{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"products-popover":{"_type":"localeString","en":"Products","de":"die produkte","ru":"Продукты"},"introduction-popover":{"_type":"localeString","en":"introduction","ru":"внедрения"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"user-implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"en":"Partnership program","ru":"Партнерская программа","_type":"localeString"},"partner-discounts":{"en":"Partner discounts","ru":"Партнерские скидки","_type":"localeString"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"en":"Certification of technical specialists","ru":"Сертификация технических специалистов","_type":"localeString"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"_type":"localeString","en":"Supplied products","ru":"Поставляемые продукты"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"_type":"localeString","en":"ROI4CIO: Company","ru":"ROI4CIO: Компания"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"translations":{"en":"Company","ru":"Компания","_type":"localeString"},"name":"title"},{"translations":{"en":"Company description","ru":"Описание компании","_type":"localeString"},"name":"description"},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"dell":{"id":169,"title":"DELL","logoURL":"https://old.roi4cio.com/uploads/roi/company/dell_logo.png","alias":"dell","address":"","roles":[{"id":3,"type":"vendor"}],"description":"Dell Inc. is an American privately owned multinational computer technology company based in Round Rock, Texas, United States, that develops, sells, repairs, and supports computers and services.","companyTypes":["vendor"],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":0,"supplierPartnersCount":15,"b4r":0,"categories":{"7":{"id":7,"title":"Storage - General-Purpose Disk Arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png","alias":"storage-general-purpose-disk-arrays"},"35":{"id":35,"title":"Server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png","alias":"server"},"38":{"id":38,"title":"Tablet PC","description":"A tablet computer, commonly shortened to tablet, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package. Tablets, being computers, do what other personal computers do, but lack some input/output (I/O) abilities that others have. Modern tablets largely resemble modern smartphones, the only difference being that tablets are relatively larger than smartphones, with screens 7 inches (18 cm) or larger, measured diagonally, and may not support access to a cellular network.\r\nThe touchscreen display is operated by gestures executed by finger or digital pen (stylus), instead of the mouse, trackpad, and keyboard of larger computers. Portable computers can be classified according to the presence and appearance of physical keyboards. Two species of a tablet, the slate and booklet, do not have physical keyboards and usually accept text and other input by use of a virtual keyboard shown on their touchscreen displays. To compensate for their lack of a physical keyboard, most tablets can connect to independent physical keyboards by Bluetooth or USB; 2-in-1 PCs have keyboards, distinct from tablets.\r\nThe form of the tablet was conceptualized in the middle of the 20th century (Stanley Kubrick depicted fictional tablets in the 1968 science fiction film A Space Odyssey) and prototyped and developed in the last two decades of that century. In 2010, Apple released the iPad, the first mass-market tablet to achieve widespread popularity. Thereafter tablets rapidly rose in ubiquity and soon became a large product category used for personal, educational and workplace applications, with sales stabilizing in the mid-2010s.\r\nAndroid was the first of the 2000s-era dominating platforms for tablet computers to reach the market. In 2008, the first plans for Android-based tablets appeared. The first products were released in 2009. Among them was the Archos 5, a pocket-sized model with a 5-inch touchscreen, that was first released with a proprietary operating system and later (in 2009) released with Android 1.4. The Camangi WebStation was released in Q2 2009. The first LTE Android tablet appeared in late 2009 and was made by ICD for Verizon. This unit was called the Ultra, but a version called Vega was released around the same time. Ultra had a 7-inch display while Vega's was 15 inches. Many more products followed in 2010. Several manufacturers waited for Android Honeycomb, specifically adapted for use with tablets, which debuted in February 2011.\r\nApple is often credited for defining a new class of consumer device with the iPad, which shaped the commercial market for tablets in the following years, and was the most successful tablet at the time of its release. iPads and competing devices were tested by the US military in 2011 and cleared for secure use in 2013. Its debut in 2010 pushed tablets into the mainstream. Samsung's Galaxy Tab and others followed, continuing the trends towards the features listed above. In March 2012, PC Magazine reported that 31% of U.S. Internet users owned a tablet, used mainly for viewing published content such as video and news. The top-selling line of devices was Apple's iPad with 100 million sold between its release in April 2010 and mid-October 2012, but iPad market share (number of units) dropped to 36% in 2013 with Android tablets climbing to 62%. Android tablet sales volume was 121 million devices, plus 52 million, between 2012 and 2013 respectively. Individual brands of Android operating system devices or compatibles follow iPad with Amazon's Kindle Fire with 7 million, and Barnes & Noble's Nook with 5 million.\r\nThe BlackBerry PlayBook was announced in September 2010 that ran the BlackBerry Tablet OS. The BlackBerry PlayBook was officially released to US and Canadian consumers on April 19, 2011. Hewlett Packard announced that the TouchPad, running WebOS 3.0 on a 1.2 GHz Qualcomm Snapdragon CPU, would be released in June 2011. On August 18, 2011, HP announced the discontinuation of the TouchPad, due to sluggish sales.[66] In 2013, the Mozilla Foundation announced a prototype tablet model with Foxconn which ran on Firefox OS. Firefox OS was discontinued in 2016. The Canonical hinted that Ubuntu would be available on tablets by 2014. In February 2016 there was a commercial release of the BQ Aquaris Ubuntu tablet utilizing the Ubuntu Touch operating system. Canonical terminated support for the project due to lack of market interest on 5 April 2017 and it was then adopted by the UBports as a community project.\r\nAs of February 2014, 83% of mobile app developers were targeting tablets, but 93% of developers were targeting smartphones. By 2014 around 23% of B2B companies were said to have deployed tablets for sales-related activities, according to a survey report by Corporate Visions. The iPad held majority use in North America, Western Europe, Japan, Australia, and most of the Americas. Android tablets were more popular in most of Asia (China and Russia an exception), Africa and Eastern Europe. In 2015 tablet sales did not increase. Apple remained the largest seller but its market share declined below 25%. Samsung vice president Gary Riding said early in 2016 that tablets were only doing well among those using them for work. Newer models were more expensive and designed for a keyboard and stylus, which reflected the changing uses. As of early 2016, Android reigned over the market with 65%. Apple took the number 2 spot with 26%, and Windows took a distant third with the remaining 9%. In 2018, out of 4.4 billion computing devices, Android accounted for 2 billion, iOS for 1 billion, and the remainder were PCs, in various forms (desktop, notebook, or tablet), running various operating systems (Windows, macOS, ChromeOS, Linux, etc.).","materialsDescription":" <span style=\"font-weight: bold;\">Why are tablet PCs popular?</span>\r\nBy definition, a tablet is a highly portable PC whose primary interface is a touch screen that occupies the full length/width of the device but whose speaker and microphone are not positioned for hand-held calling. In popular perception, however, tablets simply combine the best aspects of smartphones and laptop PCs, creating what tablet lovers consider the ultimate mobile computing experience:\r\n<ul><li>Compatible with home/office wireless and cellular data networks</li><li>Portable, but with larger, clearer displays than earlier mobile devices</li><li>Powerful, but lighter and easier to carry than traditional laptops</li><li>Longer battery life and greater storage capacity than typical smartphones</li></ul>\r\nTablet owners can use touch commands or a virtual keyboard (sometimes a physical one) to run web browsers, email programs, and interactive games just like they do on a desktop PC or laptop. But when they're ready to move, they can keep working (or playing) simply by switching from a home/office wireless network to a cellular data network.\r\n<span style=\"font-weight: bold;\">Are there different types of tablet PCs?</span>\r\nYes and no, depending on the strictness of the definition.\r\nEngineers used the term slate to describe the original, widely popularized tablet PC form factor-- thin and flat, one-sided, without a keyboard. That distinguished tablets from convertibles: full-fledged, keyboard-equipped laptops with hinges that allowed the cover/touch screen to flip 180 degrees -- creating a bulky but usable "tablet."\r\nToday, the terminology has evolved -- adding the phrase "2-in-1" -- to better distinguish the different types of tablets and laptops. Note that within each category are models that run on mobile operating systems and others that run on regular PC operating systems:\r\n<ul><li><span style=\"font-weight: bold;\">Laptop:</span> The original, portable PC that opens partway, like a notebook, to reveal a screen and a keyboard.</li><li><span style=\"font-weight: bold;\">Tablet:</span> The original, widely popularized slate tablet form factor: thin, flat, and without a keyboard.</li><li><span style=\"font-weight: bold;\">2-in-1 Detachable</span> (also called a "hybrid laptop" or "hybrid tablet"): A device whose keyboard and screen can be fully detached from each other. Depending on the manufacturer, 2-in-1 Detachables might be marketed as "tablets-with-optional-keyboards" or "laptops-with-detachable-tablets."</li><li><span style=\"font-weight: bold;\">2-in-1 Attached</span> (also called a "convertible laptop" or "convertible tablet"): A device with either a hinge/screen combination that flips around for use as a tablet or a keyboard that in some way folds out from the screen/body. While similar to the original convertibles, today's 2-in-1 Attached models are much thinner and lighter.</li></ul>\r\nIn addition, a new term -- Multimode Tablet -- has emerged to describe models with specialized hinge/handles that allow them to be used traditionally (directly in your hands) or in multiple different ways while propped on a desktop (in tilt mode for easier touch entry (or to project the screen on a nearby wall), in standing mode for touch screen-controlled presentations, or in tent mode for less interactive presentations). Some pc manufacturers even offer a "hanging mode" or include "tablet mode" and "laptop mode" among their list of available modes.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Tablet_PC.png","alias":"tablet-pc"},"42":{"id":42,"title":"UTM - Unified threat management","description":"<span style=\"font-weight: bold; \">UTM (Unified Threat Management)</span> system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.\r\nUnified threat management <span style=\"font-weight: bold; \">devices </span>are often packaged as network security appliances that can help protect networks against combined security threats, including malware and attacks that simultaneously target separate parts of the network.\r\nUTM <span style=\"font-weight: bold; \">cloud services</span> and virtual network appliances are becoming increasingly popular for network security, especially for smaller and medium-sized businesses. They both do away with the need for on-premises network security appliances, yet still provide centralized control and ease of use for building network security defense in depth. While UTM systems and <span style=\"font-weight: bold; \">next-generation firewalls (NGFWs)</span> are sometimes comparable, unified threat management device includes added security features that NGFWs don't offer.\r\nOriginally developed to fill the network security gaps left by traditional firewalls, NGFWs usually include application intelligence and intrusion prevention systems, as well as denial-of-service protection. Unified threat management devices offer multiple layers of network security, including next-generation firewalls, intrusion detection/prevention systems, antivirus, virtual private networks (VPN), spam filtering and URL filtering for web content.\r\nUnified threat management appliance has gained traction in the industry due to the emergence of blended threats, which are combinations of different types of malware and attacks that target separate parts of the network simultaneously. By creating a single point of defense and providing a single console, unified security management make dealing with varied threats much easier.\r\nUnified threat management products provide increased protection and visibility, as well as control over network security, reducing complexity. Unified threat management system typically does this via inspection methods that address different types of threats. These methods include:\r\n<ul><li><span style=\"font-weight: bold; \">Flow-based inspection,</span> also known as stream-based inspection, samples data that enters a UTM device, and then uses pattern matching to determine whether there is malicious content in the data flow.</li><li> <span style=\"font-weight: bold; \">Proxy-based inspection</span> acts as a proxy to reconstruct the content entering a UTM device, and then executes a full inspection of the content to search for potential security threats. If the content is clean, the device sends the content to the user. However, if a virus or other security threat is detected, the device removes the questionable content, and then sends the file or webpage to the user.</li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> How UTM is deployed?</h1>\r\nBusinesses can implement UTM as a UTM appliance that connects to a company's network, as a software program running on an existing network server, or as a service that works in a cloud environment.\r\nUTMs are particularly useful in organizations that have many branches or retail outlets that have traditionally used dedicated WAN, but are increasingly using public internet connections to the headquarters/data center. Using a UTM in these cases gives the business more insight and better control over the security of those branch or retail outlets.\r\nBusinesses can choose from one or more methods to deploy UTM to the appropriate platforms, but they may also find it most suitable to select a combination of platforms. Some of the options include installing unified threat management software on the company's servers in a data center; using software-based UTM products on cloud-based servers; using traditional UTM hardware appliances that come with preintegrated hardware and software; or using virtual appliances, which are integrated software suites that can be deployed in virtual environments.\r\n<h1 class=\"align-center\">Benefits of Using a Unified Threat Management Solution</h1>\r\nUTM solutions offer unique benefits to small and medium businesses that are looking to enhance their security programs. Because the capabilities of multiple specialized programs are contained in a single appliance, UTM threat management reduces the complexity of a company’s security system. Similarly, having one program that controls security reduces the amount of training that employees receive when being hired or migrating to a new system and allows for easy management in the future. This can also save money in the long run as opposed to having to buy multiple devices.\r\nSome UTM solutions provide additional benefits for companies in strictly regulated industries. Appliances that use identity-based security to report on user activity while enabling policy creation based on user identity meet the requirements of regulatory compliance such as HIPPA, CIPA, and GLBA that require access controls and auditing that meet control data leakage.\r\nUTM solutions also help to protect networks against combined threats. These threats consist of different types of malware and attacks that target separate parts of the network simultaneously. When using separate appliances for each security wall, preventing these combined attacks can be difficult. This is because each security wall has to be managed individually in order to remain up-to-date with the changing security threats. Because it is a single point of defense, UTM’s make dealing with combined threats easier.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_UTM.jpg","alias":"utm-unified-threat-management"},"44":{"id":44,"title":"IAM - Identity and Access Management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png","alias":"iam-identity-and-access-management"},"46":{"id":46,"title":"Data Protection and Recovery Software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png","alias":"data-protection-and-recovery-software"},"51":{"id":51,"title":"PaaS - Platform as a service","description":"<span style=\"font-weight: bold; \">Platform as a Service (PaaS)</span> or <span style=\"font-weight: bold; \">Application Platform as a Service (aPaaS)</span> or <span style=\"font-weight: bold; \">platform-based service</span> is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.\r\n<span style=\"font-weight: bold; \">PaaS can be delivered in three ways:</span>\r\n<span style=\"font-weight: bold;\">As a public cloud service</span> from a provider, where the consumer controls software deployment with minimal configuration options, and the provider provides the networks, servers, storage, operating system (OS), middleware (e.g. Java runtime, .NET runtime, integration, etc.), database and other services to host the consumer's application.\r\n<span style=\"font-weight: bold;\">As a private service</span> (software or appliance) behind a firewall.\r\n<span style=\"font-weight: bold;\">As software</span> deployed on a public infrastructure as a service.\r\n<span style=\"color: rgb(97, 97, 97); \">The original intent of PaaS technology was to simplify the code-writing process for developers, with the infrastructure and operations handled by the PaaS provider. Originally, all PaaSes were in the public cloud. Because many companies did not want to have everything in the public cloud, private and hybrid PaaS options (managed by internal IT departments) were created.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">PaaS provides an environment for developers and companies to create, host and deploy applications, saving developers from the complexities of the infrastructure side (setting up, configuring and managing elements such as servers and databases).</span>\r\n<span style=\"color: rgb(97, 97, 97); \">PaaS products can improve the speed of developing an app, and allow the consumer to focus on the application itself. With PaaS, the consumer manages applications and data, while the provider (in public PaaS) or IT department (in private PaaS) manages runtime, middleware, operating system, virtualization, servers, storage and networking.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">PaaS offerings may also include facilities for application design, application development, testing and deployment, as well as services such as team collaboration, web service integration, and marshalling, database integration, security, scalability, storage, persistence, state management, application versioning, application instrumentation, and developer community facilitation. Besides the service engineering aspects, PaaS solutions include mechanisms for service management, such as monitoring, workflow management, discovery and reservation.</span>\r\nThere are various types of PaaS providers. All offer application hosting and a deployment environment, along with various integrated services. Services offer varying levels of scalability and maintenance. Developers can write an application and upload it to a PaaS platform that supports their software language of choice, and the application runs on that PaaS.","materialsDescription":"<h1 class=\"align-center\">How PaaS works</h1>\r\n<p class=\"align-left\">PaaS does not replace a company's entire IT infrastructure for software development. It is provided through a cloud service provider's hosted infrastructure with users most frequently accessing the offerings through a web browser. PaaS can be delivered through public, private and hybrid clouds to deliver services such as application hosting and Java development.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Other PaaS services include:</span></p>\r\n<ul><li>Development team collaboration</li><li>Application design and development</li><li>Application testing and deployment</li><li>Web service integration</li><li>Information security</li><li>Database integration</li></ul>\r\n<p class=\"align-left\">Users pay for PaaS on a per-use basis. However, different platform as a service providers charge a flat monthly fee for access to the platform and its applications.</p>\r\n<h1 class=\"align-center\">What are the types of PaaS?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Public PaaS</span></li></ul>\r\nA public PaaS allows the user to control software deployment while the cloud provider manages the delivery of all other major IT components necessary to the hosting of applications, including operating systems, databases, servers and storage system networks. \r\nPublic PaaS vendors offer middleware that enables developers to set up, configure and control servers and databases without the necessity of setting up the infrastructure side of things. As a result, public PaaS and IaaS (infrastructure as a service) run together, with PaaS operating on top of a vendor's IaaS infrastructure while leveraging the public cloud. \r\n<ul><li><span style=\"font-weight: bold; \">Private PaaS</span></li></ul>\r\nA private PaaS is usually delivered as an appliance or software within the user's firewall which is frequently maintained in the company's on-premises data center. A private PaaS software can be developed on any type of infrastructure and can work within the company's specific private cloud. Private PaaS allows an organization to better serve developers, improve the use of internal resources and reduce the costly cloud sprawl that many companies face.\r\n<ul><li><span style=\"font-weight: bold; \">Hybrid PaaS </span></li></ul>\r\nCombines public PaaS and private PaaS to provide companies with the flexibility of infinite capacity provided by a public PaaS model and the cost efficiencies of owning an internal infrastructure in private PaaS. Hybrid PaaS utilizes a hybrid cloud.\r\n<ul><li><span style=\"font-weight: bold; \">Communication PaaS </span></li></ul>\r\nCPaaS is a cloud-based platform that allows developers to add real-time communications to their apps without the need for back-end infrastructure and interfaces. Normally, real-time communications occur in apps that are built specifically for these functions. Examples include Skype, FaceTime, WhatsApp and the traditional phone. CPaaS provides a complete development framework for the creation of real-time communications features without the necessity of a developer building their own framework.\r\n<ul><li><span style=\"font-weight: bold; \">Mobile PaaS</span> </li></ul>\r\nMPaaS is the use of a paid integrated development environment for the configuration of mobile apps. In an mPaaS, coding skills are not required. MPaaS is delivered through a web browser and typically supports public cloud, private cloud and on-premises storage. The service is usually leased with pricing per month, varying according to the number of included devices and supported features.\r\n<ul><li><span style=\"font-weight: bold; \">Open PaaS</span></li></ul>\r\nIt is a free, open source, business-oriented collaboration platform that is attractive on all devices and provides useful web apps, including calendar, contacts and mail applications. OpenPaaS was designed to allow users to quickly deploy new applications with the goal of developing a PaaS technology that is committed to enterprise collaborative applications, specifically those deployed on hybrid clouds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/PaaS_-_Platform_as_a_service.png","alias":"paas-platform-as-a-service"},"227":{"id":227,"title":"Advanced Analytics Software","description":" <span style=\"font-weight: bold;\">Advanced analytics</span> is a part of data science that uses high-level methods and tools to focus on projecting future trends, events, and behaviors. This gives organizations the ability to perform advanced statistical models such as ‘what-if’ calculations, as well as future-proof various aspects of their operations.