{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"_type":"localeString","en":"Products","de":"die produkte","ru":"Продукты"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"_type":"localeString","en":"Update profile","ru":"Обновить профиль"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"en":"User","ru":"Пользователь","_type":"localeString"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"en":"Country","ru":"Страна","_type":"localeString"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"_type":"localeString","en":"Produced products","ru":"Производимые продукты"},"vendor-implementations":{"en":"Produced deployments","ru":"Производимые внедрения","_type":"localeString"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"en":"Register","ru":"Регистрация ","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"_type":"localeString","en":"FAQ","de":"FAQ","ru":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"_type":"localeString","en":"Last, first name","ru":"Имя Фамилия"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"name":"title","translations":{"ru":"Компания","_type":"localeString","en":"Company"}},{"translations":{"en":"Company description","ru":"Описание компании","_type":"localeString"},"name":"description"},{"name":"keywords","translations":{"_type":"localeString","en":"Company keywords","ru":"Ключевые слова для компании"}}],"title":{"_type":"localeString","en":"ROI4CIO: Company","ru":"ROI4CIO: Компания"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"fujitsu":{"id":2750,"title":"Fujitsu","logoURL":"https://old.roi4cio.com/uploads/roi/company/fj.png","alias":"fujitsu","address":"","roles":[{"id":3,"type":"vendor"}],"description":"Fujitsu Ltd. , commonly referred to as Fujitsu, is a Japanese multinational information technology equipment and services company headquartered in Tokyo, Japan. In 2015, it was the world's fourth-largest IT services provider measured by IT services revenue (after IBM, HP and Accenture). Fortune named Fujitsu as one of the world's most admired companies and a Global 500 company.\r\n\r\nFujitsu chiefly makes computing products, but the company and its subsidiaries also offer a diversity of products and services in the areas of personal computing, enterprise computing, including x86, SPARC and mainframe server products, as well as storage products, telecommunications, advanced microelectronics, and air conditioning. It has approximately 159,000 employees and its products and services are available in over 100 countries","companyTypes":["vendor"],"products":{},"vendoredProductsCount":10,"suppliedProductsCount":10,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":13,"b4r":0,"categories":{"7":{"id":7,"title":"Storage - General-Purpose Disk Arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png","alias":"storage-general-purpose-disk-arrays"},"35":{"id":35,"title":"Server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png","alias":"server"},"37":{"id":37,"title":"PC - personal computer","description":"A personal computer (PC) is a multi-purpose computer whose size, capabilities, and price make it feasible for individual use. Personal computers are intended to be operated directly by an end user, rather than by a computer expert or technician. Unlike large costly minicomputer and mainframes, time-sharing by many people at the same time is not used with personal computers.\r\nInstitutional or corporate computer owners in the 1960s had to write their own programs to do any useful work with the machines. While personal computer users may develop their own applications, usually these systems run commercial software, free-of-charge software ("freeware"), which is most often proprietary, or free and open-source software, which is provided in "ready-to-run", or binary, form. Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel, and end-user program development may be discouraged by lack of support by the manufacturer.\r\nSince the early 1990s, Microsoft operating systems and Intel hardware have dominated much of the personal computer market, first with MS-DOS and then with Microsoft Windows. Alternatives to Microsoft's Windows operating systems occupy a minority share of the industry. These include Apple's macOS and free and open-source Unix-like operating systems.\r\nThe advent of personal computers and the concurrent Digital Revolution have significantly affected the lives of people in all countries.\r\n"PC" is an initialism for "personal computer". The IBM Personal Computer incorporated the designation in its model name. It is sometimes useful to distinguish personal computers of the "IBM Personal Computer" family from personal computers made by other manufacturers. For example, "PC" is used in contrast with "Mac", an Apple Macintosh computer. Since none of these Apple products were mainframes or time-sharing systems, they were all "personal computers" and not "PC" (brand) computers.","materialsDescription":" <span style=\"font-weight: bold;\">What types of stationary personal computers exist?</span>\r\n<span style=\"font-weight: bold;\">Desktops</span> - refer to the type of stationary PC. From the name it is clear that these are devices that are installed and work on a table and are not transferred during operation. As a rule, representatives of this group are high-performance powerful devices. They consist of a system unit (a rectangular box), to which a monitor, keyboard and mouse are connected.\r\n<span style=\"font-weight: bold;\">Servers</span> - this type of computer has its own specific tasks that it performs remotely or locally in place. The vast majority of servers are quite powerful machines. The appearance of the servers is slightly different from the usual PC - they are mounted in metal racks that look like furniture shelves. The racks themselves are placed in a special room (server room), the necessary temperature regime is necessarily maintained in it.\r\n<span style=\"font-weight: bold;\">Nettops</span> - refer to the type of stationary PC. The system unit is compact in size, usually with low power consumption and noise. Due to the small size, nettops have lower performance, but they fit perfectly into the home environment and do not occupy expensive office space.\r\n<span style=\"font-weight: bold;\">Microcomputers</span> are computers that fit in a miniature enclosure that looks very similar to a flash drive. The microcomputer itself does not have an output device, therefore, through an HDMI connection, it connects to a monitor or TV. Controls, such as a mouse or keyboard, are connected via the built-in USB ports or Bluetooth. Technical specifications depend on the configuration, as with any other PC.\r\n<span style=\"font-weight: bold;\">Monoblocks</span> - refer to the type of stationary PC. The system unit and the monitor are a single unit. Accessories and boards are placed in the compartment, which is mounted on the back of the monitor. It has an aesthetic appearance and does not take up much space.\r\n<span style=\"font-weight: bold;\">What are the types of portable personal computers?</span>\r\nA laptop computer can also be called portable. They differ from desktop dimensions and weight in a smaller direction and more capacious batteries, which is understandable because you need to carry it with you.\r\n<span style=\"font-weight: bold;\">Laptops and netbooks</span> - refer to the type of portable (laptop) PCs, have a battery for offline operation without using a network. The case is made in the form of a clamshell, a screen is installed at the top, and a keyboard at the bottom. Netbooks are smaller than laptops, respectively, have lower performance, although the battery life is longer.\r\n<span style=\"font-weight: bold;\">Tablet laptops</span> - refer to the type of portable (laptop) PC. The case consists of a touch screen display - Touchscreen. Their main purpose is surfing the Internet, watching videos, listening to audio, gaming and other applications. The compact dimensions make this group especially popular for travelers. Tablet laptops have a keyboard that either folds up or extends out of a niche under the screen. In tablets, the touchscreen is the input medium. For this group, battery life is important.\r\n<span style=\"font-weight: bold;\">Pocket PCs and smartphones</span> - belong to the type of portable (laptop) PC. Distinctive features are a small size and a large reserve of battery life. The input tool is either a touch screen or a retractable keyboard.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_PC.png","alias":"pc-personal-computer"},"38":{"id":38,"title":"Tablet PC","description":"A tablet computer, commonly shortened to tablet, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package. Tablets, being computers, do what other personal computers do, but lack some input/output (I/O) abilities that others have. Modern tablets largely resemble modern smartphones, the only difference being that tablets are relatively larger than smartphones, with screens 7 inches (18 cm) or larger, measured diagonally, and may not support access to a cellular network.