI, and FCoE, to help customers consolidate multiple applications onto a single simple system. It must be easy to install and deploy, secure and provide flexibility to connect to the cloud.\r\nEntry-level flash storage systems help accelerate all applications, consolidate workloads with better user experience, more effective storage and offer the best value to the customer.\r\n<span style=\"font-weight: bold;\">What Are the Benefits of Entry-Level Storage?</span>\r\n The benefits of entry-level storage include:\r\n<ul><li>Improved user experience with fast, secure, and continuous access to data;</li><li>Improved storage efficiency;</li><li>Reduced cost through improved TCO;</li><li>Increased ability for IT to support new business opportunities by leveraging the latest technologies like artificial intelligence (AI), machine learning (ML), deep learning (DL), and cloud.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Entry_Level_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["fujitsu-eternus-cd10000","fujitsu-identity-as-a-service-idaas","fujitsu-integrated-system-primeflex-for-storage-spaces-direct","fujitsu-notebook-lifebook-u937","fujitsu-palmsecure-id-login","fujitsu-server-primequest","fujitsu-server-primergy","fujitsu-server-primergy-rx","fujitsu-storage-eternus-cs200c-s4","fujitsu-storage-eternus-dx"]},"links":{"first":"http://apis.roi4cio.com/api/products?page=1","last":"http://apis.roi4cio.com/api/products?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/products","per_page":20,"to":10,"total":10},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[2750],"values":{"2750":{"id":2750,"title":"Fujitsu"}}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"62":{"id":62,"title":"Rack server"},"134":{"id":134,"title":"Object Storage"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}