\r\nThe term is an umbrella for several sub-fields of analytics that work together in their predictive capabilities.\r\nThe major areas that make up advanced analytics are predictive data analytics, big data, and data mining. The process of advanced analytics includes all three areas at various times.\r\n<span style=\"font-weight: bold;\">Data mining</span> is a key aspect of advanced analytics, providing the raw data that will be used by both big data and predictive analytics. <span style=\"font-weight: bold;\">Big data analytics</span> are useful in finding existing insights and creating connections between data points and sets, as well as cleaning data.\r\nFinally, <span style=\"font-weight: bold;\">predictive analytics</span> can use these clean sets and existing insights to extrapolate and make predictions and projections about future activity, trends, and consumer behaviors.\r\nAdvanced analytics also include newer technologies such as machine learning and artificial intelligence, semantic analysis, visualizations, and even neural networks. Taken together, they help advanced analytics software create an accurate enough canvas to make reliable predictions and generate actionable BI insights on a deeper level.","materialsDescription":"<h1 class=\"align-center\">A list of tips on how to manage the process of building an advanced analytics program</h1>\r\n<ul><li>Start with a proof-of-concept project to demonstrate the potential business value of analytics applications.</li><li>Take training seriously. New data management and analytics skills likely will be needed, especially if big data platforms and tools like SAS advanced analytics tools are involved.</li><li>Develop processes to ensure that business units are ready to act on analytical findings so the work of data scientists and other analysts doesn't go to waste.</li><li>Monitor and assess advanced and predictive analytics software on a regular basis to make sure the data being analyzed is still relevant and the analytical models being run against it are still valid.</li></ul>\r\n<h1 class=\"align-center\">Advanced analytics tools</h1>\r\nThere are a variety of advanced analytics tools to choose from that offer different advantages based on the use case. They generally break down into two categories: open source and proprietary.\r\nOpen source tools have become a go-to option for many data scientists doing machine learning and prescriptive analytics. They include programming languages, as well as computing environments, including Hadoop and Spark. Users typically say they like open source advanced analytics tools because they are generally inexpensive to operate, offer strong functionality and are backed by a user community that continually innovates the tools.\r\nOn the proprietary side, vendors including Microsoft, IBM and the SAS Institute all offer advanced analytics tools. Most require a deep technical background and understanding of mathematical techniques.\r\nIn recent years, however, a crop of self-service analytics tools has matured to make functionality more accessible to business users. Tableau, in particular, has become a common tool. While its functionality is more limited than deeper technical tools, it does enable users to conduct cluster analyses and other advanced analyses.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Advanced_Analytics_Software.png","alias":"advanced-analytics-software"},"243":{"id":243,"title":"Database Development and Management Tools","description":" Many companies create various multi-functional applications to facilitate the management, development and administration of databases.\r\nMost relational databases consist of two separate components: a “back-end” where data is stored and a “front-end” —a user interface for interacting with data. This type of design is smart enough, as it parallels a two-level programming model that separates the data layer from the user interface and allows you to concentrate the software market directly on improving its products. This model opens doors for third parties who create their own applications for interacting with various databases.\r\nDatabase development tools can be used to create varieties of the following programs:\r\n<ul><li>client programs;</li><li>database servers and their individual components;</li><li>custom applications.</li></ul>\r\nThe programs of the first and second types are rather small since they are intended mainly for system programmers. The third type packages are much larger, but smaller than full-featured DBMS.\r\nThe development tools for custom applications include programming systems, various program libraries for various programming languages, and development automation packages (including client-server systems).<br />Database management system, abbr. DBMS (Eng. Database Management System, abbr. DBMS) - a set of software and linguistic tools for general or special purposes, providing management of the creation and use of databases.\r\nDBMS - a set of programs that allow you to create a database (DB) and manipulate data (insert, update, delete and select). The system ensures the safety, reliability of storage and data integrity, as well as provides the means to administer the database.","materialsDescription":" <span style=\"font-weight: bold;\">The main functions of the DBMS:</span>\r\n<ul><li>data management in external memory (on disk);</li><li>data management in RAM using disk cache;</li><li>change logging, backup and recovery of databases after failures;</li><li>support for database languages (data definition language, data manipulation language).</li></ul>\r\n<span style=\"font-weight: bold;\">The composition of the DBMS:</span>\r\nUsually, a modern DBMS contains the following components:\r\n<ul><li>the core, which is responsible for managing data in external and RAM and logging;</li><li>database language processor, which provides the optimization of requests for the extraction and modification of data and the creation, as a rule, of a machine-independent executable internal code;</li><li>a run-time support subsystem that interprets data manipulation programs that create a user interface with a DBMS;<br />service programs (external utilities) that provide a number of additional capabilities for maintaining an information system.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Database_Development_and_Management_Tools.png","alias":"database-development-and-management-tools"},"315":{"id":315,"title":"Storage Device Management Software","description":"Storage management refers to activities undertaken by IT managers and administrators to achieve storage infrastructures' accessibility, reliability, recoverability, and optimal performance.\r\nDespite the significant advantages resulting from the consolidation of data storage in modern computing systems, there are at least two fundamental problems of data storage management - high cost and inefficient use. Even if the cost of disk memory is reduced by an average of 30% per year, the demand for it increases by 100% during the same time, so the total amount of data storage costs will grow by 40%. The fact that memory is used inefficiently has a sensitive effect on meager IT budgets. So is it possible to control disk assets in order to get the most return on investment?\r\nPositive answers to these questions are provided by the storage resource management system. For example, what should an administrator do if he is responsible for accessing data at the bank if customer service is suspended at the very height of the trading day due to slow application performance? One of the probable reasons is that the disk space required by the application is almost exhausted. How quickly does the network administrator identify the true cause of the collapse? Could he have foreseen and prevented her? If it was possible to set a threshold for the acceptable size of free disk space in the relevant rules, he would have received a notification in advance that the file system was about to begin to run out of disk space, and would be able to take appropriate measures in time.\r\nStorage networks today require constant high availability - a good reason to use monitoring systems and analysis tools not only when a problem has already arisen. In addition, a comprehensive overview of the storage network is usually required.\r\nIn large data centers, managing drives is significantly more expensive than acquiring them. When using, in particular, SAN, thanks to centralized administration and management through switches and directors, it was already possible to significantly save on management. With scalable storage capacity in SANs, high availability and performance make it easy to provide and manage bulk storage in large data centers. However, increasing capacity, increasing data transfer rates, heterogeneous equipment from different manufacturers and virtualization technologies make monitoring the structure of storage networks and analyzing internal processes more and more difficult. Obviously, for the network administrator, they create new difficulties, which in professional jargon are called "network blindness." By this we mean the inability to diagnose, analyze and prevent failures, and, in addition, complex protocols and structures reduce network performance.\r\nOvercoming “blindness” is of great practical importance. Many companies risk significant damage already in the first four hours after the failure, and the loss of enterprises specializing, for example, in electronic commerce and financial institutions, reaches hundreds of thousands or even several million dollars per hour. These figures once again convince us that there is a need to respond very quickly to failures and performance problems.","materialsDescription":"<span style=\"font-weight: bold;\">Storage device management utilities</span>\r\n<ul><li>Backup software makes copies of all information stored on a disk and restores either the entire disk (aka Disk cloning) in an event of disk failure or selected files that are accidentally deleted or corrupted. Undeletion utilities are sometimes more convenient.</li><li>Disk checkers scan an operating hard drive and check for logical (filesystem) or physical errors.</li><li>Disk compression utilities transparently compress/uncompress the contents of a disk, increasing the capacity of the disk.</li><li>Disk defragmenters detect computer files whose contents are scattered across several locations on the hard disk and collect the fragments into one contiguous area.</li><li>Disk formatters prepare a data storage device such as a hard disk, solid-state drive, floppy disk or USB flash drive for initial use. These are often used to permanently erase an entire device.</li><li>Disk partition editors divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive.</li><li>Disk space analyzers provide a visualization of disk space usage by getting the size for each folder (including sub folders) and files in folder or drive. showing the distribution of the used space.</li><li>Tape initializers write a label to a magnetic tape or other magnetic medium. Initializers for DECtape formatted the tape into blocks.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_Device_Management_Software.png","alias":"storage-device-management-software"},"327":{"id":327,"title":"Change and Configuration Management Software","description":" Software teams today face significant challenges. Companies require the production of high-quality software at unprecedented speeds. Software application requirements continue to grow more complex often with shorter and more frequent release cycles. Distributed development teams present challenges related to effective teaming, parallel development and diverse platforms - these factors and more intensify the pressures of developing quality software. Developing quality software in a repeatable and predictable fashion requires managing and tracking development artifacts and the activities of the development team. Successful development teams utilize software configuration management and software change management tools to help manage the software development lifecycle.\r\nSoftware configuration management provides version control and parallels development support to manage and control software assets. Software change management provides defect tracking and automation of software processes across the development lifecycle.\r\nSolutions that combine software configuration management and software change management in a single, tightly integrated solution are referred to as software change and configuration management (SCCM) solutions. SCCM solutions utilize activities to easily manage changes made to development artifacts. Unlike standalone SCM tools, SCCM solutions usually include substantial workflow capabilities which automate and effectively govern the software development processes for repeatable and predictable software development.\r\nEssentially, SCCM answers the ‘who’, ‘what’, ‘when’, and ‘why’ of software development. Who made the changes? What changes were made to the software? When were the changes made? Why were the changes made? Development teams and project leaders should be able to obtain answers to these questions to manage a project's activities, determine project status and track the actual product evolution.\r\nA fully comprehensive software change and configuration management (SCCM) solution empowers companies by accelerating software and systems delivery, making global teams more efficient, and governing the end-to-end software development processes. Solutions should be secure, flexible, and robust as well as provide the ability to support any size team, regardless of platform or location. Selecting ‘best in class’ solution, implementing proven best practices and partnering with a company that is a leader in technology reduces the risks associated with quality software development.","materialsDescription":" \r\n<span style=\"font-weight: bold;\">What is software configuration management (SCM)?</span>\r\nSoftware configuration management (SCM) is designed to control change by identifying and tracking changed software artifacts and managing different versions of these artifacts.\r\n<span style=\"font-weight: bold;\">What is software change and configuration management (SCCM)?</span>\r\nSoftware change and configuration management (SCCM) provide the comprehensive integration with best practice guidance of software configuration management and software change management capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Change_and_Configuration_Management_Software.png","alias":"change-and-configuration-management-software"},"383":{"id":383,"title":"Software-defined storage platforms, SDS","description":" <span style=\"font-weight: bold;\">Software-defined storage (SDS)</span> is a marketing term for computer data storage software for policy-based provisioning and management of data storage independent of the underlying hardware. \r\n<span style=\"font-weight: bold;\">SDS software</span> typically includes a form of storage virtualization to separate the storage hardware from the software that manages it. The software enabling a software-defined storage environment may also provide policy management for features such as data deduplication, replication, thin provisioning, snapshots and backup.<br /><br /><span style=\"font-weight: bold;\">SDS system</span> hardware may or may not also have abstraction, pooling, or automation software of its own. When implemented as software only in conjunction with commodity servers with internal disks, it may suggest software such as a virtual or global file system. If it is software layered over sophisticated large storage arrays, it suggests software such as storage virtualization or storage resource management, categories of products that address separate and different problems. If the policy and management functions also include a form of artificial intelligence to automate protection and recovery, it can be considered as intelligent abstraction.\r\n<span style=\"font-weight: bold;\">Software-defined storage solutions</span> may be implemented via appliances over a traditional storage area network (SAN), or implemented as network-attached storage (NAS), or using object-based storage. ","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What does SDS mean?</span></h1>\r\n<span style=\"font-weight: bold; \">SDS </span>stays for <span style=\"font-weight: bold; \">software-defined storage </span>solution - it is a computer program that manages data storage resources and functionality and has no dependencies on the underlying physical storage hardware.\r\nAll storage systems have always been software-defined. What's changed is that the <span style=\"font-weight: bold; \">software has become portable</span>.\r\nBut nothing in the storage world elicits more divergent opinions than the term "software-defined storage products". With no universally accepted definition, SDS is vendor-specific. Software defined storage leaders shape the SDS definition to match their storage offerings. The result is that every storage vendor appears to offer SDS.\r\nStorage system software historically was tied to the hardware it managed. When the hardware ran out of capacity or performance, it had to be replaced and the software licensing was repurchased along with the hardware.<br />What made matters significantly worse was that storage system architectures created isolated silos. Unique infrastructures made everything from storage provisioning, data protection, disaster recovery, tech refresh, data migration, power and cooling more and more untenable. Compound that with the ongoing trend of rapid data growth and the need to store ever-increasing amounts of data, and the available architectures made storage systems management too complicated, difficult, expensive and ultimately unmaintainable.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are SDS categories pros and cons?</span></h1>\r\n With no working standard SDS definition, a variety of technologies have emerged in the software-defined storage market. For our purposes, the four categories of SDS include: \r\n<ul><li class=\"align-left\"><span style=\"font-weight: bold; \">Hypervisor-based SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Hyper-converged infrastructure (HCI) SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Storage virtualization SDS</span></li><li class=\"align-left\"><span style=\"font-weight: bold; \">Scale-out object and/or file SDS</span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\"> Hypervisor-based SDS pros:</span><br /> </p>\r\n<span style=\"font-weight: bold; \">Flexibility</span>. VSAN works with both hard disk drives (HDDs) and solid-state drives (SSDs), including DIMM-based flash drives, PCIe, SAS, SATA and even NVMe. VMware vSAN supports both HDDs and SSDs in a hybrid mode or all SSDs in all-flash mode.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Scalability and performance</span>. VSAN is highly scalable while delivering high levels of performance. It scales out through vSphere clustering and can support up to 64 vSphere hosts per cluster. Each vSphere host supports approximately 140 TB raw storage capacity and well north of 8 PB of raw storage capacity per cluster. On the performance side, each vSAN host can supply 100,000 or more IOPS, yielding millions of IOPS per cluster.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hypervisor-based SDS cons:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> If a VM requires more IOPS than one physical vSphere host can provide, it can get them from other nodes in the cluster, but with a considerable latency penalty. Inter-cluster storage performance is another issue. Most vSAN clusters use 10 Gbps to 40 Gbps Ethernet and TCP/IP to interconnect the hosts. This architecture essentially replaces a deterministic system bus with a non-deterministic TCP/IP network so latencies between hosts become highly variable. Unless the cluster uses more sophisticated and faster interconnections, its storage performance from one clustered host to another will be highly variable and inconsistent.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple. </span>Converting from a siloed storage environment to a pure vSAN requires converting non-VM images to VMs first. It's a time-consuming process for non-vSphere environments.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hyper-converged infrastructure (HCI) SDS pros:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance.</span> Scaling HCI is as simple as adding a node to the cluster. Scaling storage capacity just requires adding drives (HDDs or SSDs) up to a node's maximum or adding additional nodes. Each HCI product has its own scalability and performance limitations; however, most scale well into the PBs and add performance linearly with each server node added to the cluster.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Simplicity. </span>Plug it in, turn it on, configure and you're done. Few systems are simpler. No DIY, and there's just one throat to choke for support.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Hyper-converged infrastructure (HCI) SDS cons:</span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> HCI cluster capacity is limited by the number of nodes supported in the cluster and the amount of capacity supported per node. If a VM requires more IOPS than a given host can provide, it can get IOPS from other nodes, but with a considerable latency penalty. Inter-cluster storage performance is another issue. Most HCI clusters use 10 Gbps to 40 Gbps Ethernet and TCP/IP to interconnect the hosts so latencies between hosts can be highly variable.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple.</span> Converting from a siloed storage environment to an HCI cluster requires first converting both non-VM images and VMs to the HCI VMs or Docker containers, a time-consuming process.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Storage virtualization SDS pros:</span></p>\r\n<span style=\"font-weight: bold; \"></span><span style=\"font-weight: bold;\">Flexibility.</span> It works with most x86 physical hosts or VMs as long as the hardware or hypervisor is certified and supported by the vendor. It converts all storage that sits behind it into the virtual storage pool, enabling repurposing of older storage. The scale-out versions permit physical or VM access to any node. Multi-copy mirroring isn't necessary to protect against a single controller failure, although it's available. Storage virtualization SDS can be provided as software or bundled with server hardware similar to HCI.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Total cost of ownership (TCO)</span>. The biggest cost savings in storage virtualization SDS comes from commodity hardware and server-based drives. Another cost saving comes from inline data reduction technologies. Compared to equivalent storage systems, most storage virtualization SDS will yield a much more favorable TCO.<span style=\"font-weight: bold; \"><br /></span>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Storage virtualization SDS cons:</span></p>\r\n<span style=\"font-weight: bold;\">Flexibility issues. </span>Most storage virtualization SDS can only run on the specific commodity hardware certified and supported by the vendor. Products that can run as VSAs require hypervisors certified and supported by the vendor.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> On paper, these systems support tremendous capacity scalability, but the pragmatic approach is a bit different. Storage virtualization SDS capacity is constrained by x86 server limitations. Each server can handle only so much capacity before performance declines below acceptable levels. Storage virtualization SDS scale-out is constrained by clustering because the number of storage controller nodes supported is limited. Performance may also be constrained by the same limitations. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Scale-out object and/or file SDS pros:<br /></span></p>\r\n<span style=\"font-weight: bold; \">Scalability and performance. </span>Scaling is multi-dimensional: each node can be scaled individually and generally the cluster itself can add nodes for capacity or performance. Performance for both will never approach that of high-performance block storage.<span style=\"font-weight: bold; \"></span><span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Simplicity. </span>When bundled with hardware, scale-out object or file storage is very simple to set up, configure, and manage. Implementing it as software requires DIY systems integration. Both types leverage commodity hardware, have exceptional scalability and -- in the case of scale-out object storage -- unmatched data resilience and longevity via erasure coding.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Scale-out object and/or file SDS cons:</span></p>\r\n<span style=\"font-weight: bold;\">Flexibility issues. </span>Whether delivered as software or bundled with hardware, the hardware must be certified and supported by the vendors.