\r\nThe touchscreen display is operated by gestures executed by finger or digital pen (stylus), instead of the mouse, trackpad, and keyboard of larger computers. Portable computers can be classified according to the presence and appearance of physical keyboards. Two species of a tablet, the slate and booklet, do not have physical keyboards and usually accept text and other input by use of a virtual keyboard shown on their touchscreen displays. To compensate for their lack of a physical keyboard, most tablets can connect to independent physical keyboards by Bluetooth or USB; 2-in-1 PCs have keyboards, distinct from tablets.\r\nThe form of the tablet was conceptualized in the middle of the 20th century (Stanley Kubrick depicted fictional tablets in the 1968 science fiction film A Space Odyssey) and prototyped and developed in the last two decades of that century. In 2010, Apple released the iPad, the first mass-market tablet to achieve widespread popularity. Thereafter tablets rapidly rose in ubiquity and soon became a large product category used for personal, educational and workplace applications, with sales stabilizing in the mid-2010s.\r\nAndroid was the first of the 2000s-era dominating platforms for tablet computers to reach the market. In 2008, the first plans for Android-based tablets appeared. The first products were released in 2009. Among them was the Archos 5, a pocket-sized model with a 5-inch touchscreen, that was first released with a proprietary operating system and later (in 2009) released with Android 1.4. The Camangi WebStation was released in Q2 2009. The first LTE Android tablet appeared in late 2009 and was made by ICD for Verizon. This unit was called the Ultra, but a version called Vega was released around the same time. Ultra had a 7-inch display while Vega's was 15 inches. Many more products followed in 2010. Several manufacturers waited for Android Honeycomb, specifically adapted for use with tablets, which debuted in February 2011.\r\nApple is often credited for defining a new class of consumer device with the iPad, which shaped the commercial market for tablets in the following years, and was the most successful tablet at the time of its release. iPads and competing devices were tested by the US military in 2011 and cleared for secure use in 2013. Its debut in 2010 pushed tablets into the mainstream. Samsung's Galaxy Tab and others followed, continuing the trends towards the features listed above. In March 2012, PC Magazine reported that 31% of U.S. Internet users owned a tablet, used mainly for viewing published content such as video and news. The top-selling line of devices was Apple's iPad with 100 million sold between its release in April 2010 and mid-October 2012, but iPad market share (number of units) dropped to 36% in 2013 with Android tablets climbing to 62%. Android tablet sales volume was 121 million devices, plus 52 million, between 2012 and 2013 respectively. Individual brands of Android operating system devices or compatibles follow iPad with Amazon's Kindle Fire with 7 million, and Barnes & Noble's Nook with 5 million.\r\nThe BlackBerry PlayBook was announced in September 2010 that ran the BlackBerry Tablet OS. The BlackBerry PlayBook was officially released to US and Canadian consumers on April 19, 2011. Hewlett Packard announced that the TouchPad, running WebOS 3.0 on a 1.2 GHz Qualcomm Snapdragon CPU, would be released in June 2011. On August 18, 2011, HP announced the discontinuation of the TouchPad, due to sluggish sales.[66] In 2013, the Mozilla Foundation announced a prototype tablet model with Foxconn which ran on Firefox OS. Firefox OS was discontinued in 2016. The Canonical hinted that Ubuntu would be available on tablets by 2014. In February 2016 there was a commercial release of the BQ Aquaris Ubuntu tablet utilizing the Ubuntu Touch operating system. Canonical terminated support for the project due to lack of market interest on 5 April 2017 and it was then adopted by the UBports as a community project.\r\nAs of February 2014, 83% of mobile app developers were targeting tablets, but 93% of developers were targeting smartphones. By 2014 around 23% of B2B companies were said to have deployed tablets for sales-related activities, according to a survey report by Corporate Visions. The iPad held majority use in North America, Western Europe, Japan, Australia, and most of the Americas. Android tablets were more popular in most of Asia (China and Russia an exception), Africa and Eastern Europe. In 2015 tablet sales did not increase. Apple remained the largest seller but its market share declined below 25%. Samsung vice president Gary Riding said early in 2016 that tablets were only doing well among those using them for work. Newer models were more expensive and designed for a keyboard and stylus, which reflected the changing uses. As of early 2016, Android reigned over the market with 65%. Apple took the number 2 spot with 26%, and Windows took a distant third with the remaining 9%. In 2018, out of 4.4 billion computing devices, Android accounted for 2 billion, iOS for 1 billion, and the remainder were PCs, in various forms (desktop, notebook, or tablet), running various operating systems (Windows, macOS, ChromeOS, Linux, etc.).","materialsDescription":" <span style=\"font-weight: bold;\">Why are tablet PCs popular?</span>\r\nBy definition, a tablet is a highly portable PC whose primary interface is a touch screen that occupies the full length/width of the device but whose speaker and microphone are not positioned for hand-held calling. In popular perception, however, tablets simply combine the best aspects of smartphones and laptop PCs, creating what tablet lovers consider the ultimate mobile computing experience:\r\n<ul><li>Compatible with home/office wireless and cellular data networks</li><li>Portable, but with larger, clearer displays than earlier mobile devices</li><li>Powerful, but lighter and easier to carry than traditional laptops</li><li>Longer battery life and greater storage capacity than typical smartphones</li></ul>\r\nTablet owners can use touch commands or a virtual keyboard (sometimes a physical one) to run web browsers, email programs, and interactive games just like they do on a desktop PC or laptop. But when they're ready to move, they can keep working (or playing) simply by switching from a home/office wireless network to a cellular data network.\r\n<span style=\"font-weight: bold;\">Are there different types of tablet PCs?</span>\r\nYes and no, depending on the strictness of the definition.\r\nEngineers used the term slate to describe the original, widely popularized tablet PC form factor-- thin and flat, one-sided, without a keyboard. That distinguished tablets from convertibles: full-fledged, keyboard-equipped laptops with hinges that allowed the cover/touch screen to flip 180 degrees -- creating a bulky but usable "tablet."\r\nToday, the terminology has evolved -- adding the phrase "2-in-1" -- to better distinguish the different types of tablets and laptops. Note that within each category are models that run on mobile operating systems and others that run on regular PC operating systems:\r\n<ul><li><span style=\"font-weight: bold;\">Laptop:</span> The original, portable PC that opens partway, like a notebook, to reveal a screen and a keyboard.</li><li><span style=\"font-weight: bold;\">Tablet:</span> The original, widely popularized slate tablet form factor: thin, flat, and without a keyboard.</li><li><span style=\"font-weight: bold;\">2-in-1 Detachable</span> (also called a "hybrid laptop" or "hybrid tablet"): A device whose keyboard and screen can be fully detached from each other. Depending on the manufacturer, 2-in-1 Detachables might be marketed as "tablets-with-optional-keyboards" or "laptops-with-detachable-tablets."</li><li><span style=\"font-weight: bold;\">2-in-1 Attached</span> (also called a "convertible laptop" or "convertible tablet"): A device with either a hinge/screen combination that flips around for use as a tablet or a keyboard that in some way folds out from the screen/body. While similar to the original convertibles, today's 2-in-1 Attached models are much thinner and lighter.</li></ul>\r\nIn addition, a new term -- Multimode Tablet -- has emerged to describe models with specialized hinge/handles that allow them to be used traditionally (directly in your hands) or in multiple different ways while propped on a desktop (in tilt mode for easier touch entry (or to project the screen on a nearby wall), in standing mode for touch screen-controlled presentations, or in tent mode for less interactive presentations). Some pc manufacturers even offer a "hanging mode" or include "tablet mode" and "laptop mode" among their list of available modes.