\r\n<span style=\"font-weight: bold; \">Scalability and performance issues.</span> Scale-out file SDS generally doesn't scale as high as scale-out object storage, but object will have somewhat higher latencies. Object storage has significant additional latencies from the metadata and data resiliency functions. Both types are best suited for secondary applications where high performance is not a requirement.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Some things are not so simple. </span>When scale-out file or object storage SDS is purchased as software, it's a DIY project, so special skills, professional services or a systems integrator may be required.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software_defined_storage_platforms.png","alias":"software-defined-storage-platforms-sds"},"389":{"id":389,"title":"Centralized Virtual Desktop","description":" Virtual Desktop Infrastructure (VDI) can bring significant benefits to organizations that want to be more flexible, as well as reduce the cost and complexity of managing various client desktops, laptops and mobile devices.\r\nOrganizations that use VDI can take advantage of a centralized desktop that has clear advantages: fast deployment, lower support costs, increased security. However, VDI can also cause a number of problems for organizations that do not plan or implement the technology correctly. Many VDI pilot projects fail due to incorrect design considerations that lead to performance problems. This, in turn, leads to unsatisfied end users.\r\nOne of the most important recommendations for implementing VDI is to properly design the network and storage. Incorrectly designed network and storage can have disastrous consequences for VDI performance and end-user satisfaction.\r\nBecause the VDI architecture includes centralized virtual machines running in the data center, the VDI desktop display for the end user depends on protocols such as PCoIP, ICA, RDP, or Blast Extreme (VMware) that can successfully process data between the end user and the center data processing. This imposes more load on the underlying network.\r\nOrganizations must fully understand all aspects of VDI performance when connecting to both high-speed local area network connections and slower channels such as a WAN.\r\nIt is impossible to emphasize how important a properly designed storage is to successfully deploy VDI. When you think of traditional workstations, they work in a distributed way. All calculations, memory and storage performance are contained in individual workstations. However, in a virtual desktop environment, you accept all the calculations, memory, and storage (disk IOPs), which in the traditional workstation environment should be distributed across all workstations, centralizing these requirements to the external virtual desktop environment.","materialsDescription":" <span style=\"font-weight: bold; \">What is Virtual Desktop Infrastructure (VDI)?</span>\r\nVirtual desktop infrastructure (VDI) is virtualization technology that hosts a desktop operating system on a centralized server in a data center. VDI is a variation on the client-server computing model, sometimes referred to as server-based computing. The term was coined by VMware.\r\nIn 2006, VDI began to emerge as an alternative to the server-based computing model used by Citrix and Microsoft Terminal Services. Today, VMware, Citrix and Microsoft all offer their own VDI platforms.\r\nThere are two main approaches to VDI: persistent and nonpersistent. Persistent VDI provides each user with his or her own desktop image, which can be customized and saved for future use, much like a traditional physical desktop. Nonpersistent VDI provides a pool of uniform desktops that users can access when needed. Nonpersistent desktops revert to their original state each time the user logs out.\r\n<span style=\"font-weight: bold; \">How to implement VDI?</span>\r\nWhen you think about deploying a VDI, there are several best practices that must be considered to ensure successful implementation:\r\n<ol><li>Understanding End User Requirements</li><li>Proper network and storage proecting</li><li>Select the type of virtual desktop</li><li>High availability</li></ol>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Centralized_Virtual_Desktop.png","alias":"centralized-virtual-desktop"},"435":{"id":435,"title":"Rack Server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png","alias":"rack-server"},"453":{"id":453,"title":"Desktop PC","description":" A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements. The most common configuration has a case that houses the power supply, motherboard (a printed circuit board with a microprocessor as the central processing unit (CPU), memory, bus, and other electronic components), disk storage (usually one or more hard disk drives, solid state drives, optical disc drives, and in early models a floppy disk drive); a keyboard and mouse for input; and a computer monitor, speakers, and, often, a printer for output. The case may be oriented horizontally or vertically and placed either underneath, beside, or on top of a desk.\r\nDesktop computers are designed to work at the table. Usually, they are bigger and more powerful than other types of personal computers. Desktop computers are made up of individual components. The main component is called the system unit - usually, it is a rectangular case that is on or under the table. Other components, such as the monitor, mouse and keyboard, are connected to the system unit.\r\nAs a rule, all additional external devices are connected to the PC system unit using special connectors. Their main part is located on its rear wall. Some, the most popular ones, are brought to the front, for example, USB connectors and audio outputs. The system unit itself consists of internal devices, called components.","materialsDescription":" Main components of the desktop system unit:\r\n<ul><li><span style=\"font-weight: bold;\">A CPU</span> is the main information processing and computer control device.</li><li><span style=\"font-weight: bold;\">A video card</span> is a device for processing two-dimensional and three-dimensional graphics, as well as displaying an image on a monitor (screen).</li><li><span style=\"font-weight: bold;\">RAM</span> - used for short-term storage of data during operation of the computer. When it is turned off, the information recorded in the RAM disappears.</li><li><span style=\"font-weight: bold;\">A storage device (hard disk)</span> - used as the primary means for storing all user data and programs. Its capacity is much more than the amount of RAM, however, the speed of reading and writing information is less than when working with RAM.</li><li><span style=\"font-weight: bold;\">A motherboard</span> is a complex device that combines all the components of a personal computer and ensures their well-coordinated work.</li><li><span style=\"font-weight: bold;\">An optical drive</span> - a device for reading and writing information on optical CDs, DVDs and Blue-ray discs.</li><li><span style=\"font-weight: bold;\">A case</span> - protects all components from harmful external influences (for example, moisture) and gives an aesthetic look to your computer.</li><li><span style=\"font-weight: bold;\">A power supply unit</span> converts the alternating current of ordinary electric networks of high voltage (220 Volt) into direct current of low voltage (12 V, 5 V and 3 V), required for powering computer components.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_PC.png","alias":"desktop-pc"},"455":{"id":455,"title":"Portable PC","description":" A portable computer is a computer designed to be easily moved from one place to another and included a display and keyboard. The first commercially sold portable was the 50 pound IBM 5100, introduced 1975. The next major portables were Osborne's 24 pound CP/M-based Osborne 1 (1981) and Compaq's 28 pound 100% IBM PC compatible Compaq Portable (1983). These "luggable" computers lacked the next technological development, not requiring an external power source; that feature was introduced by the laptop. Laptops were followed by lighter models, so that in the 2000's mobile devices and by 2007 smartphones made the term almost meaningless. The 2010's introduced wearable computers such as smartwatches.\r\nPortable computers, by their nature, are generally microcomputers. Larger portable computers were commonly known as 'Lunchbox' or 'Luggable' computers. They are also called 'Portable Workstations' or 'Portable PCs'. In Japan they were often called 'Bentocom'. (ベントコン, Bentokon) from "bento".\r\nPortable computers, more narrowly defined, are distinct from desktop replacement computers in that they usually were constructed from full-specification desktop components, and often do not incorporate features associated with laptops or mobile devices. A portable computer in this usage, versus a laptop or other mobile computing device, have a standard motherboard or backplane providing plug-in slots for add-in cards. This allows mission specific cards such as test, A/D, or communication protocol (IEEE-488, 1553) to be installed. Portable computers also provide for more disk storage by using standard disk drives and provide for multiple drives.\r\nPortable computers have been increasing in popularity over the past decade, as they do not restrict the user's mobility as a desktop computer does, and do not restrict the computer power and storage available as a laptop computer does. Wireless access to the Internet, extended battery life, and more elaborate cases permitting multiple screens and even significant RAID capacity, have contributed.","materialsDescription":"<span style=\"font-weight: bold; \">What does Portable Computer mean?</span>\r\nA Portable computer is a computer that comes with a keyboard and display and one which can be easily relocated or transported, although less convenient compared to a notebook.\r\nThey have lower specifications and are not well suited for full-time usage as they are less ergonomic. However, they take less space than desktop computers and come with most features found on a desktop. \r\n<span style=\"font-weight: bold; \">What are the advantages of portable PC?</span>\r\nAdvantages of a portable computer:\r\n<ul><li>Compared to other mobile computing device or laptop, portable computer makes use of standard motherboards and also provide plug in slots for add in cards.</li><li>Portability and flexibility to use is a definite advantage for portable computer over desktop computers.</li><li>Portable computers use less space than desktop computers and are smaller in size.</li><li>Compared to a desktop computer, the power consumed is less in case of portable computer and can help in power and cost savings.</li><li>Compared to desktop computers, immediacy is more pronounced in the case of portable computers.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the disadvantages of portable PC?</span>\r\nDisadvantages of a portable computer:\r\n<ul><li>They have a lower specification than most desktop systems.</li><li>They are less ergonomic and are less suited for full-time usage in most of the cases.</li><li>Expansion is tough and any repair could prove costly.</li><li>Most of portable computers are not upgradeable.</li><li>Compared to desktop systems, they are less reliable mostly due to overheating problems and often run slower.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Portrable_PC.png","alias":"portable-pc"},"459":{"id":459,"title":"Monitor","description":" A computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the display device, circuitry, casing, and power supply. The display device in modern monitors is typically a thin film transistor liquid crystal display (TFT-LCD) with LED backlighting having replaced cold-cathode fluorescent lamp (CCFL) backlighting. Older monitors used a cathode ray tube (CRT). Monitors are connected to the computer via VGA, Digital Visual Interface (DVI), HDMI, DisplayPort, Thunderbolt, low-voltage differential signaling (LVDS) or other proprietary connectors and signals.\r\nOriginally, computer monitors were used for data processing while television sets were used for entertainment. From the 1980s onwards, computers (and their monitors) have been used for both data processing and entertainment, while televisions have implemented some computer functionality. The common aspect ratio of televisions, and computer monitors, has changed from 4:3 to 16:10, to 16:9.\r\nModern computer monitors are easily interchangeable with conventional television sets. However, as computer monitors do not necessarily include integrated speakers, it may not be possible to use a computer monitor without external components.","materialsDescription":" <span style=\"font-weight: bold; \">What is an LCD monitor (TFT)?</span>\r\nLiquid crystal monitor (also Liquid crystal display, LCD monitor, flat indicator) - a flat monitor based on liquid crystals.\r\nLCD TFT is one of the names of the liquid crystal display, which uses an active matrix controlled by thin-film transistors. The TFT amplifier for each subpixel is used to increase the speed, contrast and clarity of the display image.\r\n<span style=\"font-weight: bold; \">How does an LCD monitor work?</span>\r\nEach pixel of the LCD display consists of a layer of molecules between two transparent electrodes, and two polarizing filters, the polarization planes of which (as a rule) are perpendicular. In the absence of liquid crystals, the light transmitted by the first filter is almost completely blocked by the second.\r\nThe surface of the electrodes in contact with liquid crystals is specially processed for the initial orientation of the molecules in one direction. In the TN matrix, these directions are mutually perpendicular, therefore, the molecules line up in a helical structure in the absence of voltage. This structure refracts the light in such a way that, before the second filter, the plane of its polarization rotates, and light passes through it already without loss. Except for the absorption by the first filter of half of the unpolarized light, the cell can be considered transparent. If voltage is applied to the electrodes, the molecules tend to line up in the direction of the field, which distorts the helical structure. In this case, the elastic forces counteract this, and when the voltage is turned off, the molecules return to their original position. With a sufficient field value, almost all molecules become parallel, which leads to the opacity of the structure. By varying the voltage, you can control the degree of transparency. If a constant voltage is applied for a long time, the liquid crystal structure may degrade due to ion migration. To solve this problem, an alternating current is applied, or a change in the field polarity at each addressing of the cell (the opacity of the structure does not depend on the field polarity). In the entire matrix, each of the cells can be controlled individually, but with an increase in their number this becomes difficult to accomplish, as the number of required electrodes increases. Therefore, row and column addressing is used almost everywhere. The light passing through the cells can be natural - reflected from the substrate (in LCD displays without backlight). But more often an artificial light source is used, in addition to independence from external lighting, this also stabilizes the properties of the resulting image. Thus, a full-fledged LCD monitor consists of electronics that process the input video signal, LCD matrix, backlight module, power supply and housing. It is the combination of these components that determines the properties of the monitor as a whole, although some characteristics are more important than others.\r\n<span style=\"font-weight: bold;\">What are the most important features of LCD monitors?</span>\r\n<ul><li><span style=\"font-style: italic;\">Resolution:</span> The horizontal and vertical sizes, expressed in pixels. Unlike CRT monitors, LCDs have one, “native”, physical resolution, the rest is achieved by interpolation.</li><li><span style=\"font-style: italic;\">Point Size:</span> The distance between the centers of adjacent pixels. Directly related to the physical resolution.</li><li><span style=\"font-style: italic;\">Aspect ratio:</span> The ratio of width to height, for example: 5: 4, 4: 3, 5: 3, 8: 5, 16: 9, 16:10.</li><li><span style=\"font-style: italic;\">Visible diagonal:</span> the size of the panel itself, measured diagonally. The display area also depends on the format: a monitor with a 4: 3 format has a larger area than with a 16: 9 format with the same diagonal.</li><li><span style=\"font-style: italic;\">Contrast:</span> the ratio of the brightness of the lightest and darkest points. Some monitors use an adaptive backlight level; the contrast figure given for them does not apply to image contrast.</li><li><span style=\"font-style: italic;\">Brightness:</span> The amount of light emitted by the display is usually measured in candelas per square meter.</li><li><span style=\"font-style: italic;\">Response Time:</span> The minimum time a pixel needs to change its brightness. The measurement methods are ambiguous.</li><li><span style=\"font-style: italic;\">Viewing angle:</span> the angle at which the contrast drop reaches the set one is considered different for different types of matrices and by different manufacturers, and often can not be compared.</li><li><span style=\"font-style: italic;\">Matrix type:</span> LCD technology.</li><li><span style=\"font-style: italic;\">Inputs:</span> (e.g. DVI, D-Sub, HDMI, etc.).</li></ul>\r\n<span style=\"font-weight: bold;\">What are the technologies for LCD monitors?</span>\r\nLCD monitors were developed in 1963 at the David Sarnoff Research Center at RCA, Princeton, New Jersey.\r\nThe main technologies in the manufacture of LCD displays: TN + film, IPS and MVA. These technologies differ in the geometry of the surfaces, the polymer, the control plate, and the front electrode. Of great importance are the purity and type of polymer with the properties of liquid crystals, used in specific developments.\r\nThe response time of LCD monitors designed using SXRD technology (English Silicon X-tal Reflective Display - silicon reflective liquid crystal matrix) is reduced to 5 ms. Sony, Sharp, and Philips have jointly developed PALC technology (Plasma Addressed Liquid Crystal - Plasma Control of Liquid Crystals), which combines the advantages of LCD (brightness and color richness, contrast) and plasma panels (large viewing angles, H, and vertical, V, high refresh rate). These displays use gas-discharge plasma cells as a brightness controller, and an LCD matrix is used for color filtering. PALC technology allows you to address each pixel of the display individually, which means unsurpassed controllability and image quality.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Monitor.png","alias":"monitor"},"473":{"id":473,"title":"Projector","description":" A video projector is an image projector that receives a video signal and projects the corresponding image on a projection screen using a lens system. All video projectors use a very bright ultra high pressure mercury lamp, LED or solid state blue, RB, RGB or remote fiber optic RGB lasers to provide the illumination required to project the image, and most modern ones can correct any curves, blurriness, and other inconsistencies through manual settings. If a blue laser is used, a phosphor wheel is used to turn blue light into white light, which is also the case with white LEDs. (White LEDs do not use lasers.) A wheel is used in order to prolong the lifespan of the phosphor, as it is degraded by the heat generated by the laser diode. Remote fiber optic RGB laser racks can be placed far away from the projector, and several racks can be housed in a single, central room. Each projector can use up to 2 racks, and several monochrome lasers are mounted on each rack, the light of which is mixed and transmitted to the projector booth using optical fibers. Projectors using RB lasers use a blue laser with a phosphor wheel in conjuntion with a conventional solid state red laser.\r\nVideo projectors are used for many applications such as conference room presentations, classroom training, home cinema and concerts. In schools and other educational settings, they are sometimes connected to an interactive whiteboard. In the late 20th century they became commonplace in home cinema. Although large LCD television screens became quite popular, video projectors are still common among many home theater enthusiasts.\r\nA video projector, also known as a digital projector, may project onto a traditional reflective projection screen, or it may be built into a cabinet with a translucent rear-projection screen to form a single unified display device.\r\nCommon display resolutions include SVGA (800×600 pixels), XGA (1024×768 pixels), SXGA+ (1400x1050 pixels), 720p (1280×720 pixels), and 1080p (1920×1080 pixels), 4K UHD (3840x2160), as well as 16:10 aspect ratio resolutions including WXGA+ (1280x800 pixels) and WUXGA (1920x1200 pixels).\r\nThe cost of a projector is typically driven by its base technology, features, resolution, and light output. A projector with a higher light output (measured in lumens, “lm”) is required for a larger screen or for a room with a larger amount of ambient light. For example, a light output of approximately 1500 to 2500 ANSI lumens is suitable for small screens viewed in rooms with low ambient light; approximately 2500 to 4000 lm is suitable for medium-sized screens with some ambient light; over 4000 lm is needed for very large screens or for use in rooms with no lighting control such as conference rooms. High brightness large-venue models are increasingly common in Boardrooms, Auditoriums and other high profile spaces, and models up to 30,000 lm are used in large staging applications such as concerts, keynote addresses and displays projected on buildings.\r\nA few camcorders have a built-in projector suitable to make a small projection; a few more powerful "pico projectors" are pocket-sized, and many projectors are portable. ","materialsDescription":" <span style=\"font-weight: bold;\">What's the Difference Between DLP LCD, and LED Projectors?</span>\r\nMainstream projectors use one of several technologies to project an image on a wall or screen. Liquid Crystal Display (LCD) projectors, which have been around for years, use three separate glass panels that separate the color spectrum into red, green, and blue to create an image. The newer digital light processing (DLP) processing integrates Texas Instruments’ DLP chip, which is a reflective surface with thousands of tiny, spinning mirrors, takes the reflected light and puts it through a color wheel to create an image. The smallest projectors, called Pico projectors, use solid-state technology, such as Light Emitting Diodes (LEDs), which are desirable in portable projectors for low power consumption.\r\n<span style=\"font-weight: bold;\">How Much Brightness Do I Need?</span>\r\nBrightness (how much light the projector can produce) is measured in ANSI lumens. The brightness of the room where you’ll be projecting will dictate the lumens you will need. That is, brighter rooms need a projector with higher lumens. For dark rooms, 1000 to 1200 lumens is probably adequate, although professional presenters tend to want 1800 lumens or more. In addition, if you are projecting large images, you’ll want a projector with a higher brightness rating. When choosing your projector, consider your application, the size of your group, the size of your room and the amount of light in the room.\r\n<span style=\"font-weight: bold;\">What Resolution Do I Need?</span>\r\nResolution is the term used to describe the number of pixels, used to display an image. Higher resolutions--more pixels are used to create the image--allow you to display more information on your screen and create a crisper, cleaner image. Today, you’ll see a number of possible resolutions: SVGA (800x600 pixels), XGA (1024x768 pixels) and SXGA (1280x1024 pixels). For standard presentations, 800x600 pixels may be sufficient, but for other uses (such as larger images or advanced presentations) you’ll want a higher resolution, such as 1024x768. The highest resolutions may be needed for presenting detailed AutoCAD drawings or videos.\r\n<span style=\"font-weight: bold;\">What Contrast Ratio Do I Need?</span>\r\nContrast ratio measures how well a projector can reproduce black and white. Although the contrast ratio is not terribly important to those using projectors for still presentations, this measure is more important if you will be projecting video. Currently, there is no industry-standard method for measuring contrast ratio, so this stat may vary between manufacturers. Basically, a higher contrast ratio indicates a greater ability for the projector to show subtle color details and tolerate extraneous room light.\r\n<span style=\"font-weight: bold;\">What Input/Output Options Do I Want?</span>\r\nToday’s projectors offer an array of input and output connectors. A projector with both HDMI and VGA ports lets you connect to many different video sources, including set-top boxes; DVD, HD DVD, and Blu-ray Disc players; camcorders; PCs; video game consoles; and AV receivers. HDMI (High-Definition Multimedia Interface) supports any uncompressed TV or PC video format on a single cable, including standard, enhanced, and high-definition video; up to eight channels of compressed or uncompressed digital audio; a Consumer Electronics Control (CEC) connection; and an Ethernet data connection.\r\n<span style=\"font-weight: bold;\">How Much Should I Worry About Projector Weight?</span>\r\nCommon sense should reign when decided what size projector to buy. Consider whether you will be traveling with your projector and choose accordingly. A hard-sized case with wheels will also ease transport.\r\n<span style=\"font-weight: bold;\">What Is a Normal Warranty?</span>\r\nDepending on the projector brand, warranties do vary. Generally, the projector is covered for a year, with the lamp having a shorter coverage (30 days to six months).\r\n<span style=\"font-weight: bold;\">How Long Will My Lamp Last?</span>\r\nBoth DLP and LCD projectors integrate lamps (light bulbs optimized for use in a projector). Lamp life is measured in hours (example, 2000 or 4000), which for most users will translate to years of use. Over time, the brightness of the lamp may deteriorate. LED projectors, meanwhile, do not use a lamp. The result is that these projectors generate less heat and demand virtually no maintenance. Meanwhile, since LEDs incorporate no lead or mercury, these projectors provide a compelling solution for those seeking a green projector.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Projector.jpg","alias":"projector"},"499":{"id":499,"title":"SDN Software-Defined Network","description":" <span style=\"font-weight: bold; \">Software-defined networking (SDN)</span> technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, making it more like cloud computing than traditional network management.\r\nSDN encompasses several types of technologies, including functional separation, network virtualization and automation through programmability. SDN solution is meant to address the fact that the static architecture of traditional networks is decentralized and complex while current networks require more flexibility and easy troubleshooting. \r\nSDN technology attempts to centralize network intelligence in one network component by disassociating the forwarding process of network packets (<span style=\"font-weight: bold; \">data plane</span>) from the routing process (<span style=\"font-weight: bold; \">control plane</span>). The control plane consists of one or more controllers which are considered as the brain of SDN network where the whole intelligence is incorporated. Originally, software defined technology focused solely on separation of the network control plane from the data plane. While the control plane makes decisions about how packets should flow through the network, the data plane actually moves packets from place to place. \r\nIn a classic SDN scenario, a packet arrives at a network switch, and rules built into the switch's proprietary firmware tell the switch where to forward the packet. These packet-handling rules are sent to the switch from the centralized controller. The switch - also known as a <span style=\"font-weight: bold; \">data plane device</span> - queries the controller for guidance as needed, and it provides the controller with information about traffic it handles. The switch sends every packet going to the same destination along the same path and treats all the packets the exact same way.\r\nSoftware defined networking solutions use an operation mode that is sometimes called adaptive or dynamic, in which a switch issues a route request to a controller for a packet that does not have a specific route. This process is separate from adaptive routing, which issues route requests through routers and algorithms based on the network topology, not through a controller.\r\nThe <span style=\"font-weight: bold;\">virtualization</span> aspect of SDN comes into play through a virtual overlay, which is a logically separate network on top of the physical network. Users can implement end-to-end overlays to abstract the underlying network and segment network traffic. This microsegmentation is especially useful for service providers and operators with multi-tenant cloud environments and cloud services, as they can provision a separate virtual network with specific policies for each tenant.","materialsDescription":"<h1 class=\"align-center\">Benefits of Software Defined Networking</h1>\r\nWith SDN software, an <span style=\"font-weight: bold; \">administrator can change any network switch's rules when necessary</span> - prioritizing, deprioritizing or even blocking specific types of packets with a granular level of control and security. This is especially helpful in a cloud computing multi-tenant architecture, because it enables the administrator to manage traffic loads in a flexible and more efficient manner. Essentially, this enables the administrator to use less expensive commodity switches and have more control over network traffic flow than ever before.\r\nOther benefits of SDN are <span style=\"font-weight: bold; \">network management</span> and <span style=\"font-weight: bold; \">end-to-end visibility.</span>A network administrator need only deal with one centralized controller to distribute policies to the connected switches, instead of configuring multiple individual devices. This capability is also a security advantage because the controller can monitor traffic and deploy security policies. If the controller deems traffic suspicious, for example, it can reroute or drop the packets.\r\nSoftware defined networking software also <span style=\"font-weight: bold; \">virtualizes hardware</span> and <span style=\"font-weight: bold; \">services </span>that were previously carried out by dedicated hardware, resulting in the touted benefits of a reduced hardware footprint and lower operational costs.\r\nAdditionally, SDN contributed to the emergence of <span style=\"font-weight: bold; \">software-defined wide area network (SD-WAN)</span> technology. SD-WAN employs the virtual overlay aspect of SDN technology, abstracting an organization's connectivity links throughout its WAN and creating a virtual network that can use whichever connection the controller deems fit to send traffic.\r\n<h1 class=\"align-center\">Are there any SDN security benefits?</h1>\r\nAs security issues become more complex at the edge of the network, it’s no wonder that network and security professionals are looking for new ways to approach network protection. Nowadays, it seems like SDN is going to be the answer. \r\n<ul><li><span style=\"font-weight: bold; \">Centralized Network Control </span></li></ul>\r\nIn a traditional network, devices (router/switches) make their own decisions locally about where and how best to send traffic. In terms of network security, SDN can be used to route data packets through a single firewall and make IDS and IPS data capture more efficient.\r\n<ul><li><span style=\"font-weight: bold; \">Simplify Configuration</span></li></ul>\r\nThe SDN makes it easier to automate configuration and improves the traceability of those configurations. The introduction of SDN network management allows dynamic programming and restructuring of network settings, which reduces the risk of DDoS attacks. It is also worth adding that SDN has automatic quarantine capabilities. \r\n<ul><li><span style=\"font-weight: bold; \">Creation of High-level Network Policies</span></li></ul>\r\n<span style=\"color: rgb(97, 97, 97); \">Rather than physically configuring security solutions, SDN facilitates the central management of security policies to make network operator roles more efficient and flexible. Moreover, SDN helps to move away from current management approaches such as SNMP/CLI and build more effective policy management. </span>\r\n<ul><li><span style=\"font-weight: bold; \"><span style=\"color: rgb(97, 97, 97); \">Easy to use Application Programming Interfaces (APIs)</span></span></li></ul>\r\n<span style=\"color: rgb(97, 97, 97); \">Cloud APIs are interfaces presented by software and play a vital role in SDN controllers and applications. Easy to use APIs help to manage network resources, improve the efficiency of IT resources, and aid integration with IT tools. Additionally, a number of good cloud security practices have been introduced recently. </span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SDN_Software_Defined_Network.png","alias":"sdn-software-defined-network"},"503":{"id":503,"title":"Storage Networking","description":" A storage area network (SAN) or storage network is a computer network which provides access to consolidated, block-level data storage. SANs are primarily used to enhance accessibility of storage devices, such as disk arrays and tape libraries, to servers so that the devices appear to the operating system as locally-attached devices. A SAN typically is a dedicated network of storage devices not accessible through the local area network (LAN) by other devices, thereby preventing interference of LAN traffic in data transfer.\r\nThe cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption across both enterprise and small to medium-sized business environments.\r\nA SAN does not provide file abstraction, only block-level operations. However, file systems built on top of SANs do provide file-level access, and are known as shared-disk file systems.\r\nStorage area networks (SANs) are sometimes referred to as network behind the servers and historically developed out of the centralised data storage model, but with its own data network. A SAN is, at its simplest, a dedicated network for data storage. In addition to storing data, SANs allow for the automatic backup of data, and the monitoring of the storage as well as the backup process. A SAN is a combination of hardware and software. It grew out of data-centric mainframe architectures, where clients in a network can connect to several servers that store different types of data. To scale storage capacities as the volumes of data grew, direct-attached storage (DAS) was developed, where disk arrays or just a bunch of disks (JBODs) were attached to servers. In this architecture storage devices can be added to increase storage capacity. However, the server through which the storage devices are accessed is a single point of failure, and a large part of the LAN network bandwidth is used for accessing, storing and backing up data. To solve the single point of failure issue, a direct-attached shared storage architecture was implemented, where several servers could access the same storage device.\r\nDAS was the first network storage system and is still widely implemented where data storage requirements are not very high. Out of it developed the network-attached storage (NAS) architecture, where one or more dedicated file server or storage devices are made available in a LAN. Therefore, the transfer of data, particularly for backup, still takes place over the existing LAN. If more than a terabyte of data was stored at any one time, LAN bandwidth became a bottleneck. Therefore, SANs were developed, where a dedicated storage network was attached to the LAN, and terabytes of data are transferred over a dedicated high speed and bandwidth network. Within the storage network, storage devices are interconnected. Transfer of data between storage devices, such as for backup, happens behind the servers and is meant to be transparent. While in a NAS architecture data is transferred using the TCP and IP protocols over Ethernet, distinct protocols were developed for SANs, such as Fibre Channel, iSCSI, Infiniband. Therefore, SANs often have their own network and storage devices, which have to be bought, installed, and configured. This makes SANs inherently more expensive than NAS architectures.","materialsDescription":"<span style=\"font-weight: bold; \">What is storage virtualization?</span>\r\nA storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.\r\nA SAN moves storage resources off the common user network and reorganizes them into an independent, high-performance network. This enables each server to access shared storage as if it were a drive directly attached to the server. When a host wants to access a storage device on the SAN, it sends out a block-based access request for the storage device.\r\nA storage area network is typically assembled using three principle components: cabling, host bus adapters (HBAs), and switches attached to storage arrays and servers. Each switch and storage system on the SAN must be interconnected, and the physical interconnections must support bandwidth levels that can adequately handle peak data activities. IT administrators manage storage area networks centrally.\r\nStorage arrays were initially all hard disk drive systems, but are increasingly populated with flash solid-state drives (SSDs).\r\n<span style=\"font-weight: bold; \">What storage area networks are used for?</span>\r\nFibre Channel (FC) SANs have the reputation of being expensive, complex and difficult to manage. Ethernet-based iSCSI has reduced these challenges by encapsulating SCSI commands into IP packets that don't require an FC connection.\r\nThe emergence of iSCSI means that instead of learning, building and managing two networks -- an Ethernet local area network (LAN) for user communication and an FC SAN for storage -- an organization can use its existing knowledge and infrastructure for both LANs and SANs. This is an especially useful approach in small and midsize businesses that may not have the funds or expertise to support a Fibre Channel SAN.\r\nOrganizations use SANs for distributed applications that need fast local network performance. SANs improve the availability of applications through multiple data paths. They can also improve application performance because they enable IT administrators to offload storage functions and segregate networks.\r\nAdditionally, SANs help increase the effectiveness and use of storage because they enable administrators to consolidate resources and deliver tiered storage. SANs also improve data protection and security. Finally, SANs can span multiple sites, which helps companies with their business continuity strategies.\r\n<span style=\"font-weight: bold;\">Types of network protocols</span>\r\nMost storage networks use the SCSI protocol for communication between servers and disk drive devices.[citation needed] A mapping layer to other protocols is used to form a network:\r\n<ul><li>ATA over Ethernet (AoE), mapping of ATA over Ethernet</li><li>Fibre Channel Protocol (FCP), the most prominent one, is a mapping of SCSI over Fibre Channel</li><li>Fibre Channel over Ethernet (FCoE)</li><li>ESCON over Fibre Channel (FICON), used by mainframe computers</li><li>HyperSCSI, mapping of SCSI over Ethernet</li><li>iFCP or SANoIP mapping of FCP over IP</li><li>iSCSI, mapping of SCSI over TCP/IP</li><li>iSCSI Extensions for RDMA (iSER), mapping of iSCSI over InfiniBand</li><li>Network block device, mapping device node requests on UNIX-like systems over stream sockets like TCP/IP</li><li>SCSI RDMA Protocol (SRP), another SCSI implementation for RDMA transports</li></ul>\r\nStorage networks may also be built using SAS and SATA technologies. SAS evolved from SCSI direct-attached storage. SATA evolved from IDE direct-attached storage. SAS and SATA devices can be networked using SAS Expanders.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_Networking.png","alias":"storage-networking"},"507":{"id":507,"title":"Mission Critical Storage","description":" As enterprises become more digital, the role of mission-critical applications on which the functioning of the business depends. In practice, this requires more platform flexibility to serve both traditional applications and modern cloud computing.\r\nIT professionals who are already fully loaded with support for traditional corporate tools, such as virtualization or database management systems, have to implement and maintain modern applications such as containers or analytics.\r\nServer virtualization has almost become the main driver for the development of storage virtualization, especially since virtual machines have already penetrated quite a lot into the critical applications segment.\r\nData storage systems help to cope with the ever-growing volumes of data, allowing you to effectively work with information. Storage systems for mission-critical applications are focused on the needs of companies of various sizes - from remote branches to large enterprises with significant amounts of information.\r\nAlso many factors affect the selection of a data center location, but utility infrastructure, uptime, talent, and speed are always the focal points.\r\nFew people are unaware of the large electric loads (usage) of data centers. Naturally, due to the amount of power they need, data centers are very price-sensitive to a location’s cost of electricity. The cost is more than centers per kWh, though. Data centers have unique ramp-up needs and reserved capacity demands. The utility’s ability to accommodate these requirements can have a significant impact on cost. Likewise, the mission-critical aspect of the data center, requiring it to be online at all times, drives rigorous power redundancy and reliability requirements. The utility’s “cost-to-serve” and revenue credit policies must be factored into the overall cost of providing the requisite power.","materialsDescription":" <span style=\"font-weight: bold;\">What is mission-critical data?</span>\r\nA 'mission-critical' operation, system or facility may sound fairly straightforward – something that is essential to the overall operations of a business or process within a business. Essentially, something that is critical to the mission.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mission_Critical_Storage.png","alias":"mission-critical-storage"},"509":{"id":509,"title":"Converged and Hyper Converged System","description":" Converged and hyper convergent infrastructures simplify support for virtual desktop infrastructure and desktop virtualization, as they are designed to be easy to install and perform complex tasks.\r\nConvergent infrastructure combines the four main components of a data center in one package: computing devices, storage devices, network devices, and server virtualization tools. Hyper-converged infrastructure allows for tighter integration of a larger number of components using software tools.\r\nIn both convergent and hyper-convergent infrastructure, all elements are compatible with each other. Thanks to this, you will be able to purchase the necessary storage devices and network devices for your company at a time, and they, as you know, are of great importance in the virtual desktops infrastructure. This allows you to simplify the process of deploying such an infrastructure - something that has been waiting for and what will be rejoiced by many companies that need to virtualize their desktop systems.\r\nDespite its value and innovation, there are several questions to these technologies regarding their intended use and differences. Let's try to figure out what functionality offers converged and hyper-convergent infrastructures and how they differ.","materialsDescription":" <span style=\"font-weight: bold;\">What is converged infrastructure?</span>\r\nConvergent infrastructure combines computing devices, storage, network devices and server virtualization tools in one chassis so that they can be managed from one place. Management capabilities may include the management of virtual desktop infrastructure, depending on the selected configuration and manufacturer.\r\nThe hardware included in the bundled converged infrastructure is pre-configured to support any targets: virtual desktop infrastructures, databases, special applications, and so on. But in fact, you do not have enough freedom to change the selected configuration.\r\nRegardless of the method chosen for extending the virtual desktop infrastructure environment, you should understand that subsequent vertical scaling will be costly and time-consuming. Adding individual components is becoming complex and depriving you of the many benefits of a converged infrastructure. Adding workstations and expanding storage capacity in a corporate infrastructure can be just as expensive, which suggests the need for proper planning for any virtual desktop infrastructure deployment.\r\nOn the other hand, all components of a converged infrastructure can work for a long time. For example, a complete server of such infrastructure works well even without the rest of the infrastructure components.\r\n<span style=\"font-weight: bold;\">What is a hyper-convergent infrastructure?</span>\r\nThe hyper-converged infrastructure was built on the basis of converged infrastructure and the concept of a software-defined data center. It combines all the components of the usual data center in one system. All four key components of the converged infrastructure are in place, but sometimes it also includes additional components, such as backup software, snapshot capabilities, data deduplication functionality, intermediate compression, global network optimization (WAN), and much more. Convergent infrastructure relies primarily on hardware, and software-defined data center often adapts to any hardware. In the hyper-convergent infrastructure, these two possibilities are combined.\r\nHyper-converged infrastructure is supported by one supplier. It can be managed as a single system with a single set of tools. To expand the infrastructure, you just need to install blocks of necessary devices and resources (for example, storage) into the main system block. And this is done literally on the fly.\r\nSince the hyper-convergent infrastructure is software-defined (that is, the operation of the infrastructure is logically separated from the physical equipment), the mutual integration of components is denser than in a conventional converged infrastructure, and the components themselves must be nearby to work correctly. This makes it possible to use a hyper-convergent infrastructure to support even more workloads than in the case of conventional converged infrastructure. This is explained by the fact that it has the possibility of changing the principle of definition and adjustment at the program level. In addition, you can make it work with specialized applications and workloads, which pre-configured converged infrastructures do not allow.\r\nHyper-converged infrastructure is especially valuable for working with a virtual desktop infrastructure because it allows you to scale up quickly without additional costs. Often, in the case of the classic virtual desktops infrastructure, things are completely different - companies need to buy more resources before scaling or wait for virtual desktops to use the allocated space and network resources, and then, in fact, add new infrastructure.\r\nBoth scenarios require significant time and money. But, in the case of hyperconvergent infrastructure, if you need to expand the storage, you can simply install the required devices in the existing stack. Scaling can be done quickly — for the time required to deliver the equipment. In this case, you do not have to go through the full procedure of re-evaluation and reconfiguration of the corporate infrastructure.\r\nIn addition, when moving from physical PCs to virtual workstations, you will need devices to perform all the computational tasks that laptops and PCs typically perform. Hyper-converged infrastructure will greatly help with this, as it often comes bundled with a large amount of flash memory, which has a positive effect on the performance of virtual desktops. This increases the speed of I / O operations, smoothes work under high loads, and allows you to perform scanning for viruses and other types of monitoring in the background (without distracting users).\r\nThe flexibility of the hyper-converged infrastructure makes it more scalable and cost-effective compared to the convergent infrastructure since it has the ability to add computing and storage devices as needed. The cost of the initial investment for both infrastructures is high, but in the long term, the value of the investment should pay off.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Converged_and_Hyper_Converged_System.png","alias":"converged-and-hyper-converged-system"},"515":{"id":515,"title":"Tower Server","description":"A tower server is a computer that is built in an upright cabinet that stands alone and that is designed to function as a server. The cabinet is known as a tower, and multiple tower servers can work simultaneously for different tasks and processes. Tower servers are popular owing to the scalability and reliability features since unlimited servers can be added to the existing network largely because of the independent nature of the individual tower servers.\r\nTower servers support most basic applications such as system management, file management, print collaboration, ER applications, distribution and system security.