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Tablet_PC.png","alias":"tablet-pc"},"44":{"id":44,"title":"IAM - Identity and Access Management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png","alias":"iam-identity-and-access-management"},"45":{"id":45,"title":"SIEM - Security Information and Event Management","description":"<span style=\"font-weight: bold; \">Security information and event management (SIEM)</span> is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system. \r\n The underlying principles of every SIEM system is to aggregate relevant data from multiple sources, identify deviations from the norm and take appropriate action. At the most basic level, a SIEM system can be rules-based or employ a statistical correlation engine to establish relationships between event log entries. Advanced SIEM products have evolved to include user and entity behavior analytics (UEBA) and security orchestration and automated response (SOAR). \r\nThe acronyms SEM, SIM and SIEM have sometimes been used interchangeably, but generally refer to the different primary focus of products:\r\n<ul><li><span style=\"font-weight: bold;\">Log management:</span> Focus on simple collection and storage of log messages and audit trails.</li><li><span style=\"font-weight: bold;\">Security information management (SIM):</span> Long-term storage as well as analysis and reporting of log data.</li><li><span style=\"font-weight: bold;\">Security event manager (SEM):</span> Real-time monitoring, correlation of events, notifications and console views.</li><li><span style=\"font-weight: bold;\">Security information event management (SIEM):</span> Combines SIM and SEM and provides real-time analysis of security alerts generated by network hardware and applications.</li><li><span style=\"font-weight: bold;\">Managed Security Service (MSS) or Managed Security Service Provider (MSSP):</span> The most common managed services appear to evolve around connectivity and bandwidth, network monitoring, security, virtualization, and disaster recovery.</li><li><span style=\"font-weight: bold;\">Security as a service (SECaaS):</span> These security services often include authentication, anti-virus, anti-malware/spyware, intrusion detection, Penetration testing and security event management, among others.</li></ul>\r\nToday, most of SIEM technology works by deploying multiple collection agents in a hierarchical manner to gather security-related events from end-user devices, servers, network equipment, as well as specialized security equipment like firewalls, antivirus or intrusion prevention systems. The collectors forward events to a centralized management console where security analysts sift through the noise, connecting the dots and prioritizing security incidents.\r\nSome of the most important features to review when evaluating Security Information and Event Management software are:\r\n<ol><li><span style=\"font-weight: bold; \">Integration with other controls:</span> Can the system give commands to other enterprise security controls to prevent or stop attacks in progress?</li><li><span style=\"font-weight: bold; \">Artificial intelligence:</span> Can the system improve its own accuracy by through machine and deep learning?</li><li><span style=\"font-weight: bold; \">Threat intelligence feeds:</span> Can the system support threat intelligence feeds of the organization's choosing or is it mandated to use a particular feed?</li><li><span style=\"font-weight: bold; \">Robust compliance reporting:</span> Does the system include built-in reports for common compliance needs and the provide the organization with the ability to customize or create new compliance reports?</li><li><span style=\"font-weight: bold; \">Forensics capabilities:</span> Can the system capture additional information about security events by recording the headers and contents of packets of interest? </li></ol>\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> Why is SIEM Important?</h1>\r\nSIEM has become a core security component of modern organizations. The main reason is that every user or tracker leaves behind a virtual trail in a network’s log data. SIEM software is designed to use this log data in order to generate insight into past attacks and events. A SIEM solution not only identifies that an attack has happened, but allows you to see how and why it happened as well.\r\nAs organizations update and upscale to increasingly complex IT infrastructures, SIEM has become even more important in recent years. Contrary to popular belief, firewalls and antivirus packages are not enough to protect a network in its entirety. Zero-day attacks can still penetrate a system’s defenses even with these security measures in place.\r\nSIEM addresses this problem by detecting attack activity and assessing it against past behavior on the network. A security event monitoring has the ability to distinguish between legitimate use and a malicious attack. This helps to increase a system’s incident protection and avoid damage to systems and virtual property.\r\nThe use of SIEM also helps companies to comply with a variety of industry cyber management regulations. Log management is the industry standard method of auditing activity on an IT network. SIEM management provides the best way to meet this regulatory requirement and provide transparency over logs in order to generate clear insights and improvements.\r\n<h1 class=\"align-center\">Evaluation criteria for security information and event management software:</h1>\r\n<ul><li>Threat identification: Raw log form vs. descriptive.</li><li>Threat tracking: Ability to track through the various events, from source to destination.</li><li>Policy enforcement: Ability to enforce defined polices.</li><li>Application analysis: Ability to analyze application at Layer 7 if necessary.</li><li>Business relevance of events: Ability to assign business risk to events and have weighted threat levels.</li><li>Measuring changes and improvements: Ability to track configuration changes to devices.</li><li>Asset-based information: Ability to gather information on devices on the network.</li><li>Anomalous behavior (server): Ability to trend and see changes in how it communicates to others.</li><li>Anomalous behavior (network): Ability to trend and see how communications pass throughout the network.</li><li>Anomalous behavior (application): Ability to trend and see changes in how it communicates to others.</li><li>User monitoring: User activity, logging in, applications usage, etc.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SIEM.png","alias":"siem-security-information-and-event-management"},"52":{"id":52,"title":"SaaS - software as a service","description":"<span style=\"font-weight: bold;\">Software as a service (SaaS)</span> is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.\r\n SaaS services is typically accessed by users using a thin client, e.g. via a web browser. SaaS software solutions has become a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), talent acquisition, learning management systems, content management (CM), Geographic Information Systems (GIS), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies.\r\nSaaS applications are also known as <span style=\"font-weight: bold;\">Web-based software</span>, <span style=\"font-weight: bold;\">on-demand software</span> and<span style=\"font-weight: bold;\"> hosted software</span>.\r\nThe term "Software as a Service" (SaaS) is considered to be part of the nomenclature of cloud computing, along with Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS),managed software as a service (MSaaS), mobile backend as a service (MBaaS), and information technology management as a service (ITMaaS).\r\nBecause SaaS is based on cloud computing it saves organizations from installing and running applications on their own systems. That eliminates or at least reduces the associated costs of hardware purchases and maintenance and of software and support. The initial setup cost for a SaaS application is also generally lower than it for equivalent enterprise software purchased via a site license.\r\nSometimes, the use of SaaS cloud software can also reduce the long-term costs of software licensing, though that depends on the pricing model for the individual SaaS offering and the enterprise’s usage patterns. In fact, it’s possible for SaaS to cost more than traditional software licenses. This is an area IT organizations should explore carefully.<br />SaaS also provides enterprises the flexibility inherent with cloud services: they can subscribe to a SaaS offering as needed rather than having to buy software licenses and install the software on a variety of computers. The savings can be substantial in the case of applications that require new hardware purchases to support the software.<br /><br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Who uses SaaS?