\r\nThere are certain advantages in using tower servers. A tower server is robust and simple in nature. As overall component density is low, easier cooling is possible in tower servers. Possible damage, overheating or downtime can thus be prevented. The scalability factor is high in tower servers, and it is much easier to add servers to a simple network, leading to adaptable integration. Again, the maintenance factor is less when compared to other designs. Easy identification both on the network and physically is possible in tower servers as the data are usually stored in a single tower and not across various devices.\r\nThe cabling involved in tower servers can be complicated, and several tower servers in a single location could be noisy due to the fact that each tower might need a dedicated fan. An individual monitor, mouse or keyboard is required for each tower server, or a keyboard, video and mouse (KVM) switch needs to be available for managing devices using a single set of equipment. Again, in comparison to blade servers or rack servers, tower servers could be more bulky.","materialsDescription":" <span style=\"font-weight: bold;\">What is a tower server?</span>\r\nA tower server is a computer that is built in an upright cabinet that stands alone and that is designed to function as a server. The cabinet is known as a tower, and multiple tower servers can work simultaneously for different tasks and processes. Tower servers are popular owing to the scalability and reliability features since unlimited servers can be added to the existing network largely because of the independent nature of the individual tower servers.\r\n<span style=\"font-weight: bold;\">What are the advantages of a tower server?</span>\r\n<ul><li>Easier cooling, because the overall component density is fairly low.</li></ul>\r\nA tower server is robust and simple in nature. As overall component density is low, easier cooling is possible in tower servers. Therefore, it can prevent possible damage, overheating or downtime.\r\n<ul><li>Scalability, an unlimited number of servers can be added to an existing network.</li></ul>\r\nThe scalability factor is high in tower servers, and it is much easier to add servers to a simple network, leading to adaptable integration. Easy identification both on the network and physically is possible in tower servers as the data are usually stored in a single tower and not across various devices.\r\n<span style=\"font-weight: bold;\">What are the disadvantages of tower server?</span>\r\n<ul><li>A set of tower servers is bulkier and heavier than an equivalent blade server or set of rack servers.</li><li>A group of several air-cooled tower servers in a single location can be noisy because each tower requires a dedicated fan.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Tower_Server.png","alias":"tower-server"},"517":{"id":517,"title":"Blade System","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png","alias":"blade-system"},"521":{"id":521,"title":"Mission Critical Server","description":" Mission-critical refers to any factor of a system (equipment, process, procedure, software, etc.) whose failure will result in the failure of business operations. It is critical to the organization's "mission.\r\nThe mission-critical server is a system whose failure may result in the failure of some goal-directed activity. An example of a mission-critical system is a navigational system. The difference between mission-critical and business-critical is in the global activity and the possibility of whole personal life blackout. A business-critical system fault can influence only to a single company or a bunch of them and can partly stop lifetime activity.\r\nWith mission critical servers you get best in class reliability and uptime with screaming performance for the workloads that run your enterprise.\r\nA mission critical system is a system that is essential to the survival of a business or organization. When a mission critical system fails or is interrupted, business operations are significantly impacted.\r\nA mission-critical system is also known as mission essential equipment and mission critical application. ","materialsDescription":" <span style=\"font-weight: bold;\">What is a mission-critical server?</span>\r\nA mission-critical server is a system that is essential to the continuity of the operations of a business or organization. When a mission-critical server fails or is interrupted, business operations are significantly impacted.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mission_Critical_Server.png","alias":"mission-critical-server"},"531":{"id":531,"title":"Thin client","description":" A thin client is a lightweight computer that has been optimized for establishing a remote connection with a server-based computing environment. The server does most of the work, which can include launching software programs, performing calculations, and storing data. This contrasts with a fat client or a conventional personal computer; the former is also intended for working in a client-server model but has significant local processing power, while the latter aims to perform its function mostly locally.\r\nThin clients occur as components of a broader computing infrastructure, where many clients share their computations with a server or server farm. The server-side infrastructure uses cloud computing software such as application virtualization, hosted shared desktop (HSD) or desktop virtualization (VDI). This combination forms what is known as a cloud-based system where desktop resources are centralized at one or more data centers. The benefits of centralization are hardware resource optimization, reduced software maintenance, and improved security.\r\n<ul><li>Example of hardware resource optimization: Cabling, bussing and I/O can be minimized while idle memory and processing power can be applied to user sessions that most need it.</li><li>Example of reduced software maintenance: Software patching and operating system (OS) migrations can be applied, tested and activated for all users in one instance to accelerate roll-out and improve administrative efficiency.</li><li>Example of improved security: Software assets are centralized and easily fire-walled, monitored and protected. Sensitive data is uncompromised in cases of desktop loss or theft.</li></ul>\r\nThin client hardware generally supports a keyboard, mouse, monitor, jacks for sound peripherals, and open ports for USB devices (e.g., printer, flash drive, webcam). Some thin clients include legacy serial or parallel ports to support older devices such as receipt printers, scales or time clocks. Thin client software typically consists of a graphical user interface (GUI), cloud access agents (e.g., RDP, ICA, PCoIP), a local web browser, terminal emulators (in some cases), and a basic set of local utilities.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Thin Client?</span>\r\nA thin client is a computer with no hard drive or other moving parts that can lead to machine failure. Thin clients operate on a mainframe paradigm. All instructions and sessions come directly from a central, secure Windows server. Each thin client realizes its own session and operates independently from the other thin clients. Because thin clients have no hard drives, there is no loss of data if a local thin client gets damaged or has a local power failure.\r\n<span style=\"font-weight: bold;\">Why use a Thin Client instead of a regular PC?</span>\r\nThe main reason thin clients are better than PCs is that they offer "Lower Total Cost of Ownership". By reducing maintenance and install time, thin clients keep downtime to an absolute minimum. For example, to update 5 PCs you need to reinstall and configure all 5 PCs one at a time. With thin clients, you would simply make the update once on the server and all 5 thin clients would realize the update immediately.\r\n<span style=\"font-weight: bold;\">Where should I use a Thin Client?</span>\r\nThin clients can be used anywhere you would normally have a PC workstation. ACP has a number of partners who provide state of the art Thin Client hardware. These Thin Clients range from office-grade to light industrial, to heavy industrial including Class I Div 2.\r\nThin Clients are particularly favored in harsh conditions - most Thin Clients do not have cooling fans, are very small and easy to mount, and can be replaced within a minute or two.\r\n<span style=\"font-weight: bold;\">When should I use a Thin Client?</span>\r\nUse thin clients when you need to have one or several PC workstations that substantially "Lower Total Cost of Ownership" while remaining easy to install and support. Use thin clients when you have harsh factory conditions or when you don't have the time or money to hire an IT staff to keep your industrial or office systems up and running.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Thin_client.png","alias":"thin-client"},"542":{"id":542,"title":"UTM - Unified Threat Management Appliance","description":"A unified threat management (UTM) system is a type of network hardware appliance that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.<br />UTM devices are often packaged as network security appliances that can help protect networks against combined security threats, including malware and attacks that simultaneously target separate parts of the network.\r\nWhile UTM systems and next-generation firewalls (NGFWs) are sometimes comparable, UTM devices include added security features that NGFWs don't offer.\r\nUTM systems provide increased protection and visibility, as well as control over network security, which reduces complexity. UTM systems typically do this via inspection methods that address different types of threats.\r\nThese methods include:\r\n<ul><li>Flow-based inspection, also known as stream-based inspection, samples data that enters a UTM device, and then uses pattern matching to determine whether there is malicious content in the data flow.</li><li>Proxy-based inspection acts as a proxy to reconstruct the content entering a UTM device, and then executes a full inspection of the content to search for potential security threats. If the content is clean, the device sends the content to the user. However, if a virus or other security threat is detected, the device removes the questionable content, and then sends the file or webpage to the user.</li></ul>\r\nUTM devices provide a single platform for multiple network security functions and offer the benefit of a single interface for those security functions, as well as a single point of interface to monitor or analyze security logs for those different functions.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">How do UTM Appliances block a computer virus — or many viruses?</span>\r\nUnified threat management appliances have gained traction in the industry due to the emergence of blended threats, which are combinations of different types of malware and attacks that target separate parts of the network simultaneously. Preventing these types of attacks can be difficult when using separate appliances and vendors for each specific security task, as each aspect has to be managed and updated individually in order to remain current in the face of the latest forms of malware and cybercrime. By creating a single point of defense and providing a single console, UTM solutions make dealing with varied threats much easier.\r\nWhile unified threat management solutions do solve some network security issues, they aren't without some drawbacks, with the biggest one being that the single point of defense that an UTM appliance provides also creates a single point of failure. Because of this, many organizations choose to supplement their UTM device with a second software-based perimeter to stop any malware that got through or around the UTM firewall.\r\nWhat kind of companies use a Unified Threat Management system?\r\nUTM was originally for small to medium office businesses to simplify their security systems. But due to its almost universal applicability, it has since become popular with all sectors and larger enterprises. Developments in the technology have allowed it to scale up, opening UTM up to more types of businesses that are looking for a comprehensive gateway security solution.\r\n<span style=\"font-weight: bold;\">What security features does Unified Threat Management have?</span>\r\nAs previously mentioned, most UTM services include a firewall, antivirus and intrusion detection and prevention systems. But they also can include other services that provide additional security.\r\n<ul><li>Data loss prevention software to stop data from exfiltrating the business, which in turn prevents a data leak from occurring.</li><li>Security information and event management software for real-time monitoring of network health, which allows threats and points of weakness to be identified.</li><li>Bandwidth management to regulate and prioritize network traffic, ensuring everything is running smoothly without getting overwhelmed.</li><li>Email filtering to remove spam and dangerous emails before they reach the internal network, lowering the chance of a phishing or similar attack breaching your defenses.</li><li>Web filtering to prevent connections to dangerous or inappropriate sites from a machine on the network. This lowers the chance of infection through malvertising or malicious code on the page. It can also be used to increase productivity within a business, i.e. blocking or restricting social media, gaming sites, etc.</li><li>Application filtering to either a blacklist or whitelist which programs can run, preventing certain applications from communicating in and out of the network, i.e. Facebook messenger.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the benefits of Unified Threat Management?</span>\r\n<ul><li><span style=\"font-weight: bold;\">Simplifies the network</span></li></ul>\r\nBy consolidating multiple security appliances and services into one, you can easily reduce the amount of time spent on maintaining many separate systems that may have become disorganized. This can also improve the performance of the network as there is less bloat. A smaller system also requires less energy and space to run.\r\n<ul><li><span style=\"font-weight: bold;\">Provides greater security and visibility</span></li></ul>\r\nA UTM system can include reporting tools, application filtering and virtual private network (VPN) capabilities, all of which defend your network from more types of threats or improve the existing security. Additionally, monitoring and analysis tools can help locate points of weakness or identify ongoing attacks.\r\n<ul><li><span style=\"font-weight: bold;\">Can defend from more sophisticated attacks</span></li></ul>\r\nBecause UTM defends multiple parts of a network it means that an attack targeting multiple points simultaneously can be repelled more easily. With cyber-attacks getting more sophisticated, having defenses that can match them is of greater importance.\r\nHaving several ways of detecting a threat also means a UTM system is more accurate at identifying potential attacks and preventing them from causing damage.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_UTM_Unified_Threat_Management_Appliance.png","alias":"utm-unified-threat-management-appliance"},"840":{"id":840,"title":"ICS/SCADA Cyber Security","description":"SCADA security is the practice of protecting supervisory control and data acquisition (SCADA) networks, a common framework of control systems used in industrial operations. These networks are responsible for providing automated control and remote human management of essential commodities and services such as water, natural gas, electricity and transportation to millions of people. They can also be used to improve the efficiencies and quality in other less essential (but some would say very important!) real-world processes such as snowmaking for ski resorts and beer brewing. SCADA is one of the most common types of industrial control systems (ICS).\r\nThese networks, just like any other network, are under threat from cyber-attacks that could bring down any part of the nation's critical infrastructure quickly and with dire consequences if the right security is not in place. Capital expenditure is another key concern; SCADA systems can cost an organization from tens of thousands to millions of dollars. For these reasons, it is essential that organizations implement robust SCADA security measures to protect their infrastructure and the millions of people that would be affected by the disruption caused by an external attack or internal error.\r\nSCADA security has evolved dramatically in recent years. Before computers, the only way to monitor a SCADA network was to deploy several people to each station to report back on the state of each system. In busier stations, technicians were stationed permanently to manually operate the network and communicate over telephone wires.\r\nIt wasn't until the introduction of the local area network (LAN) and improvements in system miniaturization that we started to see advances in SCADA development such as the distributed SCADA network. Next came networked systems that were able to communicate over a wide area network (WAN) and connect many more components together.\r\nFrom local companies to federal governments, every business or organization that works with SCADA systems are vulnerable to SCADA security threats. These threats can have wide-reaching effects on both the economy and the community. Specific threats to SCADA networks include the following:\r\n<span style=\"font-weight: bold;\">Hackers.</span> Individuals or groups with malicious intent could bring a SCADA network to its knees. By gaining access to key SCADA components, hackers could unleash chaos on an organization that can range from a disruption in services to cyber warfare.\r\n<span style=\"font-weight: bold;\">Malware.</span> Malware, including viruses, spyware and ransomware can pose a risk to SCADA systems. While malware may not be able to specifically target the network itself, it can still pose a threat to the key infrastructure that helps to manage the SCADA network. This includes mobile SCADA applications that are used to monitor and manage SCADA systems.\r\n<span style=\"font-weight: bold;\">Terrorists.</span> Where hackers are usually motivated by sordid gain, terrorists are driven by the desire to cause as much mayhem and damage as possible.\r\n<span style=\"font-weight: bold;\">Employees.</span> Insider threats can be just as damaging as external threats. From human error to a disgruntled employee or contractor, it is essential that SCADA security addresses these risks.\r\nManaging today's SCADA networks can be a challenge without the right security precautions in place. Many networks are still without the necessary detection and monitoring systems and this leaves them vulnerable to attack. Because SCADA network attacks exploit both cyber and physical vulnerabilities, it is critical to align cybersecurity measures accordingly.","materialsDescription":"<span style=\"font-weight: bold;\">What is the difference between ICS/SCADA cybersecurity and information security?</span>\r\nAutomated process control systems (SCADA) have a lot of differences from “traditional” corporate information systems: from the destination, specific data transfer protocols and equipment used and ending with the environment in which they operate. In corporate networks and systems, as a rule, the main protected resource is information that is processed, transmitted and stored in automated systems, and the main goal is to ensure its confidentiality. In ICS, the protected resource, first of all, is the technological process itself, and the main goal is to ensure its continuity (accessibility of all nodes) and integrity (including information transmitted between the nodes of the ICS). Moreover, the field of potential risks and threats to ICS, in comparison with corporate systems, expands with risks of potential damage to life and health of personnel and the public, damage to the environment and infrastructure. That is why it is incorrect to talk about “information security” in relation to ICS/SCADA. In English sources, the term “cybersecurity” is used for this, a direct translation of which (cybersecurity) is increasingly found in our market in relation to the protection of process control systems.\r\n<span style=\"font-weight: bold;\">Is it really necessary?</span>\r\nIt is necessary. There are a number of myths about process control systems, for example: “process control systems are completely isolated from the outside world”, “process control systems are too specific for someone to crack”, “process control systems are reliably protected by the developer”, or even “No one will ever try us, hacking us is not interesting. ” All this is no longer true. Many modern distributed process control systems have one or another connection with the corporate network, even if the system owners are unaware of this. Communication with the outside world greatly simplifies the task of the attacker, but does not remain the only possible option. Automated process control software and data transfer protocols are, as a rule, very, very insecure against cyber threats. This is evidenced by numerous articles and reports of experts involved in the study of the protection of industrial control systems and penetration tests. The PHDays III section on hacking automated process control systems impressed even ardent skeptics. Well, and, of course, the argument “they have NOT attacked us, therefore they will not” - can hardly be considered seriously. Everyone has heard about Stuxnet, which dispelled almost all the myths about the safety of ICS at once.\r\n<span style=\"font-weight: bold;\">Who needs this?</span>\r\nWith the phrase ICS/SCADA, most imagine huge plants, automated CNC machines or something similar. However, the application of process control systems is not limited to these objects - in the modern age of automation, process control systems are used everywhere: from large production facilities, the oil and gas industry, transport management to smart home systems. And, by the way, with the protection of the latter, as a rule, everything can be much worse, because the developer silently and imperceptibly shifts responsibility to the shoulders of the user.\r\nOf course, some of the objects with automated process control systems are more interesting for attackers, others less. But, given the ever-growing number of vulnerabilities discovered and published in the ICS, the spread of "exclusive" (written for specific protocols and ICS software) malware, considering your system safe "by default" is unreasonable.\r\n<span style=\"font-weight: bold;\">Are ICS and SCADA the same thing?</span>\r\nNo. SCADA systems (supervisory control and data acquisition, supervisory control and data collection) are part of the control system. Usually, a SCADA system means centralized control and management systems with the participation of a person as a whole system or a complex of industrial control systems. SCADA is the central link between people (human-machine interfaces) and PLC levels (programmable logic controller) or RTU (remote terminal unit).\r\n<span style=\"font-weight: bold;\">What is ICS/SCADA cybersecurity?</span>\r\nIn fact, ICS cybersecurity is a process similar to “information security” in a number of properties, but very different in details. And the devil, as you know, lies in them. ICS/SCADA also has similar information security-related processes: asset inventory, risk analysis and assessment, threat analysis, security management, change management, incident response, continuity, etc. But these processes themselves are different.<br />The cyber security of ICSs has the same basic target qualities - confidentiality, integrity and accessibility, but the significance and point of application for them are completely different. It should be remembered that in ICS/SCADA we, first of all, protect the technological process. Beyond this - from the risks of damage to human health and life and the environment.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SCADA_Cyber_Security.png","alias":"icsscada-cyber-security"}},"branches":"Information Technology","companySizes":"More than 2000 Employees","companyUrl":"www.dell.com","countryCodes":[],"certifications":[{"id":454,"company_id":169,"title":"Dell Certified Professional PowerEdge","type":"technical"},{"id":455,"company_id":169,"title":"Dell Certified Associate PowerEdge","type":"technical"},{"id":456,"company_id":169,"title":"Dell Certified Professional SC Series","type":"technical"},{"id":457,"company_id":169,"title":"Dell Certified Professional PS Series","type":"technical"},{"id":458,"company_id":169,"title":"Dell Certified Professional Networking","type":"technical"}],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"DELL","keywords":"States, that, United, Texas, develops, Rock, repairs, services","description":"Dell Inc. is an American privately owned multinational computer technology company based in Round Rock, Texas, United States, that develops, sells, repairs, and supports computers and services.","og:title":"DELL","og:description":"Dell Inc. is an American privately owned multinational computer technology company based in Round Rock, Texas, United States, that develops, sells, repairs, and supports computers and services.","og:image":"https://old.roi4cio.com/uploads/roi/company/dell_logo.