</span></h1>\r\nIndustry analyst Forrester Research notes that SaaS adoption has so far been concentrated mostly in human resource management (HRM), customer relationship management (CRM), collaboration software (e.g., email), and procurement solutions, but is poised to widen. Today it’s possible to have a data warehouse in the cloud that you can access with business intelligence software running as a service and connect to your cloud-based ERP like NetSuite or Microsoft Dynamics.The dollar savings can run into the millions. And SaaS installations are often installed and working in a fraction of the time of on-premises deployments—some can be ready in hours. \r\nSales and marketing people are likely familiar with Salesforce.com, the leading SaaS CRM software, with millions of users across more than 100,000 customers. Sales is going SaaS too, with apps available to support sales in order management, compensation, quote production and configure, price, quoting, electronic signatures, contract management and more.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why SaaS? Benefits of software as a service</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">Lower cost of entry</span>. With SaaS solution, you pay for what you need, without having to buy hardware to host your new applications. Instead of provisioning internal resources to install the software, the vendor provides APIs and performs much of the work to get their software working for you. The time to a working solution can drop from months in the traditional model to weeks, days or hours with the SaaS model. In some businesses, IT wants nothing to do with installing and running a sales app. In the case of funding software and its implementation, this can be a make-or-break issue for the sales and marketing budget, so the lower cost really makes the difference.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reduced time to benefit/rapid prototyping</span>. In the SaaS model, the software application is already installed and configured. Users can provision the server for the cloud and quickly have the application ready for use. This cuts the time to benefit and allows for rapid demonstrations and prototyping. With many SaaS companies offering free trials, this means a painless proof of concept and discovery phase to prove the benefit to the organization. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Pay as you go</span>. SaaS business software gives you the benefit of predictable costs both for the subscription and to some extent, the administration. Even as you scale, you can have a clear idea of what your costs will be. This allows for much more accurate budgeting, especially as compared to the costs of internal IT to manage upgrades and address issues for an owned instance.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">The SaaS vendor is responsible for upgrades, uptime and security</span>. Under the SaaS model, since the software is hosted by the vendor, they take on the responsibility for maintaining the software and upgrading it, ensuring that it is reliable and meeting agreed-upon service level agreements, and keeping the application and its data secure. While some IT people worry about Software as a Service security outside of the enterprise walls, the likely truth is that the vendor has a much higher level of security than the enterprise itself would provide. Many will have redundant instances in very secure data centers in multiple geographies. Also, the data is being automatically backed up by the vendor, providing additional security and peace of mind. Because of the data center hosting, you’re getting the added benefit of at least some disaster recovery. Lastly, the vendor manages these issues as part of their core competencies—let them.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Integration and scalability.</span> Most SaaS apps are designed to support some amount of customization for the way you do business. SaaS vendors create APIs to allow connections not only to internal applications like ERPs or CRMs but also to other SaaS providers. One of the terrific aspects of integration is that orders written in the field can be automatically sent to the ERP. Now a salesperson in the field can check inventory through the catalog, write the order in front of the customer for approval, send it and receive confirmation, all in minutes. And as you scale with a SaaS vendor, there’s no need to invest in server capacity and software licenses. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Work anywhere</span>. Since the software is hosted in the cloud and accessible over the internet, users can access it via mobile devices wherever they are connected. This includes checking customer order histories prior to a sales call, as well as having access to real time data and real time order taking with the customer.</li></ul>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SaaS__1_.png","alias":"saas-software-as-a-service"},"838":{"id":838,"title":"Endpoint Detection and Response","description":"Endpoint Detection and Response (EDR) is a cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats. It is a subset of endpoint security technology and a critical piece of an optimal security posture. EDR differs from other endpoint protection platforms (EPP) such as antivirus (AV) and anti-malware in that its primary focus isn't to automatically stop threats in the pre-execution phase on an endpoint. Rather, EDR is focused on providing the right endpoint visibility with the right insights to help security analysts discover, investigate and respond to very advanced threats and broader attack campaigns stretching across multiple endpoints. Many EDR tools, however, combine EDR and EPP.\r\nWhile small and mid-market organizations are increasingly turning to EDR technology for more advanced endpoint protection, many lack the resources to maximize the benefits of the technology. Utilizing advanced EDR features such as forensic analysis, behavioral monitoring and artificial intelligence (AI) is labor and resource intensive, requiring the attention of dedicated security professionals.\r\nA managed endpoint security service combines the latest technology, an around-the-clock team of certified CSOC experts and up-to-the-minute industry intelligence for a cost-effective monthly subscription. Managed services can help reduce the day-to-day burden of monitoring and responding to alerts, enhance security orchestration and automation (SOAR) and improve threat hunting and incident response.","materialsDescription":"<span style=\"font-weight: bold; \">What is Endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response is an emerging technology that addresses the need for continuous monitoring and response to advanced threats. One could even make the argument that endpoint detection and response is a form of advanced threat protection.\r\n<span style=\"font-weight: bold;\">What are the Key Aspects of EDR Security?</span>\r\nAccording to Gartner, effective EDR must include the following capabilities:\r\n<ul><li>Incident data search and investigation</li><li>Alert triage or suspicious activity validation</li><li>Suspicious activity detection</li><li>Threat hunting or data exploration</li><li>Stopping malicious activity</li></ul>\r\n<span style=\"font-weight: bold;\">What to look for in an EDR Solution?</span>\r\nUnderstanding the key aspects of EDR and why they are important will help you better discern what to look for in a solution. It’s important to find EDR software that can provide the highest level of protection while requiring the least amount of effort and investment — adding value to your security team without draining resources. Here are the six key aspects of EDR you should look for:\r\n<span style=\"font-weight: bold;\">1. Visibility:</span> Real-time visibility across all your endpoints allows you to view adversary activities, even as they attempt to breach your environment and stop them immediately.\r\n<span style=\"font-weight: bold;\">2. Threat Database:</span> Effective EDR requires massive amounts of telemetry collected from endpoints and enriched with context so it can be mined for signs of attack with a variety of analytic techniques.\r\n<span style=\"font-weight: bold;\">3. Behavioral Protection:</span> Relying solely on signature-based methods or indicators of compromise (IOCs) lead to the “silent failure” that allows data breaches to occur. Effective endpoint detection and response requires behavioral approaches that search for indicators of attack (IOAs), so you are alerted of suspicious activities before a compromise can occur.\r\n<span style=\"font-weight: bold;\">4. Insight and Intelligence:</span> An endpoint detection and response solution that integrates threat intelligence can provide context, including details on the attributed adversary that is attacking you or other information about the attack.