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"ISSP","partnershipLevel":"Registered","countries":"","partnersType":""},{"supplier":"MUK (supplier)","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"ERC (Electronic Resource Company)","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"ASBIS","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"MTI","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"ELKO Ukraine","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"JT-Computer Soft- u. Hardware Handelsgesellschaft","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"Eacs","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"ACC Distribution","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"ASWGroup","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"ELCORE Group","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"DevelopEx","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"Lynx Software Technologies","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"V5 Systems","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"Redis Labs","partnershipLevel":"","countries":"","partnersType":""}],"vendoredProducts":[{"id":4770,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dell_PowerEdge_MX7000_Modular_Chassis.jpg","logo":true,"scheme":false,"title":"Dell PowerEdge MX7000 Modular Chassis","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-poweredge-mx7000-modular-chassis","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers with unequal flexibility and agility. At the foundation, PowerEdge MX7000 chassis hosts disaggregated blocks of server and storage to create consumable resources on-demand. Shared power, cooling, networking, I/O and in-chassis management provides outstanding efficiencies.\r\n<ul><li>7U modular enclosure with eight slots holds 2S single or four 4S double-width compute sleds and 12Gbs single-width storage sleds</li><li>25Gb Ethernet, 12Gb SAS and 32Gb Fibre Channel I/O options</li><li>Three I/O networking fabrics, two general purpose and one storage specific, each with redundant modules</li><li>Multi-chassis networking up to 10 chassis</li><li>Single management point for compute, storage and networking</li><li>High-speed technology connections, now and into the future, with no midplane upgrade</li><li>At least three server processor microarchitecture generation support assurance</li></ul>\r\n<span style=\"font-weight: bold; \">Dynamically scale and respond with kinetic infrastructure</span>\r\nDesigned with Dell EMC’s kinetic infrastructure, PowerEdge MX creates shared pools of disaggregated compute and storage resources, connected by scalable fabric, from which workloads can draw resources needed to run most quickly and efficiently. Then when no longer needed the resources are returned into the pool. By essentially creating hardware on the fly the capacity can be managed at a data center level instead of a per server level.\r\n<ul><li>Full-featured, no compromise compute sleds with Intel® Xeon® Scalable processors</li><li>Generous, scalable on-board SAS, SATA, and NVMe storage drives, plus substantial, granular SAS direct-attached storage using optional storage sleds</li><li>Scalable fabric architecture with a grow-as-you-need fabric expansion capability for up to 10 chassis in fabric.</li></ul>\r\n<span style=\"font-weight: bold; \">Increase effectiveness and accelerate operations with unified automation</span>\r\nEmbedded Dell EMC OpenManage Enterprise – Modular Edition delivers the key abilities of OpenMange Enterprise systems management within the PowerEdge MX chassis. A unified simple interface manages compute, storage and fabric, reducing costs and the learning curve and consolidates multiple tools. Redundant management modules ensure highest availability.\r\n<ul><li>Automatic expansion from one to multiple chassis; scale management to thousands of PowerEdge MX and rack servers with OpenManage Enterprise</li><li>Flexible, at-the-box management front control panel options include Quick Sync 2 (wireless), touchscreen LCD and traditional crash cart</li><li>Comprehensive RESTful API helps automate multiple tasks and integrates to third-party tools</li><li>Seamlessly integrates with integrated Dell Remote Access Controller 9 (iDRAC9) and Lifecycle Controller (LC)</li></ul>\r\n<span style=\"font-weight: bold;\">Protect infrastructure and investment with responsive design</span>\r\nReduce the risk of infrastructure investment and help make new innovations more easily available with PowerEdge MX7000 future-forward architecture. Designed to maximize longevity and minimize disruptive technology changes support across both generational and architectural transitions is provided.\r\n<ul><li>Multi-generational assurance with support for at least three server processor microarchitecture generations</li><li>Nearly zero throughput limitations, providing high-speed technology connections, and well into the future, with no midplane upgrade</li><li>Industry-leading thermal architecture and mechanical design and control algorithms support dense configurations and future compatibility</li></ul>","shortDescription":"Dynamically assign, move and scale shared pools of compute, storage and fabric, with greater flexibility and efficiency, and deliver optimal value.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell PowerEdge MX7000 Modular Chassis","keywords":"","description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers wi","og:title":"Dell PowerEdge MX7000 Modular Chassis","og:description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers wi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dell_PowerEdge_MX7000_Modular_Chassis.jpg"},"eventUrl":"","translationId":4771,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":4,"title":"Data center","alias":"data-center","description":" A data center (or datacenter) is a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data. A business typically relies heavily upon the applications, services and data contained within a data center, making it a focal point and critical asset for everyday operations.\r\nData centers are not a single thing, but rather, a conglomeration of elements. At a minimum, data centers serve as the principal repositories for all manner of IT equipment, including servers, storage subsystems, networking switches, routers and firewalls, as well as the cabling and physical racks used to organize and interconnect the IT equipment. A data center must also contain an adequate infrastructure, such as power distribution and supplemental power subsystems, including electrical switching; uninterruptable power supplies; backup generators and so on; ventilation and data center cooling systems, such as computer room air conditioners; and adequate provisioning for network carrier (telco) connectivity. All of this demands a physical facility with physical security and sufficient physical space to house the entire collection of infrastructure and equipment.","materialsDescription":" <span style=\"font-weight: bold;\">What are the requirements for modern data centers?</span>\r\nModernization and data center transformation enhances performance and energy efficiency.\r\nInformation security is also a concern, and for this reason a data center has to offer a secure environment which minimizes the chances of a security breach. A data center must therefore keep high standards for assuring the integrity and functionality of its hosted computer environment.\r\nIndustry research company International Data Corporation (IDC) puts the average age of a data center at nine years old. Gartner, another research company, says data centers older than seven years are obsolete. The growth in data (163 zettabytes by 2025) is one factor driving the need for data centers to modernize.\r\nFocus on modernization is not new: Concern about obsolete equipment was decried in 2007, and in 2011 Uptime Institute was concerned about the age of the equipment therein. By 2018 concern had shifted once again, this time to the age of the staff: "data center staff are aging faster than the equipment."\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Meeting standards for data centers</span></span>\r\nThe Telecommunications Industry Association's Telecommunications Infrastructure Standard for Data Centers specifies the minimum requirements for telecommunications infrastructure of data centers and computer rooms including single tenant enterprise data centers and multi-tenant Internet hosting data centers. The topology proposed in this document is intended to be applicable to any size data center.\r\nTelcordia GR-3160, NEBS Requirements for Telecommunications Data Center Equipment and Spaces, provides guidelines for data center spaces within telecommunications networks, and environmental requirements for the equipment intended for installation in those spaces. These criteria were developed jointly by Telcordia and industry representatives. They may be applied to data center spaces housing data processing or Information Technology (IT) equipment. The equipment may be used to:\r\n<ul><li>Operate and manage a carrier's telecommunication network</li><li>Provide data center based applications directly to the carrier's customers</li><li>Provide hosted applications for a third party to provide services to their customers</li><li>Provide a combination of these and similar data center applications</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Data center transformation</span></span>\r\nData center transformation takes a step-by-step approach through integrated projects carried out over time. This differs from a traditional method of data center upgrades that takes a serial and siloed approach. The typical projects within a data center transformation initiative include standardization/consolidation, virtualization, automation and security.\r\n<ul><li>Standardization/consolidation: Reducing the number of data centers and avoiding server sprawl (both physical and virtual) often includes replacing aging data center equipment, and is aided by standardization.</li><li>Virtualization: Lowers capital and operational expenses, reduce energy consumption. Virtualized desktops can be hosted in data centers and rented out on a subscription basis. Investment bank Lazard Capital Markets estimated in 2008 that 48 percent of enterprise operations will be virtualized by 2012. Gartner views virtualization as a catalyst for modernization.</li><li>Automating: Automating tasks such as provisioning, configuration, patching, release management and compliance is needed, not just when facing fewer skilled IT workers.</li><li>Securing: Protection of virtual systems is integrated with existing security of physical infrastructures.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Machine room</span></span>\r\nThe term "Machine Room" is at times used to refer to the large room within a Data Center where the actual Central Processing Unit is located; this may be separate from where high-speed printers are located. Air conditioning is most important in the machine room.\r\nAside from air-conditioning, there must be monitoring equipment, one type of which is to detect water prior to flood-level situations. One company, for several decades, has had share-of-mind: Water Alert. The company, as of 2018, has 2 competing manufacturers (Invetex, Hydro-Temp) and 3 competing distributors (Longden,Northeast Flooring, Slayton). ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_center.png"},{"id":471,"title":"Hardware","alias":"hardware","description":" Computer hardware includes the physical, tangible parts or components of a computer, such as the cabinet, central processing unit, monitor, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is instructions that can be stored and run by hardware. Hardware is so-termed because it is "hard" or rigid with respect to changes or modifications; whereas software is "soft" because it is easy to update or change. Intermediate between software and hardware is "firmware", which is software that is strongly coupled to the particular hardware of a computer system and thus the most difficult to change but also among the most stable with respect to consistency of interface. The progression from levels of "hardness" to "softness" in computer systems parallels a progression of layers of abstraction in computing.\r\nHardware is typically directed by the software to execute any command or instruction. A combination of hardware and software forms a usable computing system, although other systems exist with only hardware components.\r\nThe template for all modern computers is the Von Neumann architecture, detailed in a 1945 paper by Hungarian mathematician John von Neumann. This describes a design architecture for an electronic digital computer with subdivisions of a processing unit consisting of an arithmetic logic unit and processor registers, a control unit containing an instruction register and program counter, a memory to store both data and instructions, external mass storage, and input and output mechanisms. The meaning of the term has evolved to mean a stored-program computer in which an instruction fetch and a data operation cannot occur at the same time because they share a common bus. This is referred to as the Von Neumann bottleneck and often limits the performance of the system.","materialsDescription":" <span style=\"font-weight: bold; \">What does Hardware (H/W) mean?</span>\r\nHardware (H/W), in the context of technology, refers to the physical elements that make up a computer or electronic system and everything else involved that is physically tangible. This includes the monitor, hard drive, memory and CPU. Hardware works hand-in-hand with firmware and software to make a computer function.\r\n<span style=\"font-weight: bold; \">What are the types of computer systems?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Personal computer</span></span>\r\nThe personal computer, also known as the PC, is one of the most common types of computer due to its versatility and relatively low price. Laptops are generally very similar, although they may use lower-power or reduced size components, thus lower performance.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Case</span></span>\r\nThe computer case encloses and holds most of the components of the system. It provides mechanical support and protection for internal elements such as the motherboard, disk drives, and power supplies, and controls and directs the flow of cooling air over internal components. The case is also part of the system to control electromagnetic interference radiated by the computer, and protects internal parts from electrostatic discharge. Large tower cases provide extra internal space for multiple disk drives or other peripherals and usually stand on the floor, while desktop cases provide less expansion room. All-in-one style designs include a video display built into the same case. Portable and laptop computers require cases that provide impact protection for the unit. A current development in laptop computers is a detachable keyboard, which allows the system to be configured as a touch-screen tablet. Hobbyists may decorate the cases with colored lights, paint, or other features, in an activity called case modding.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power supply</span></span>\r\nA power supply unit (PSU) converts alternating current (AC) electric power to low-voltage direct current (DC) power for the internal components of the computer. Laptops are capable of running from a built-in battery, normally for a period of hours. The PSU typically uses a switched-mode power supply (SMPS), with power MOSFETs (power metal–oxide–semiconductor field-effect transistors) used in the converters and regulator circuits of the SMPS.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Motherboard</span></span>\r\nThe motherboard is the main component of a computer. It is a board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the ports or the expansion slots. The integrated circuit (IC) chips in a computer typically contain billions of tiny metal–oxide–semiconductor field-effect transistors (MOSFETs).\r\nComponents directly attached to or to part of the motherboard include:\r\n<ul><li><span style=\"font-weight: bold; \">The CPU (central processing unit)</span>, which performs most of the calculations which enable a computer to function, and is referred to as the brain of the computer which get a hold of program instruction from random-access memory (RAM), interprets and processes it and then send it backs to computer result so that the relevant components can carry out the instructions. The CPU is a microprocessor, which is fabricated on a metal–oxide–semiconductor (MOS) integrated circuit (IC) chip. It is usually cooled by a heat sink and fan, or water-cooling system. Most newer CPU include an on-die graphics processing unit (GPU). The clock speed of CPU governs how fast it executes instructions, and is measured in GHz; typical values lie between 1 GHz and 5 GHz. Many modern computers have the option to overclock the CPU which enhances performance at the expense of greater thermal output and thus a need for improved cooling.</li><li><span style=\"font-weight: bold; \">The chipset</span>, which includes the north bridge, mediates communication between the CPU and the other components of the system, including main memory; as well as south bridge, which is connected to the north bridge, and supports auxiliary interfaces and buses; and, finally, a Super I/O chip, connected through the south bridge, which supports the slowest and most legacy components like serial ports, hardware monitoring and fan control.</li><li><span style=\"font-weight: bold; \">Random-access memory (RAM)</span>, which stores the code and data that are being actively accessed by the CPU. For example, when a web browser is opened on the computer it takes up memory; this is stored in the RAM until the web browser is closed. It is typically a type of dynamic RAM (DRAM), such as synchronous DRAM (SDRAM), where MOS memory chips store data on memory cells consisting of MOSFETs and MOS capacitors. RAM usually comes on dual in-line memory modules (DIMMs) in the sizes of 2GB, 4GB, and 8GB, but can be much larger.</li><li><span style=\"font-weight: bold; \">Read-only memory (ROM)</span>, which stores the BIOS that runs when the computer is powered on or otherwise begins execution, a process known as Bootstrapping, or "booting" or "booting up". The ROM is typically a nonvolatile BIOS memory chip, which stores data on floating-gate MOSFET memory cells.</li><li><span style=\"font-weight: bold; \">The BIOS (Basic Input Output System)</span> includes boot firmware and power management firmware. Newer motherboards use Unified Extensible Firmware Interface (UEFI) instead of BIOS.</li><li><span style=\"font-weight: bold; \">Buses</span> that connect the CPU to various internal components and to expand cards for graphics and sound.</li><li><span style=\"font-weight: bold; \">The CMOS</span> (complementary MOS) battery, which powers the CMOS memory for date and time in the BIOS chip. This battery is generally a watch battery.</li><li><span style=\"font-weight: bold; \">The video card</span> (also known as the graphics card), which processes computer graphics. More powerful graphics cards are better suited to handle strenuous tasks, such as playing intensive video games or running computer graphics software. A video card contains a graphics processing unit (GPU) and video memory (typically a type of SDRAM), both fabricated on MOS integrated circuit (MOS IC) chips.</li><li><span style=\"font-weight: bold; \">Power MOSFETs</span> make up the voltage regulator module (VRM), which controls how much voltage other hardware components receive.</li></ul>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Expansion cards</span></span>\r\nAn expansion card in computing is a printed circuit board that can be inserted into an expansion slot of a computer motherboard or backplane to add functionality to a computer system via the expansion bus. Expansion cards can be used to obtain or expand on features not offered by the motherboard.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Storage devices</span></span>\r\nA storage device is any computing hardware and digital media that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device. Data storage is a core function and fundamental component of computers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Fixed media</span></span>\r\nData is stored by a computer using a variety of media. Hard disk drives (HDDs) are found in virtually all older computers, due to their high capacity and low cost, but solid-state drives (SSDs) are faster and more power efficient, although currently more expensive than hard drives in terms of dollar per gigabyte, so are often found in personal computers built post-2007. SSDs use flash memory, which stores data on MOS memory chips consisting of floating-gate MOSFET memory cells. Some systems may use a disk array controller for greater performance or reliability.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Removable media</span></span>\r\nTo transfer data between computers, an external flash memory device (such as a memory card or USB flash drive) or optical disc (such as a CD-ROM, DVD-ROM or BD-ROM) may be used. Their usefulness depends on being readable by other systems; the majority of machines have an optical disk drive (ODD), and virtually all have at least one Universal Serial Bus (USB) port.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input and output peripherals</span></span>\r\nInput and output devices are typically housed externally to the main computer chassis. The following are either standard or very common to many computer systems.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input</span></span>\r\nInput devices allow the user to enter information into the system, or control its operation. Most personal computers have a mouse and keyboard, but laptop systems typically use a touchpad instead of a mouse. Other input devices include webcams, microphones, joysticks, and image scanners.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Output device</span></span>\r\nOutput devices display information in a human readable form. Such devices could include printers, speakers, monitors or a Braille embosser.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Mainframe computer</span></span>\r\nA mainframe computer is a much larger computer that typically fills a room and may cost many hundreds or thousands of times as much as a personal computer. They are designed to perform large numbers of calculations for governments and large enterprises.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Departmental computing</span></span>\r\nIn the 1960s and 1970s, more and more departments started to use cheaper and dedicated systems for specific purposes like process control and laboratory automation.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supercomputer</span></span>\r\nA supercomputer is superficially similar to a mainframe, but is instead intended for extremely demanding computational tasks. As of June 2018, the fastest supercomputer on the TOP500supercomputer list is the Summit, in the United States, with a LINPACK benchmarkscore of 122.3 PFLOPS Light, by around 29 PFLOPS.\r\nThe term supercomputer does not refer to a specific technology. Rather it indicates the fastest computations available at any given time. In mid 2011, the fastest supercomputers boasted speeds exceeding one petaflop, or 1 quadrillion (10^15 or 1,000 trillion) floating point operations per second. Supercomputers are fast but extremely costly, so they are generally used by large organizations to execute computationally demanding tasks involving large data sets. Supercomputers typically run military and scientific applications. Although costly, they are also being used for commercial applications where huge amounts of data must be analyzed. For example, large banks employ supercomputers to calculate the risks and returns of various investment strategies, and healthcare organizations use them to analyze giant databases of patient data to determine optimal treatments for various diseases and problems incurring to the country. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Hardware.jpg"},{"id":513,"title":"Networking","alias":"networking","description":" Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network. Specifically, they mediate data transmission in a computer network. Units which are the last receiver or generate data are called hosts or data terminal equipment.\r\nNetworking devices may include gateways, routers, network bridges, modems, wireless access points, networking cables, line drivers, switches, hubs, and repeaters; and may also include hybrid network devices such as multilayer switches, protocol converters, bridge routers, proxy servers, firewalls, network address translators, multiplexers, network interface controllers, wireless network interface controllers, ISDN terminal adapters and other related hardware.\r\nThe most common kind of networking hardware today is a copper-based Ethernet adapter which is a standard inclusion on most modern computer systems. Wireless networking has become increasingly popular, especially for portable and handheld devices.\r\nOther networking hardware used in computers includes data center equipment (such as file servers, database servers and storage areas), network services (such as DNS, DHCP, email, etc.) as well as devices which assure content delivery.\r\nTaking a wider view, mobile phones, tablet computers and devices associated with the internet of things may also be considered networking hardware. As technology advances and IP-based networks are integrated into building infrastructure and household utilities, network hardware will become an ambiguous term owing to the vastly increasing number of network capable endpoints.","materialsDescription":" <span style=\"font-weight: bold;\">What is network equipment?</span>\r\nNetwork equipment - devices necessary for the operation of a computer network, for example: a router, switch, hub, patch panel, etc. You can distinguish between active and passive network equipment.\r\n<span style=\"font-weight: bold;\">What is an active network equipment?</span>\r\nActive networking equipment is equipment followed by some “smart” feature. That is, a router, switch (switch), etc. are active network equipment.\r\n<span style=\"font-weight: bold;\">What is passive network equipment?</span>\r\nPassive network equipment - equipment not endowed with "intellectual" features. For example - cable system: cable (coaxial and twisted pair (UTP/STP)), plug / socket (RG58, RJ45, RJ11, GG45), repeater (repeater), patch panel, hub (hub), balun (balun) for coaxial cables (RG-58), etc. Also, passive equipment can include mounting cabinets and racks, telecommunication cabinets.\r\n<span style=\"font-weight: bold;\">What are the main network components?</span>\r\nThe main components of the network are workstations, servers, transmission media (cables) and network equipment.\r\n<span style=\"font-weight: bold;\">What are workstations?</span>\r\nWorkstations are network computers where network users implement application tasks.\r\n<span style=\"font-weight: bold;\">What are network servers?</span>\r\nNetwork servers - hardware and software systems that perform the functions of controlling the distribution of network shared resources. A server can be any computer connected to the network on which the resources used by other devices on the local network are located. As the server hardware, fairly powerful computers are used.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Networking.png"},{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":769,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg","logo":true,"scheme":false,"title":"Dell Wyse 3040 Thin Client","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-wyse-3040-thin-client","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of virtual desktops including Citrix, Microsoft and VMware environments and provides essential protocol and peripheral support, including optional PCoIP.\r\nWyse 3040 Thin Client - Save energy. Save money<span style=\"white-space:pre\">\t</span>Save energy. Save money: An affordable price point keeps your initial investment low while power-efficient operation of less than 5 watts maintains cost-effectiveness from one day to the next.\r\nWyse 3040 Thin Client - Makes management a snap<span style=\"white-space:pre\">\t</span>Makes management a snap: Easily manage your Wyse 3040 thin client with Dell Wyse Device Manager (WDM) or Cloud Client Manager (CCM). Powerful, easy-to-use and highly scalable, WDM software enables you to configure, monitor and manage Dell Wyse devices.","shortDescription":"At the top of its class: With strong performance featuring Intel® Quad Core processors, Wyse 3040 delivers the best virtual desktop experience of any thin client solution in its class.\r\nWell connected: Wyse 3040 features wireless and wired network connectivity, with two DisplayPort interfaces, 4 USB ports—including 1 USB 3.1 and an AC wireless with optional Bluetooth.\r\nPick the OS that works for you: Wyse 3040 supports both ThinOS and ThinLinux (coming soon), so task and productivity users can choose the system that fits their needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Wyse 3040 Thin Client","keywords":"Wyse, 3040, Client, Save, Thin, Dell, setup, management","description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of","og:title":"Dell Wyse 3040 Thin Client","og:description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg"},"eventUrl":"","translationId":770,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":67,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Rabochie_stancii_Dell_Precision.jpg","logo":true,"scheme":false,"title":"Dell Precision Workstations","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-precision-workstations","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-size: 1.153em; font-weight: 300; line-height: 1.3em; text-rendering: optimizeLegibility; font-family: Museo, "Trebuchet MS", Arial !important; \">Precision Mobile Workstations - For professional creators</h2>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \">Highest performing and fully customizable workstations certified with professional applications.</p>\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-size: 1.153em; font-weight: 300; line-height: 1.3em; text-rendering: optimizeLegibility; font-family: Museo, "Trebuchet MS", Arial !important; \">Precision Fixed Workstations - For professional creators</h2>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \">Highest performing and fully customizable workstations certified with professional applications.</p>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \"></p>","shortDescription":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Precision Workstations","keywords":"professional, Workstations, Precision, workstations, performing, Highest, -For, creators","description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image:","og:title":"Dell Precision Workstations","og:description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image:","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Rabochie_stancii_Dell_Precision.jpg"},"eventUrl":"","translationId":96,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":453,"title":"Desktop PC","alias":"desktop-pc","description":" A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements. The most common configuration has a case that houses the power supply, motherboard (a printed circuit board with a microprocessor as the central processing unit (CPU), memory, bus, and other electronic components), disk storage (usually one or more hard disk drives, solid state drives, optical disc drives, and in early models a floppy disk drive); a keyboard and mouse for input; and a computer monitor, speakers, and, often, a printer for output. The case may be oriented horizontally or vertically and placed either underneath, beside, or on top of a desk.\r\nDesktop computers are designed to work at the table. Usually, they are bigger and more powerful than other types of personal computers. Desktop computers are made up of individual components. The main component is called the system unit - usually, it is a rectangular case that is on or under the table. Other components, such as the monitor, mouse and keyboard, are connected to the system unit.\r\nAs a rule, all additional external devices are connected to the PC system unit using special connectors. Their main part is located on its rear wall. Some, the most popular ones, are brought to the front, for example, USB connectors and audio outputs. The system unit itself consists of internal devices, called components.","materialsDescription":" Main components of the desktop system unit:\r\n<ul><li><span style=\"font-weight: bold;\">A CPU</span> is the main information processing and computer control device.</li><li><span style=\"font-weight: bold;\">A video card</span> is a device for processing two-dimensional and three-dimensional graphics, as well as displaying an image on a monitor (screen).</li><li><span style=\"font-weight: bold;\">RAM</span> - used for short-term storage of data during operation of the computer. When it is turned off, the information recorded in the RAM disappears.</li><li><span style=\"font-weight: bold;\">A storage device (hard disk)</span> - used as the primary means for storing all user data and programs. Its capacity is much more than the amount of RAM, however, the speed of reading and writing information is less than when working with RAM.</li><li><span style=\"font-weight: bold;\">A motherboard</span> is a complex device that combines all the components of a personal computer and ensures their well-coordinated work.</li><li><span style=\"font-weight: bold;\">An optical drive</span> - a device for reading and writing information on optical CDs, DVDs and Blue-ray discs.</li><li><span style=\"font-weight: bold;\">A case</span> - protects all components from harmful external influences (for example, moisture) and gives an aesthetic look to your computer.</li><li><span style=\"font-weight: bold;\">A power supply unit</span> converts the alternating current of ordinary electric networks of high voltage (220 Volt) into direct current of low voltage (12 V, 5 V and 3 V), required for powering computer components.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_PC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":68,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/PowerEdge_Rack_Server.jpg","logo":true,"scheme":false,"title":"PowerEdge Rack Server","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"poweredge-rack-server","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.\r\nOutstanding performance and efficiency for the major databases, virtualization and Virtual Desktop Infrastructure.\r\nThree server level: Entry, advanced and premium.","shortDescription":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"PowerEdge Rack Server","keywords":"efficiency, performance, PowerEdge, Rack, virtualization, databases, major, Desktop","description":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.\r\nOutstanding performance and efficiency for the major databases, virtualization and Virtual Desktop Infrastructure.\r\nThree serve","og:title":"PowerEdge Rack Server","og:description":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.\r\nOutstanding performance and efficiency for the major databases, virtualization and Virtual Desktop Infrastructure.\r\nThree serve","og:image":"https://old.roi4cio.com/fileadmin/user_upload/PowerEdge_Rack_Server.jpg"},"eventUrl":"","translationId":95,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":855,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Servery_PowerEdge_v_korpuse_Tower.jpg","logo":true,"scheme":false,"title":"DELL Серверы PowerEdge в корпусе Tower","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-servery-poweredge-v-korpuse-tower","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для консолидации данных и ускорения работы приложений в масштабах малого или среднего предприятия, небольшого офиса или домашнего офиса.\r\nПодробнее\r\nPowerEdge T20\r\nИдеальный вариант для обеспечения совместной работы, хранения файлов, обмена данными и их защиты внутри компактного и бесшумного сервера в корпусе Mini-Tower.\r\nПодробнее\r\nНовинка Сервер PowerEdge T30 в корпусе Mini-Tower\r\nИдеальный вариант для совместной работы, хранения файлов, общего доступа и защиты данных в небольших и домашних офисах.\r\n\r\nСервер PowerEdge T320 в корпусе Tower\r\nОбеспечьте надежную работу основных бизнес-приложений, используя надежность и гибкость сервера PowerEdge™ T320 в корпусе Tower.\r\n\r\nСервер PowerEdge T330 в корпусе Tower\r\nМощный и расширяемый однопроцессорный сервер в корпусе Tower позволяет ускорить работу приложений, используемых на малых и средних предприятиях, а также в удаленных офисах и филиалах, и развиваться в соответствии с вашими потребностями в данных.\r\n\r\nСервер PowerEdge T420 в корпусе Tower\r\nБлагодаря высокой мощности, большому объему памяти и расширенной пропускной способности ввода-вывода, которые отличают сервер PowerEdge™ T420 в корпусе Tower, вашей организации будет обеспечена высокая производительность, масштабируемость и надежность.\r\n\r\nСервер PowerEdge T430 в корпусе Tower\r\nПовышение производительности в офисной среде благодаря с помощью мощного двухпроцессорного сервера в корпусе Tower с расширяемой конструкцией и низким уровнем шума.\r\n\r\nСервер PowerEdge T630 в корпусе Tower\r\nСправляйтесь с широким диапазоном ресурсоемких рабочих нагрузок благодаря гибкому двухпроцессорному серверу с максимальной производительностью и огромной емкостью внутренней системы хранения данных.","shortDescription":"Независимо от того, работаете ли вы дома или в небольшом офисе, серверы Dell PowerEdge в корпусе Tower идеально подойдут для ваших потребностей в области ИТ. Ознакомьтесь с нашими продуктами уже сегодня. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Серверы PowerEdge в корпусе Tower","keywords":"корпусе, Tower, PowerEdge, Сервер, данных, сервер, Mini-Tower, работы","description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для к","og:title":"DELL Серверы PowerEdge в корпусе Tower","og:description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для к","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Servery_PowerEdge_v_korpuse_Tower.jpg"},"eventUrl":"","translationId":7015,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":862,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBP_dvoinogo_preobrazovanija_Dell_Smart-UPS.png","logo":true,"scheme":false,"title":"ИБП двойного преобразования Dell Smart-UPS","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"ibp-dvoinogo-preobrazovanija-dell-smart-ups","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Источники бесперебойного питания (ИБП) от Dell гарантируют надежную и эффективную работу ваших ИТ-систем. В моделях ИБП Dell с двойным преобразованием используется дизайн APC™ от Schneider Electric™. Они способны не только обеспечить базовую защиту для серверов, хранилищ и сети, но и удовлетворить самые высокие запросы в отношении питания.\r\nИБП двойного преобразования Dell Smart — ИБП двойного преобразования Dell Smart-UPS\r\nИБП двойного преобразования Dell Smart-UPS\r\n\r\nСистема питания с высокой плотностью и двойным преобразованием для защиты критически важных серверов, сетей передачи данных и голосовой связи, медицинских лабораторий и предприятий легкой промышленности. Модели с поддержкой нагрузок от 3 до 8 кВА в стойке или трансформируемом корпусе Tower Модель мощностью 8 кВА обеспечивает единичный коэффициент выходной мощности.\r\n\r\nОсновные компоненты\r\nУдаленное управление\r\nЗаменяемые пользователем аккумуляторы с возможностью горячего переключения\r\nДвойное преобразование\r\nВстроенные автоматические и ручные функции обхода\r\nПанели распределения питания с возможностью замены в условиях эксплуатации\r\nМасштабируемое время работы\r\nТрехлетняя гарантия на электронные компоненты и аккумулятор\r\n \r\n\r\nОсновные компоненты второго поколения ИБП двойного преобразования\r\n\r\nПовышенная удельная мощность\r\nВысокоэффективный режим энергосбережения\r\nГрафический ЖК-дисплей с многоцветной подсветкой\r\nИнтеллектуальное управление аккумулятором\r\nВстроенный счетчик энергопотребления\r\nИБП двойного преобразования Dell Smart-UPS — функции продукта\r\nФункции продукта\r\n\r\nЖК-дисплей, обеспечивающий точное отображение состояния в режиме реального времени с помощью базовых или расширенных меню, выбираемых пользователем\r\n\r\nСостояние ИБП\r\nВходное и выходное напряжение\r\nВыходная частота\r\nВремя работы\r\nНагрузка\r\nСостояние аккумулятора\r\n\r\nУправление \r\nПараметры ИБП и выходной группы\r\nУправление обходом\r\n\r\nНастройки\r\nВыходное напряжение, частота\r\nЯзык, яркость, контрастность\r\nГромкость сигнала тревоги\r\nIP-адрес\r\n\r\nТестирование и диагностика: тесты для начальной калибровки аккумулятора и времени работы\r\n\r\nМеню с информацией об ИБП\r\nСерийный номер ИБП, номер аккумулятора по каталогу\r\nДаты установки и рекомендуемой замены аккумулятора\r\nИБП двойного преобразования Dell Smart-UPS — развитие по мере роста нашего ассортимента\r\nДобивайтесь роста с помощью нашего портфеля продуктов\r\n\r\nВ дополнение к ИБП Dell Smart-UPS набор решений Dell Data Center Infrastructure (DCI) предоставляет различные варианты поддержки2, шасси для монтажа в стойку, а также комплекты клавиатуры, видео и мыши (КВМ) и клавиатуры, монитора, мыши (КММ). Корпорация Dell способна удовлетворить требования любой инфраструктуры, обслуживающей как одиночный сервер, так и целый центр обработки данных.\r\nЛИНЕЙКА МОДЕЛЕЙ\r\nИБП двойного преобразования Dell Smart-UPS мощностью 3 кВА в корпусе Tower и для монтажа в стойку\r\nБлок бесперебойного питания с двойным преобразованием защитит самые важные для бизнеса системы.\r\nКонфигурации форм-фактора 2U для монтажа в стойку и в корпусе Tower\r\nДопустимая мощность 2 700 Вт/3 000 ВА\r\nОпциональная плата удаленного управления\r\nВозможность управления группой принимающих нагрузку выходных разъемов независимо от основного ИБП\r\nСтандартная функция аварийного отключения питания\r\nФильтрация шума и автоматическая регулировка напряжения\r\nЖК-дисплей для локальной настройки параметров энергопотребления\r\n \r\n ИБП двойного преобразования Dell Smart — ИБП двойного преобразования Dell Smart-UPS мощностью 5 кВА в корпусе Tower и для монтажа в стойку<span style=\"white-space:pre\">\t</span>\r\n\r\nИБП двойного преобразования Dell Smart-UPS мощностью 5 кВА в корпусе Tower и для монтажа в стойку\r\nБлок бесперебойного питания с двойным преобразованием защитит используемые вашим бизнесом системы.\r\nКонфигурации форм-фактора 3U для монтажа в стойку и в корпусе Tower (поставляется в виде стойки)\r\nДопустимая мощность 4 500 Вт/5 000 ВА (4 250 Вт с входным разъемом NEMA L6-30)\r\nВозможность управления группой принимающих нагрузку выходных разъемов независимо от основного ИБП\r\nФункция аварийного отключения питания\r\nФильтрация шума и автоматическая регулировка напряжения\r\nЖК-дисплей для локальной настройки параметров энергопотребления\r\nРасширенные функции управления аккумулятором и съемный аккумулятор\r\nВстроенная сетевая плата управления с функциями мониторинга окружающей среды\r\n \r\n ИБП двойного преобразования Dell Smart-UPS — ИБП двойного преобразования Dell Smart-UPS мощностью 8 кВА в корпусе Tower и для монтажа в стойку<span style=\"white-space:pre\">\t</span>\r\nИБП двойного преобразования Dell Smart-UPS мощностью 8 кВА в корпусе Tower и для монтажа в стойку\r\nБлок бесперебойного питания с двойным преобразованием защитит используемые вашим бизнесом системы.\r\nКонфигурации форм-фактора 6U для монтажа в стойку и в корпусе Tower (поставляется в виде стойки)\r\nДопустимая мощность 8 000 Вт/8 000 ВА\r\nВозможность управления группой принимающих нагрузку выходных разъемов независимо от основного ИБП\r\nФункция аварийного отключения питания\r\nФильтрация шума и автоматическая регулировка напряжения\r\nЖК-дисплей для локальной настройки параметров энергопотребления\r\nРасширенные функции управления аккумулятором и съемный аккумулятор\r\nВстроенная сетевая плата управления с функциями мониторинга окружающей среды","shortDescription":"ИБП двойного преобразования Dell Smart-UPS в трансформируемом корпусе Tower и для монтажа в стойку удовлетворит любые потребности в электропитании.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ИБП двойного преобразования Dell Smart-UPS","keywords":"Dell, преобразования, двойного, Smart-UPS, питания, монтажа, Tower, стойку","description":"Источники бесперебойного питания (ИБП) от Dell гарантируют надежную и эффективную работу ваших ИТ-систем. В моделях ИБП Dell с двойным преобразованием используется дизайн APC™ от Schneider Electric™. Они способны не только обеспечить базовую защиту для серверо","og:title":"ИБП двойного преобразования Dell Smart-UPS","og:description":"Источники бесперебойного питания (ИБП) от Dell гарантируют надежную и эффективную работу ваших ИТ-систем. В моделях ИБП Dell с двойным преобразованием используется дизайн APC™ от Schneider Electric™. Они способны не только обеспечить базовую защиту для серверо","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBP_dvoinogo_preobrazovanija_Dell_Smart-UPS.png"},"eventUrl":"","translationId":7017,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":33,"title":"UPS - Uninterruptible Power Supply","alias":"ups-uninterruptible-power-supply","description":"An uninterruptible power supply (UPS), also known as a battery backup, provides backup power when your regular power source fails or voltage drops to an unacceptable level. A UPS allows for the safe, orderly shutdown of a computer and connected equipment. The size and design of a UPS determine how long it will supply power.\r\nDifferent UPS topologies provide specific levels of power protection.\r\nStandby is the most basic UPS topology. A standby UPS resorts to battery backup power in the event of common power problems such as a blackout, voltage sag, or voltage surge. When incoming utility power drops below or surges above safe voltage levels, the UPS switches to DC battery power and then inverts it to AC power to run connected equipment. These models are designed for consumer electronics, entry-level computers, POS systems, security systems, and other basic electronic equipment.\r\nA line-interactive UPS incorporates technology which allows it to correct minor power fluctuations (under-voltages and over voltages) without switching to battery. This type of UPS has an autotransformer that regulates low voltages (e.g., brownouts) and over voltages (e.g., swells) without having to switch to battery. Line-interactive UPS models are typically used for consumer electronics, PCs, gaming systems, home theater electronics, network equipment, and entry-to-mid-range servers. They provide power during such events as a blackout, voltage sag, voltage surge, or over-voltage.\r\nA double-conversion (online) UPS provides consistent, clean, and near-perfect power regardless of the condition of incoming power. This UPS converts incoming AC power to DC, and then back to AC. UPS systems with this technology operate on isolated DC power 100 percent of the time and have a zero transfer time because they never need to switch to DC power. Double-conversion UPS systems are designed to protect mission-critical IT equipment, data center installations, high-end servers, large telecom installations and storage applications, and advanced network equipment from damage caused by a power blackout, voltage sag, voltage surge, over-voltage, voltage spike, frequency noise, frequency variation, or harmonic distortion.","materialsDescription":" <span style=\"font-weight: bold;\">What is a UPS system?</span>\r\nUPS stands for an uninterruptible power supply. This means that a UPS system is designed to keep the power running at all times. For instance, load shedding will be a problem of the past with our wide variety of products and solutions keeping your business moving.\r\n<span style=\"font-weight: bold;\">Where is a UPS used?</span>\r\nUPS systems can be used anywhere that needs to ensure that the power stays on. The most common applications are where power is critical to avoid infrastructure damage e.g. Data centers and manufacturing facilities.\r\n<span style=\"font-weight: bold;\">What is the difference between a battery and a UPS?</span>\r\nA battery is a device that stores energy, a UPS detects when there is no longer any power coming from the mains and switches over to the UPS batteries.\r\n<span style=\"font-weight: bold;\">Can I use a UPS for 6-7 hours?</span>\r\nIf the power requirement is low and the UPS is overrated, possibly, but normally running a UPS for this long requires so many UPS batteries it becomes unfeasible both financially and physically. It would be best to run a standby generator alongside your UPS to achieve this.\r\n<span style=\"font-weight: bold;\">What is the difference between a UPS and an Inverter?</span>\r\nThe UPS and inverter both provide the backup supply to the electrical system. The major difference between the UPS and inverter is that the UPS switches from the main supply to the battery immediately, but the inverter takes much longer.\r\n<span style=\"font-weight: bold;\">What is a non-critical load in a power system?</span>\r\nA non-critical load is an electrical device or devices, that aren’t key to keeping a business running or won’t be damaged by a power cut. In short, it doesn’t matter if these devices lose power in an outage.