\r\n<span style=\"font-weight: bold;\">5. Fast Response:</span> EDR that enables a fast and accurate response to incidents can stop an attack before it becomes a breach and allow your organization to get back to business quickly.\r\n<span style=\"font-weight: bold;\">6. Cloud-based Solution:</span> Having a cloud-based endpoint detection and response solution is the only way to ensure zero impact on endpoints while making sure capabilities such as search, analysis and investigation can be done accurately and in real time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hgghghg.png","alias":"endpoint-detection-and-response"},"876":{"id":876,"title":"Object Storage","description":"Object storage (also known as object-based storage) is a computer data storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manages data as a file hierarchy, and block storage which manages data as blocks within sectors and tracks. Each object typically includes the data itself, a variable amount of metadata, and a globally unique identifier. Object storage can be implemented at multiple levels, including the device level (object-storage device), the system level, and the interface level. In each case, object storage seeks to enable capabilities not addressed by other storage architectures, like interfaces that can be directly programmable by the application, a namespace that can span multiple instances of physical hardware, and data-management functions like data replication and data distribution at object-level granularity.\r\nObject storage systems allow retention of massive amounts of unstructured data. Object storage is used for purposes such as storing photos on Facebook, songs on Spotify, or files in online collaboration services, such as Dropbox.\r\nObject storage is a method of data storage that emerged in the mid-1990s as researchers foresaw that existing storage methods would eventually start to show their limitations in certain scenarios. True to its name, object storage treats data as discrete units, or objects, that are accompanied by metadata and a universally unique identifier (UUID). This unstructured data resides in a flat (as opposed to tiered) address space called a storage pool. Object storage is also known for its compatibility with cloud computing, due to its unlimited scalability and faster data retrieval.\r\nToday, as data comes to underpin everything we do, the adoption of object storage systems has increased. It’s common in data centers and popular cloud-based platforms, such as Google cloud storage or Amazon cloud storage, and has become the de facto standard in several enterprise use cases.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is Object Storage?</span>\r\nIn the modern world of cloud computing, object storage is the storage and retrieval of unstructured blobs of data and metadata using an HTTP API. Instead of breaking files down into blocks to store it on disk using a file system, we deal with whole objects stored over the network. These objects could be an image file, logs, HTML files, or any self-contained blob of bytes. They are unstructured because there is no specific schema or format they need to follow.<br />Object storage took off because it greatly simplified the developer experience. Because the API consists of standard HTTP requests, libraries were quickly developed for most programming languages. Saving a blob of data became as easy as an HTTP PUT request to the object store. Retrieving the file and metadata is a normal GET request. Further, most object storage services can also serve the files publicly to your users, removing the need to maintain a web server to host static assets.\r\nOn top of that, object storage services charge only for the storage space you use (some also charge per HTTP request, and for transfer bandwidth). This is a boon for small developers, who can get world-class storage and hosting of assets at costs that scale with use.\r\n<span style=\"font-weight: bold;\">What are the advantages of object storage?</span>\r\n<ul><li>A simple HTTP API, with clients available for all major operating systems and programming languages</li><li>A cost structure that means you only pay for what you use</li><li>Built-in public serving of static assets means one less server for you to run yourself</li><li>Some object stores offer built-in CDN integration, which caches your assets around the globe to make downloads and page loads faster for your users</li><li>Optional versioning means you can retrieve old versions of objects to recover from accidental overwrites of data</li><li>Object storage services can easily scale from modest needs to really intense use-cases without the developer having to launch more resources or rearchitect to handle the load</li><li>Using an object storage service means you don’t have to maintain hard drives and RAID arrays, as that’s handled by the service provider</li><li>Being able to store chunks of metadata alongside your data blob can further simplify your application architecture</li></ul>\r\n<span style=\"font-weight: bold;\">What are the disadvantages of object storage?</span>\r\n<ul><li>You can’t use object storage services to back a traditional database, due to the high latency of such services</li><li>Object storage doesn’t allow you to alter just a piece of a data blob, you must read and write an entire object at once. This has some performance implications. For instance, on a file system, you can easily append a single line to the end of a log file. On an object storage system, you’d need to retrieve the object, add the new line, and write the entire object back. This makes object storage less ideal for data that changes very frequently</li><li>Operating systems can’t easily mount an object store like a normal disk. There are some clients and adapters to help with this, but in general, using and browsing an object store is not as simple as flipping through directories in a file browser</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/jhghj.png","alias":"object-storage"}},"branches":"Information Technology","companySizes":"More than 2000 Employees","companyUrl":"http://www.fujitsu.com","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"Fujitsu","keywords":"services, Fujitsu, products, company, computing, world, including, enterprise","description":"Fujitsu Ltd. , commonly referred to as Fujitsu, is a Japanese multinational information technology equipment and services company headquartered in Tokyo, Japan. In 2015, it was the world's fourth-largest IT services provider measured by IT services revenue (af","og:title":"Fujitsu","og:description":"Fujitsu Ltd. , commonly referred to as Fujitsu, is a Japanese multinational information technology equipment and services company headquartered in Tokyo, Japan. In 2015, it was the world's fourth-largest IT services provider measured by IT services revenue (af","og:image":"https://old.roi4cio.com/uploads/roi/company/fj.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[{"supplier":"SI BIS","partnershipLevel":"SELECT Registered","countries":"","partnersType":""},{"supplier":"SPACE IT","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"SYPAIY","partnershipLevel":"Distributor","countries":"Republic of Turkmenistan","partnersType":""},{"supplier":"Ultra","partnershipLevel":"Distributor","countries":"Republic of Moldova","partnersType":""},{"supplier":"LOGYCOM","partnershipLevel":"Distributor","countries":"Republic of Kazakhstan","partnersType":""},{"supplier":"MUK (supplier)","partnershipLevel":"Distributor","countries":"Ukraine","partnersType":""},{"supplier":"Marvel Kazakhstan","partnershipLevel":"Distributor","countries":"Republic of Kazakhstan","partnersType":""},{"supplier":"ERC (Electronic Resource Company)","partnershipLevel":"Distributor","countries":"","partnersType":""},{"supplier":"Rozetka.ua","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"Alt","partnershipLevel":"Distributor","countries":"Republic of Turkmenistan","partnersType":""},{"supplier":"MOYО","partnershipLevel":"","countries":"","partnersType":""},{"supplier":"Aztech","partnershipLevel":"Distributor","countries":"Republic of Azerbaijan","partnersType":""},{"supplier":"Technodom","partnershipLevel":"Distributor","countries":"Republic of Kazakhstan","partnersType":""}],"vendoredProducts":[{"id":5937,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu.png","logo":true,"scheme":false,"title":"Fujitsu ETERNUS CD10000","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-eternus-cd10000","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"<p>Organizations are drowning in data as the global amount of information generated and kept online continues to multiply. There are three key problems: increased demands on scalability, greater complexity and cost, and the threat of major disruption when data goes offline during migration between systems, due to physical storage limitations.</p>\r\n<p>Hyperscale, software-defined storage promises a more flexible storage model where data and services must flow more freely when applications change and systems scale up and down.</p>\r\n<p><span style=\"font-weight: bold;\">ETERNUS CD10000</span> provides unlimited, modular scalability of storage capacity and performance at zero downtime for instant and cost-efficient online access to extensive data volumes. Integrating open-source Ceph software into a storage system delivered with end-to-end maintenance from Fujitsu, enables IT organizations to fully benefit from open standards without implementation and operational risks.</p>\r\n<p><span style=\"font-weight: bold;\">ETERNUS CD10000 S2</span> is a hyperscale, software-defined storage system designed to manage vast amounts of data. A configuration can start small and grow in line with the business. The architecture allows individual storage nodes to be added, exchanged and upgraded without downtime. Fujitsu integrates open source Ceph software in a complete and fully supported solution.</p>","shortDescription":"Fujitsu ETERNUS CD10000 - hyperscale, software-defined storage system for the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu ETERNUS CD10000","keywords":"","description":"<p>Organizations are drowning in data as the global amount of information generated and kept online continues to multiply. There are three key problems: increased demands on scalability, greater complexity and cost, and the threat of major disruption when data","og:title":"Fujitsu ETERNUS CD10000","og:description":"<p>Organizations are drowning in data as the global amount of information generated and kept online continues to multiply. There are three key problems: increased demands on scalability, greater complexity and cost, and the threat of major disruption when data","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu.png"},"eventUrl":"","translationId":5938,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":134,"title":"Object Storage"}],"testingArea":"","categories":[{"id":876,"title":"Object Storage","alias":"object-storage","description":"Object storage (also known as object-based storage) is a computer data storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manages data as a file hierarchy, and block storage which manages data as blocks within sectors and tracks. Each object typically includes the data itself, a variable amount of metadata, and a globally unique identifier. Object storage can be implemented at multiple levels, including the device level (object-storage device), the system level, and the interface level. In each case, object storage seeks to enable capabilities not addressed by other storage architectures, like interfaces that can be directly programmable by the application, a namespace that can span multiple instances of physical hardware, and data-management functions like data replication and data distribution at object-level granularity.\r\nObject storage systems allow retention of massive amounts of unstructured data. Object storage is used for purposes such as storing photos on Facebook, songs on Spotify, or files in online collaboration services, such as Dropbox.\r\nObject storage is a method of data storage that emerged in the mid-1990s as researchers foresaw that existing storage methods would eventually start to show their limitations in certain scenarios. True to its name, object storage treats data as discrete units, or objects, that are accompanied by metadata and a universally unique identifier (UUID). This unstructured data resides in a flat (as opposed to tiered) address space called a storage pool. Object storage is also known for its compatibility with cloud computing, due to its unlimited scalability and faster data retrieval.\r\nToday, as data comes to underpin everything we do, the adoption of object storage systems has increased. It’s common in data centers and popular cloud-based platforms, such as Google cloud storage or Amazon cloud storage, and has become the de facto standard in several enterprise use cases.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is Object Storage?</span>\r\nIn the modern world of cloud computing, object storage is the storage and retrieval of unstructured blobs of data and metadata using an HTTP API. Instead of breaking files down into blocks to store it on disk using a file system, we deal with whole objects stored over the network. These objects could be an image file, logs, HTML files, or any self-contained blob of bytes. They are unstructured because there is no specific schema or format they need to follow.<br />Object storage took off because it greatly simplified the developer experience. Because the API consists of standard HTTP requests, libraries were quickly developed for most programming languages. Saving a blob of data became as easy as an HTTP PUT request to the object store. Retrieving the file and metadata is a normal GET request. Further, most object storage services can also serve the files publicly to your users, removing the need to maintain a web server to host static assets.\r\nOn top of that, object storage services charge only for the storage space you use (some also charge per HTTP request, and for transfer bandwidth). This is a boon for small developers, who can get world-class storage and hosting of assets at costs that scale with use.\r\n<span style=\"font-weight: bold;\">What are the advantages of object storage?</span>\r\n<ul><li>A simple HTTP API, with clients available for all major operating systems and programming languages</li><li>A cost structure that means you only pay for what you use</li><li>Built-in public serving of static assets means one less server for you to run yourself</li><li>Some object stores offer built-in CDN integration, which caches your assets around the globe to make downloads and page loads faster for your users</li><li>Optional versioning means you can retrieve old versions of objects to recover from accidental overwrites of data</li><li>Object storage services can easily scale from modest needs to really intense use-cases without the developer having to launch more resources or rearchitect to handle the load</li><li>Using an object storage service means you don’t have to maintain hard drives and RAID arrays, as that’s handled by the service provider</li><li>Being able to store chunks of metadata alongside your data blob can further simplify your application architecture</li></ul>\r\n<span style=\"font-weight: bold;\">What are the disadvantages of object storage?</span>\r\n<ul><li>You can’t use object storage services to back a traditional database, due to the high latency of such services</li><li>Object storage doesn’t allow you to alter just a piece of a data blob, you must read and write an entire object at once. This has some performance implications. For instance, on a file system, you can easily append a single line to the end of a log file. On an object storage system, you’d need to retrieve the object, add the new line, and write the entire object back. This makes object storage less ideal for data that changes very frequently</li><li>Operating systems can’t easily mount an object store like a normal disk. There are some clients and adapters to help with this, but in general, using and browsing an object store is not as simple as flipping through directories in a file browser</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/jhghj.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":823,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Integrated_System_PRIMEFLEX_for_Storage_Spaces_Direct.png","logo":true,"scheme":false,"title":"FUJITSU Integrated System PRIMEFLEX for Storage Spaces Direct","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-integrated-system-primeflex-for-storage-spaces-direct","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"For a quick setup of a Microsoft-based hyper-converged IT infrastructure, Fujitsu offers with PRIMEFLEX for Storage Spaces Direct an integrated system including all hardware and software to simplify procurement and deployment of a Microsoft-based hyper-converged IT infrastructure. The solution leverages high performance and energy-efficient Fujitsu PRIMERGY standard x86 servers and software-defined server and storage technology integrated in Microsoft Windows Server 2016 to reduce complexity and TCO in data center infrastructure operations. In order to meet specific customer requirements, Fujitsu offers a range of validated server configurations including single point of contact for support. Customer benefits at a glance:\r\nFast time to production for your virtual infrastructure\r\nEasy to order, deploy, operate and scale\r\nHigh performance, availability and efficiency\r\nGrow as you go with no large upfront investments\r\nReduce storage costs, save floor space, power and cooling expenses\r\nSingle point of contact for support","shortDescription":"Fast track to your Microsoft hyper-converged IT infrastructure\r\nWhile converged infrastructure deployment models have greatly improved data center operations in the last couple of years, many organizations are now looking at hyper-converged infrastructures (HCI) as the next step forward by leveraging the software defined design principles to further streamline the convergence of infrastructure. These systems are designed to be simple, resilient, and agile in order for IT organizations to respond to the needs of their business through the ability to easily adapt their infrastructure to the actual demand.