\r\n<span style=\"font-weight: bold;\">What is backup power?</span>\r\nBackup power is a term that simply means, a source of power if the main power source fails. This can be anything from some AA batteries in your mains powered alarm clock to UPS system and standby generator that is connected to your data center.\r\n<span style=\"font-weight: bold;\">What is the difference between a standby generator and a UPS system?</span>\r\nWhile both protect against a power cut, a UPS is an immediate, short term solution, provide power straight away for as long as its UPS batteries have a charge. A standby generator is a longer turn solution, that is slower to start up but will provide power for as long as it has fuel.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_UPS.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":863,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Interaktivnyi_IBP_Dell_Smart-UPS.jpg","logo":true,"scheme":false,"title":"Интерактивный ИБП Dell Smart-UPS","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"interaktivnyi-ibp-dell-smart-ups","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Чистое, надежное и эффективное электропитание\r\n\r\nОбеспечение надежной и эффективной работы ИТ-оборудования с помощью источников бесперебойного питания (ИБП) от Dell. Интерактивные ИБП Dell, спроектированные с участием APC™, дочерней компании Schneider Electric™, удовлетворят самые разнообразные потребности в электропитании — от обеспечения необходимого уровня защиты серверов, систем хранения данных и сетей до удовлетворения самых высоких требований к электропитанию.\r\nИнтерактивный ИБП Dell Smart-UPS\r\nИнтерактивный ИБП Dell Smart-UPS\r\n\r\nНадежная система питания сетевого уровня для серверов, систем хранения данных и сетевых устройств. Модели для монтажа в стойку и в корпусе Tower обеспечивают высокую эффективность при низких, средних и высоких нагрузках.\r\n\r\nОсновные функции\r\nРежим повышенной эффективности: позволяет сократить расходы на электропитание и охлаждение\r\nФункция аварийного отключения питания (АОП): выполняет удаленное отключение ИБП при возникновении аварийной ситуации. (вариант модели с мощностью 1 500 ВА)\r\nЖК-дисплей: отображает подробную и точную информацию в реальном времени\r\nСистема питания сетевого уровня: обеспечивает стабильное питание благодаря фильтрации шума, автоматическому регулированию напряжения и встроенной защите от скачков напряжения\r\nПорты связи: последовательные порты и порты USB, а также разъем SmartSlot для подключения сетевых плат\r\nРасширенные функции управления аккумулятором: позволяют продлить время работы от аккумулятора благодаря алгоритмам с температурной компенсацией\r\nИБП Smart-UPS DLT1500 в корпусе Tower\r\nФункциональные возможности\r\n\r\nЖК-Дисплей: обеспечивает отображение состояния в режиме реального времени с помощью базовых или расширенных меню\r\nИндикатор питания:\r\nРежим работы и эффективность\r\nМощность нагрузки/Вт/А\r\nВходное/выходное напряжение и частота\r\nЕмкость аккумулятора и время работы\r\nУправление: параметры ИБП и выходной группы\r\nКонфигурация:\r\nЯзык\r\nПараметры питания и качество\r\nНастройка предупреждений\r\nТестирование и диагностика: тесты для начальной калибровки аккумулятора и диагностические тесты для запуска в процессе эксплуатации\r\nЖурналы: краткое описание 10 последних переключений и сбоев\r\nМеню с информацией об ИБП:\r\nНомера деталей ИБП и сменных аккумуляторов\r\nСерийные номера\r\nИБП Smart-UPS DLT1500 в корпусе Tower\r\nДобивайтесь роста с помощью нашего портфеля продуктов\r\n\r\nВ дополнение к ИБП Dell Smart-UPS Line-Interactive и Online в набор решений Dell для создания инфраструктуры ЦОД (Data Center Infrastructure, DCI) входят различные варианты поддержки2, стоечные шасси, а также переключатели клавиатуры, видео и мыши (КВМ) и клавиатуры, монитора, мыши (КММ). Корпорация Dell способна удовлетворить требования любой инфраструктуры, обслуживающей как одиночный сервер, так и целый центр обработки данных.\r\n\r\nЛИНЕЙКА МОДЕЛЕЙ\r\nИнтерактивный ИБП Smart-UPS Dell мощностью 1 500 ВА в корпусе Tower\r\n\r\nЭффективное питание и защита оборудования с помощью интерактивного ИБП со следующими характеристиками.\r\nКонфигурация в корпусе Tower\r\nДопустимая мощность: 1 000 Вт/1 440 ВА\r\nОпциональная функция аварийного отключения питания\r\nФильтрация шума и автоматическое регулирование напряжения\r\nЖК-дисплей для локальной настройки параметров энергопотребления\r\nРасширенные функции управления аккумулятором и съемный аккумулятор\r\nПоследовательный порт, порты USB и разъем SmartSlot для опциональных плат управления\r\n \r\nИБП Smart-UPS DLT1500 в корпусе Tower<span style=\"white-space:pre\">\t</span>Интерактивный ИБП Smart-UPS Dell мощностью 2 200 ВА в корпусе Tower\r\n\r\nЭффективное питание и защита оборудования с помощью интерактивного ИБП со следующими характеристиками. \r\nКонфигурация в корпусе Tower\r\nДопустимая мощность: 1 920 Вт/2 200 ВА\r\nФункция аварийного отключения питания\r\nФильтрация шума и автоматическое регулирование напряжения\r\nЖК-дисплей для локальной настройки параметров энергопотребления\r\nРасширенные функции управления аккумулятором и съемный аккумулятор\r\nПоследовательный порт, порты USB и разъем SmartSlot для опциональных плат управления\r\n \r\nИБП Smart-UPS DLT1500 в корпусе Tower<span style=\"white-space:pre\">\t</span>Интерактивный ИБП Smart-UPS Dell мощностью 1 500 ВА в корпусе для монтажа в стойку \r\n\r\nЭффективное питание и защита оборудования с помощью интерактивного ИБП со следующими характеристиками.\r\nКонфигурация для монтажа в стойку с форм-фактором 2U\r\nДопустимая мощность: 1 000 Вт/1 440 ВА\r\nОпциональная функция аварийного отключения питания\r\nФильтрация шума и автоматическое регулирование напряжения\r\nЖК-дисплей для локальной настройки параметров энергопотребления\r\nРасширенные функции управления аккумулятором и съемный аккумулятор\r\nИБП Smart-UPS DLT1500 в корпусе Tower<span style=\"white-space:pre\">\t</span>Интерактивный ИБП Smart-UPS Dell мощностью 3 000 ВА в корпусе для монтажа в стойку\r\n\r\nЭффективное питание и защита оборудования с помощью интерактивного ИБП со следующими характеристиками.\r\nКонфигурация для монтажа в стойку с форм-фактором 2U\r\nДопустимая мощность: 2 700 Вт/3 000 ВА\r\nСтандартная функция аварийного отключения питания\r\nФильтрация шума и автоматическое регулирование напряжения\r\nЖК-дисплей для локальной настройки параметров энергопотребления\r\nРасширенные функции управления аккумулятором и съемный аккумулятор","shortDescription":"Интерактивные ИБП серии Dell Smart-UPS, в состав которой входят как модели в корпусе Tower, так и модели для монтажа в стойку, удовлетворят любые потребности в электропитании.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Интерактивный ИБП Dell Smart-UPS","keywords":"Smart-UPS, корпусе, Dell, питания, Tower, помощью, Интерактивный, управления","description":"Чистое, надежное и эффективное электропитание\r\n\r\nОбеспечение надежной и эффективной работы ИТ-оборудования с помощью источников бесперебойного питания (ИБП) от Dell. Интерактивные ИБП Dell, спроектированные с участием APC™, дочерней компании Schneider Electric","og:title":"Интерактивный ИБП Dell Smart-UPS","og:description":"Чистое, надежное и эффективное электропитание\r\n\r\nОбеспечение надежной и эффективной работы ИТ-оборудования с помощью источников бесперебойного питания (ИБП) от Dell. Интерактивные ИБП Dell, спроектированные с участием APC™, дочерней компании Schneider Electric","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Interaktivnyi_IBP_Dell_Smart-UPS.jpg"},"eventUrl":"","translationId":7018,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":33,"title":"UPS - Uninterruptible Power Supply","alias":"ups-uninterruptible-power-supply","description":"An uninterruptible power supply (UPS), also known as a battery backup, provides backup power when your regular power source fails or voltage drops to an unacceptable level. A UPS allows for the safe, orderly shutdown of a computer and connected equipment. The size and design of a UPS determine how long it will supply power.\r\nDifferent UPS topologies provide specific levels of power protection.\r\nStandby is the most basic UPS topology. A standby UPS resorts to battery backup power in the event of common power problems such as a blackout, voltage sag, or voltage surge. When incoming utility power drops below or surges above safe voltage levels, the UPS switches to DC battery power and then inverts it to AC power to run connected equipment. These models are designed for consumer electronics, entry-level computers, POS systems, security systems, and other basic electronic equipment.\r\nA line-interactive UPS incorporates technology which allows it to correct minor power fluctuations (under-voltages and over voltages) without switching to battery. This type of UPS has an autotransformer that regulates low voltages (e.g., brownouts) and over voltages (e.g., swells) without having to switch to battery. Line-interactive UPS models are typically used for consumer electronics, PCs, gaming systems, home theater electronics, network equipment, and entry-to-mid-range servers. They provide power during such events as a blackout, voltage sag, voltage surge, or over-voltage.\r\nA double-conversion (online) UPS provides consistent, clean, and near-perfect power regardless of the condition of incoming power. This UPS converts incoming AC power to DC, and then back to AC. UPS systems with this technology operate on isolated DC power 100 percent of the time and have a zero transfer time because they never need to switch to DC power. Double-conversion UPS systems are designed to protect mission-critical IT equipment, data center installations, high-end servers, large telecom installations and storage applications, and advanced network equipment from damage caused by a power blackout, voltage sag, voltage surge, over-voltage, voltage spike, frequency noise, frequency variation, or harmonic distortion.","materialsDescription":" <span style=\"font-weight: bold;\">What is a UPS system?</span>\r\nUPS stands for an uninterruptible power supply. This means that a UPS system is designed to keep the power running at all times. For instance, load shedding will be a problem of the past with our wide variety of products and solutions keeping your business moving.\r\n<span style=\"font-weight: bold;\">Where is a UPS used?</span>\r\nUPS systems can be used anywhere that needs to ensure that the power stays on. The most common applications are where power is critical to avoid infrastructure damage e.g. Data centers and manufacturing facilities.\r\n<span style=\"font-weight: bold;\">What is the difference between a battery and a UPS?</span>\r\nA battery is a device that stores energy, a UPS detects when there is no longer any power coming from the mains and switches over to the UPS batteries.\r\n<span style=\"font-weight: bold;\">Can I use a UPS for 6-7 hours?</span>\r\nIf the power requirement is low and the UPS is overrated, possibly, but normally running a UPS for this long requires so many UPS batteries it becomes unfeasible both financially and physically. It would be best to run a standby generator alongside your UPS to achieve this.\r\n<span style=\"font-weight: bold;\">What is the difference between a UPS and an Inverter?</span>\r\nThe UPS and inverter both provide the backup supply to the electrical system. The major difference between the UPS and inverter is that the UPS switches from the main supply to the battery immediately, but the inverter takes much longer.\r\n<span style=\"font-weight: bold;\">What is a non-critical load in a power system?</span>\r\nA non-critical load is an electrical device or devices, that aren’t key to keeping a business running or won’t be damaged by a power cut. In short, it doesn’t matter if these devices lose power in an outage.\r\n<span style=\"font-weight: bold;\">What is backup power?</span>\r\nBackup power is a term that simply means, a source of power if the main power source fails. This can be anything from some AA batteries in your mains powered alarm clock to UPS system and standby generator that is connected to your data center.\r\n<span style=\"font-weight: bold;\">What is the difference between a standby generator and a UPS system?</span>\r\nWhile both protect against a power cut, a UPS is an immediate, short term solution, provide power straight away for as long as its UPS batteries have a charge. A standby generator is a longer turn solution, that is slower to start up but will provide power for as long as it has fuel.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_UPS.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":865,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Bleid-massiv_EqualLogic_PS-M4110.png","logo":true,"scheme":false,"title":"DELL Блейд-массив EqualLogic PS-M4110","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-bleid-massiv-equallogic-ps-m4110","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к питанию и охлаждению.\r\n\r\nИнтеграция системы хранения данных корпоративного класса с блейд-серверами\r\nПолучите максимально гибкую систему хранения данных для блейд-среды благодаря блейд-массиву двойной ширины и половинной высоты, который можно установить в любом отсеке корпуса PowerEdge M1000e.\r\n\r\nПростое расширение системы хранения данных\r\nОтличная одноранговая архитектура EqualLogic, обеспечивающая линейное масштабирование, позволит сэкономить время благодаря одновременному масштабированию емкости и производительности системы хранения данных.\r\n\r\nУпрощение управления и снижение риска\r\nПоложитесь на возможности централизованного мониторинга и составления отчетов, а также мощные средства защиты данных, реализованные благодаря комплексному набору расширенных функций блейд-массива EqualLogic PS-M4110.\r\n\r\nСистема хранения данных Equallogic PS M4110 \r\nБлейд-массив EqualLogic PS-M4110 предлагается в четырех различных конфигурациях.\r\n\r\nPS-M4110E\r\nПовысьте емкость и производительность, а также расширьте возможности подключения системы хранения данных на вашем малом или среднем предприятии, воспользовавшись экономичными блейд-массивами с протоколом iSCSI 10GbE EqualLogic PS-M4110E.\r\n\r\nPS-M4110X\r\nРазверните блейд-массив iSCSI Dell EqualLogic PS-M4110X 10GbE с отличным сочетанием экономичной производительности и емкости для различных приложений.\r\nБолее подробная информация\r\n\r\nPS-M4110XV\r\nВысокопроизводительные блейд-массивы iSCSI Dell EqualLogic PS-M4110XV 10GbE обеспечат эффективную работу ваших критически важных приложений.\r\n\r\nPS-M4110XS\r\nПриобретите блейд-массив 10GbE iSCSI Dell EqualLogic PS-M4110XS, и вы получите решение с расширенными функциями многоуровневого хранения данных, объединяющее в себе производительные твердотельные накопители с небольшой задержкой и жесткие диски большой емкости.","shortDescription":"Объедините системы хранения, блейд-серверы и сетевые компоненты в масшабируемый виртуализированный центр обработки данных с помощью блейд-массива Dell™ EqualLogic™ PS-M4110.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Блейд-массив EqualLogic PS-M4110","keywords":"данных, хранения, EqualLogic, системы, 10GbE, iSCSI, благодаря, PS-M4110","description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к пит","og:title":"DELL Блейд-массив EqualLogic PS-M4110","og:description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к пит","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Bleid-massiv_EqualLogic_PS-M4110.png"},"eventUrl":"","translationId":7019,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":866,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Modulnaja_infrastruktura.png","logo":true,"scheme":false,"title":"DELL Стоечный сервер PowerEdge C6320","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-stoechnyi-server-poweredge-c6320","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью, оснащенное процессорами Intel® Xeon® E5-2600 v4 нового поколения с увеличенным числом ядер по сравнению с предыдущими моделями E5-2600 v3, а также с поддержкой памяти объемом до 512 Гбайт на серверный узел с общим объемом до 2 Тбайт.\r\nИнтегрированный контроллер удаленного доступа Dell iDRAC8 с контроллером жизненного цикла (оптимальная стоимость при использовании с C6320) для обеспечения стабильного, эффективного управления серверами в физических, виртуальных, локальных и удаленных средах\r\nУниверсальные конфигурации с жесткими дисками высокой емкости с шириной 2,5 и 3,5 дюйма\r\n16 разъемов для модулей памяти DIMM позволяют адаптировать объем памяти (до 512 Гбайт1) под ваши потребности\r\nПамять DDR4 обеспечивает увеличение пропускной способности на 15% и сокращение энергопотребления до 30% по сравнению с ОЗУ DDR3\r\n\r\nМаксимальная универсальность\r\n\r\nЭкономия пространства и поддержка меняющихся нагрузок за счет оптимального сочетания производительности процессоров, вариантов узлов и функций энергосбережения, а также благодаря возможности использования до четырех независимых салазок (серверных узлов) и поддержке различного числа жестких дисков в одном шасси с форм-фактором 2U.\r\nДо 44 ядер на узел, 176 ядер на шасси\r\nДо 24 (шириной 2,5 дюйма) или 12 (шириной 3,5 дюйма) накопителей SAS, SATA или твердотельных накопителей с возможностью горячей замены в каждом шасси\r\nДва высокоэффективных блока питания мощностью 1 400 Вт и 1 600 Вт с возможностью горячей замены\r\nОпциональное встроенное загрузочное устройство SATA DOM (64 Гбайта) позволяет освободить ценное пространство на жестком диске для данных\r\nОдин разъем x16 PCIe 3.0 и один мезонинный разъем x8 PCIe 3.0 для салазок с форм-фактором 1U\r\nВстроенный модуль LOM: 2 порта 10GbE (SFP+)\r\n\r\nПовышение эффективности работы\r\n\r\nПростое управление серверами PowerEdge C6320 благодаря автоматическому выполнению стандартных задач по управлению жизненным циклом с помощью технологий Dell OpenManage на основе iDRAC8 со встроенным контроллером жизненного цикла без использования агентов, который работает как автономно, так и в сочетании с другими компонентами Dell OpenManage и средствами управления сторонних производителей, включая следующие:\r\nOpenManage Essentials\r\nИнтеграция Dell для BMC BladeLogic\r\nMicrosoft System Center\r\nVMware vCenter\r\nЭти средства позволяют оптимизировать операции в существующей среде управления ИТ.\r\nУпрощение задач управления\r\n\r\nIDRAC с контроллером жизненного цикла предоставляет полный набор функций управления сервером (включая конфигурацию, развертывание ОС, обновления микропрограмм, мониторинг состояния и техническое обслуживание), которые работают независимо от состояния операционной системы и наличия гипервизора.\r\n <span style=\"white-space:pre\">\t</span>\r\nБез агентов — мониторинг производительности основной памяти, ЦП и системы ввода-вывода и настройка пользовательских пороговых значений для оповещения по протоколу SNMP, Racadm или WSman — и все это без агентов ОС или какого-либо влияния на операционную систему или серверные компоненты.\r\n \r\nКонтроллер жизненного цикла — локальное развертывание и упрощенное обслуживание с помощью средства, интегрируемого с Dell OpenManage Essentials и консолями сторонних производителей.\r\n poweredge-c6320-Автоматическое развертывание и выделение ресурсов <span style=\"white-space:pre\">\t</span>Автоматическое развертывание и выделение ресурсов — автоматическая настройка серверов и опциональная возможность планирования проверок работоспособности с автоматическими изменениями конфигурации (требуется iDRAC Enterprise Edition).\r\n\r\nКрупномасштабные среды\r\n\r\nИспользуйте возможности гипермасштабирования C6320 для сред с высокими требованиями к производительности и с интенсивной рабочей нагрузкой.\r\n \r\nВысокопроизводительные вычисления — внедрение высокопроизводительных массово-параллельных вычислений с малой задержкой для кластеров с высокой плотностью, которым требуется высокая масштабируемость с максимальной производительностью на одно стойко-место.\r\nАналитика и большие объемы данных — поддержка крупномасштабного анализа данных благодаря максимальной плотности вычислений и возможности адаптации серверных конфигураций к изменяющимся нагрузкам.\r\nОблако — существенная масштабируемость и высокая плотность помогают поставщикам облачных сервисов и услуг хостинга сократить капитальные расходы и максимально повысить уровень производительности на кв. фут из расчета на ватт.\r\nWeb 2.0 — обеспечение соответствия серверной инфраструктуры крупным нагрузкам веб-хостинга, а также исключение выделения избыточных ресурсов благодаря высокой масштабируемости и универсальным вариантам быстрой конфигурации.","shortDescription":"Оптимизация производительности вычислений.\r\nМаксимизируйте производительность гипермасштабируемых систем благодаря поддержке до четырех независимых серверных узлов, различных конфигураций накопителей и общей инфраструктуры в компактном корпусе с форм-фактором 2U.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Стоечный сервер PowerEdge C6320","keywords":"Dell, управления, C6320, производительности, OpenManage, высокой, развертывание, памяти","description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью,","og:title":"DELL Стоечный сервер PowerEdge C6320","og:description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью,","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Modulnaja_infrastruktura.png"},"eventUrl":"","translationId":7020,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":868,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Obshchaja_infrastruktura_-_Konvergentnye_platformy.jpg","logo":true,"scheme":false,"title":"DELL Общая инфраструктура - Конвергентные платформы","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-obshchaja-infrastruktura-konvergentnye-platformy","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые задачи.\r\n\r\nБлейд-сервер PowerEdge M520\r\nСервер PowerEdge™ M520 предлагает невероятно эффективную работу и исключительные преимущества для бизнес-приложений, а также беспрецедентный набор функций корпоративного класса.\r\n\r\nБлейд-сервер PowerEdge M620\r\nБлейд-сервер PowerEdge™ M620 справится с самыми ресурсоемкими рабочими нагрузками. Это идеальное сочетание высокой плотности установки, производительности, эффективности и масштабируемости.\r\n\r\nБлейд-сервер PowerEdge M915\r\nПовысьте эффективность, производительность и гибкость центра обработки данных благодаря блейд-серверу максимальной высоты PowerEdge M915 с процессорами AMD, максимальной полосой пропускания и функциями управления корпоративного класса.","shortDescription":"Dell PowerEdge VRTX PowerEdge VRTX интегрирует серверы, системы хранения данных, сетевые компоненты и средства управления в компактной инфраструктуре совместного использования, оптимизированной для офисных сред.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Общая инфраструктура - Конвергентные платформы","keywords":"Блейд-сервер, PowerEdge, PowerEdge™, эффективность, M520, корпоративного, класса, M620","description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые за","og:title":"DELL Общая инфраструктура - Конвергентные платформы","og:description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые за","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Obshchaja_infrastruktura_-_Konvergentnye_platformy.jpg"},"eventUrl":"","translationId":7021,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"},{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":869,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Upravlenie_klientskimi_sistemami.jpg","logo":true,"scheme":false,"title":"DELL Управление клиентскими системами","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-upravlenie-klientskimi-sistemami","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для развертывания Dell KACE K2000\r\nУстройства для развертывания Dell KACE K2000 удовлетворяют потребности в развертывании систем, включая оценку ресурсов, развертывание ОС, установку приложений, настройку и восстановление.","shortDescription":"С помощью упрощенного комплексного подхода к развертыванию систем организации стремятся сэкономить время и деньги и повысить эффективность работы ИТ-отделов.\r\nЗащита данных\r\nDell KACE K1000\r\nDell KACE K2000","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Управление клиентскими системами","keywords":"Dell, KACE, развертывания, Устройства, управления, удовлетворяют, K2000, K1000","description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для разве","og:title":"DELL Управление клиентскими системами","og:description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для разве","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Upravlenie_klientskimi_sistemami.jpg"},"eventUrl":"","translationId":7022,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":{"levels":[{"id":9,"level":"Registered"},{"id":33,"level":"Preferred"},{"id":34,"level":"Premier"},{"id":35,"level":"Distributor"}],"partnerDiscounts":{"Registered":"","Preferred":"","Premier":"","Distributor":""},"registeredDiscounts":{"Registered":"","Preferred":"","Premier":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"Registered":"","Preferred":"","Premier":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}