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FUJITSU Integrated System PRIMEFLEX for Storage Spaces Direct","keywords":"infrastructure, Fujitsu, contact, offers, integrated, including, server, storage","description":"For a quick setup of a Microsoft-based hyper-converged IT infrastructure, Fujitsu offers with PRIMEFLEX for Storage Spaces Direct an integrated system including all hardware and software to simplify procurement and deployment of a Microsoft-based hyper-converg","og:title":"FUJITSU Integrated System PRIMEFLEX for Storage Spaces Direct","og:description":"For a quick setup of a Microsoft-based hyper-converged IT infrastructure, Fujitsu offers with PRIMEFLEX for Storage Spaces Direct an integrated system including all hardware and software to simplify procurement and deployment of a Microsoft-based hyper-converg","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Integrated_System_PRIMEFLEX_for_Storage_Spaces_Direct.png"},"eventUrl":"","translationId":823,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1097,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Storage_ETERNUS_CS200c_S4.png","logo":true,"scheme":false,"title":"Fujitsu Storage ETERNUS CS200c S4","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-storage-eternus-cs200c-s4","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"<span style=\"font-weight: 700; \">Features<span style=\"white-space:pre\">\t</span>and Benefits:</span>\r\n<span style=\"font-weight: 700; \">Integrates correctly-sized system technology and leading data protection software </span>\r\nEasy and fast deployment, simple to purchase\r\nMaximizes resources\r\nBudget security\r\n<span style=\"font-weight: 700; \">Backup, archiving and deduplication capabilities </span><span style=\"font-weight: 700;\">within one appliance</span>\r\nManaging the complete data lifecycle efficiently\r\nReduces network requirements and storage costs\r\n<span style=\"font-weight: 700; \">Protects a wide range of applications, virtual and hyper-converged infrastructures with a single integrated solution</span>\r\nIncreases availability and recoverability meeting highest RTO/RPO demands\r\nCuts cost and downtime","shortDescription":"The FUJITSU Storage ETERNUS CS200c simplifies data protection and management in a single integrated solution for the digital world. Industry-leading software from Commvault is perfectly aligned with powerful Fujitsu system technology providing excellent features for business efficiency and continuity. The appliance addresses the challenges in protecting business applications, virtualized and hyper-converged environments and facilitates compliance with regulations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Storage ETERNUS CS200c S4","keywords":"data, range, wide, hyper-converged, virtual, applications, costs, Reduces","description":"<span style=\"font-weight: 700; \">Features<span style=\"white-space:pre\">\t</span>and Benefits:</span>\r\n<span style=\"font-weight: 700; \">Integrates correctly-sized system technology and leading data protection software </span>\r\nEasy and fast deployment, simp","og:title":"Fujitsu Storage ETERNUS CS200c S4","og:description":"<span style=\"font-weight: 700; \">Features<span style=\"white-space:pre\">\t</span>and Benefits:</span>\r\n<span style=\"font-weight: 700; \">Integrates correctly-sized system technology and leading data protection software </span>\r\nEasy and fast deployment, simp","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Storage_ETERNUS_CS200c_S4.png"},"eventUrl":"","translationId":1098,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":389,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg","logo":true,"scheme":false,"title":"FUJITSU Server PRIMERGY","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-server-primergy","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type of workload. This includes expandable PRIMERGY tower servers for remote and branch offices, versatile rack-mount servers, compact and scalable blade systems, as well as density-optimized scale-out servers. They convince by business proven quality with a wide range of innovations, highest efficiency cutting operational cost and complexity, and provide more agility in daily operations in order to turn IT faster into a business advantage. FUJITSU Server PRIMERGY RX rack systems are versatile rack-optimized servers providing best-inclass performance and energy efficiency, and thus form the “standard” in each data center. PRIMERGY RX servers deliver 20 years of development and production know-how resulting in extremely low failure rates below market average, and lead to continuous operations and outstanding hardware availability.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \"><br /></span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Blade Servers </span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">To stay competitive, your business needs an IT environment that drives success through cost reduction, maximum performance and enhanced agility. PRIMERGY Blade Servers help you achieve this for your midsize organization, branch office or large data center.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Rack Servers</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Simplified operation, enhanced quality and faster productive deployment thanks to our supply model and build-to-order process are the primary advantages of our PRIMERGY RX rack servers and can be integrated in PRIMECENTER racks with common infrastructure.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Tower Servers</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY TX tower servers provide SMEs and branch offices with the perfect combination of record-breaking performance, outstanding energy efficiency, rock-solid reliability and investment protection.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Scale out Servers</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">The PRIMERGY CX Cloud eXtension servers are Fujitsu´s platform for Cloud computing, HPC High Performance Computing, Service Provider and large scale-out computing server farms. They focus on providing large datacenters with massive scale-out x86 server power while at the same time delivering new datacenter economics for server density, energy consumption, heat optimization and lower overall operational costs.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Rack Technology</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">The 19-inch PRIMECENTER Racks are the basis for rack configurations, such as server, storage systems as well as operating controls, such as consoles, switches, power distribution units (PDUs) and uninteruptible power supplies (UPS).</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Energy Efficient</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Reduce the power consumption of your IT infrastructure</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Long Lifecycle (LLC) Versions</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu offers selected models as a long lifecycle version. With an extended availability of up to 5 years, optimized configurations are supported and guaranteed – including maintenance, service and spare part availability.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Server Virtualization</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">To provide you with an appropriate solution for any of your requirements Fujitsu cooperates closely with all market leaders regarding server virtualization.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu Server PRIMERGY - System Management</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Intelligent, easy-to-use system management. Enhance productivity with the Fujitsu Software ServerView Suite.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">PRIMERGY Operating Systems</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">This is the age of e-business: Digital infrastructures are increasingly becoming the indispensable backbone supporting worldwide eBusiness processes. To ensure reliability and high availability, Fujitsu provides you with computing systems one can trust!</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu x86 Server Benchmarks</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">We detail the results of standardized benchmarks run on the PRIMERGY server family and PRIMEQUEST 2000 family. These reports not only verify the superb performance of our PRIMERGY and PRIMEQUEST platforms, but can also help you select a specific server system and configuration.</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">Fujitsu Value Calculator App</span>\r\n<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px;\">The Fujitsu Value Calculator is a simple to use App which helps to pick out the business advantages of the Fujitsu hardware and to find a server or storage system that suits your personal requirements</span>\r\n","shortDescription":"FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type of workload.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FUJITSU Server PRIMERGY","keywords":"PRIMERGY, Fujitsu, server, servers, with, Server, your, Servers","description":"<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type ","og:title":"FUJITSU Server PRIMERGY","og:description":"<span style=\"font-family: Arial, Verdana, "Lucida Grande", sans-serif; font-size: 13px; \">FUJITSU Server PRIMERGY systems provide the most powerful and flexible data center solutions for companies of all sizes, across all industries and for any type ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg"},"eventUrl":"","translationId":389,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":390,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_ETERNUS_DX.png","logo":true,"scheme":false,"title":"Fujitsu Storage ETERNUS DX","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-storage-eternus-dx","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Combining leading performance architecture with automated quality of service management the Fujitsu Storage ETERNUS DX series aligns storage resources with business priorities, thus enabling higher system utilization and delivering increased system consolidation capabilities and a faster ROI. Unified scalable entry-level and midrange systems, a seamless family concept enabling system upgrades and ETERNUS SF, the unified management suite across the product line, reduce operational and migration costs. ETERNUS SF provides enterprise-class functionalities in the entry and midrange class and allows flexible disaster recovery and business continuity concepts for the different model sizes, thus decreasing investment costs.","shortDescription":"Fujitsu ETERNUS DX - Business-centric Storage","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Storage ETERNUS DX","keywords":"ETERNUS, system, enabling, business, Storage, midrange, Fujitsu, costs","description":"Combining leading performance architecture with automated quality of service management the Fujitsu Storage ETERNUS DX series aligns storage resources with business priorities, thus enabling higher system utilization and delivering increased system consolidati","og:title":"Fujitsu Storage ETERNUS DX","og:description":"Combining leading performance architecture with automated quality of service management the Fujitsu Storage ETERNUS DX series aligns storage resources with business priorities, thus enabling higher system utilization and delivering increased system consolidati","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_ETERNUS_DX.png"},"eventUrl":"","translationId":391,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":" Ready-made entry-level storage systems are often used in various solutions for the SMB segment: disk space consolidation, virtualization, various cluster solutions requiring shared block access.\r\nKey architecture features of most entry-level storage systems on the market:\r\n<ul><li>Use one or two hot-swap controllers that use disk sharing. The controller means a specialized server in a special form factor that provides storage operation (working with disks, servicing arrays and providing volumes to hosts, etc.).</li><li>The presence of two controllers provides an increase in the overall reliability of storage - the ability to avoid downtime during the planned shutdown or failure of one of the controllers) and additional scaling of performance when distributing volumes across different controllers. When using the write cache, its integrity is protected: power protection (regular battery or ionistors plus flash memory reset) and duplication of content between controllers.</li><li>The choice of host interfaces: 16 and 8 Gb FiberChannel, 1 and 10 Gb Ethernet (iSCSI, some models may have FCoE support), SAS. For some models, there are combined options, for example, FC + SAS.</li><li>It is possible to connect additional disk shelves (simple cases with SAS expanders) through the SAS interface. To increase the reliability of the connection, a 2-way connection can be applied (below is an example of one of the possible connection schemes).</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What Is Entry-Level Storage?</span>\r\nEntry-level flash storage is simple, smart, secure, affordable, high-performance data storage for enterprises to start small and grow with seamless cloud connectivity as business requirements increase.\r\nOrganizations large and small are navigating at a rapid pace of change in a data-driven economy. Delivering data simply, quickly, and cost-effectively is essential to driving business growth, and the hybrid cloud has emerged as the most efficient way to meet changing business needs. Every IT organization is trying to determine how to modernize with hybrid cloud, and all-flash storage systems are critical on-premises to speed up enterprise applications. However, small enterprises have continued to use hard disk storage systems because of the high cost of all-flash solutions.\r\nAn entry-level storage system offers compact, dense, cost-effective, and easy-to-use storage. These storage systems can be deployed in small offices, small enterprises, and remote locations to run both file and block workloads effectively and efficiently. A simple storage system should support multiple protocols, including FC, NFS, SMB/CIFS, iSCSI, and FCoE, to help customers consolidate multiple applications onto a single simple system. It must be easy to install and deploy, secure and provide flexibility to connect to the cloud.\r\nEntry-level flash storage systems help accelerate all applications, consolidate workloads with better user experience, more effective storage and offer the best value to the customer.\r\n<span style=\"font-weight: bold;\">What Are the Benefits of Entry-Level Storage?</span>\r\n The benefits of entry-level storage include:\r\n<ul><li>Improved user experience with fast, secure, and continuous access to data;</li><li>Improved storage efficiency;</li><li>Reduced cost through improved TCO;</li><li>Increased ability for IT to support new business opportunities by leveraging the latest technologies like artificial intelligence (AI), machine learning (ML), deep learning (DL), and cloud.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Entry_Level_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":710,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Noutbuki_Fujitsu_LIFEBOOK_U937.jpg","logo":true,"scheme":false,"title":"FUJITSU Notebook LIFEBOOK U937","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-notebook-lifebook-u937","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Features and Benefits\r\nWindows\r\nWindows 10 Pro. Fujitsu recommends Windows 10 Pro.\r\n\r\nEasy integration into customers’ existing infrastructure\r\nOutstanding ultra-slim and robust design \r\nA remarkably slim 15.5mm notebook weighing only 920g with a robust magnesium housing\r\nThe best viewing experience is guaranteed by an anti-glare 13.3-inch FHD (1920 x 1080) display, optionally with glare touch\r\n\r\nExtraordinarily lightweight design for business professionals who are always on the move\r\nUltimate security features\r\nEmbedded palm vein or fingerprint sensor, SmartCard reader, TPM 2.0\r\n\r\nProtect your notebook and business data from unauthorized access at all times\r\nExcellent connectivity\r\nFull set of interfaces with a full-sized HDMI, full-sized LAN connector and USB Type-C\r\nEmbedded WLAN, Bluetooth, optional 4G/LTE and DDR4 memory technology up to 20 GB\r\n\r\nBe flexible and stay productive in a hyper-connected world\r\nConvenient mobility on the go\r\nAll-day battery runtime offers you exceptional mobility that you need when on the move\r\nAnytime USB Charge functionality to charge telephones and other media devices even when the system is turned off\r\nPowerful performance, thanks to integrated SSDs, helps process data faster","shortDescription":"Fujitsu LIFEBOOK U937 with extraordinarily light design, weighing only 920g and an all-day battery runtime, the Fujitsu Notebook LIFEBOOK U937 is an ultra-mobile notebook for business professionals who are always on the move. The solid magnesium housing ensures durability while security features such as the integrated palm vein sensor keep your business data protected. The powerful performance and the optional embedded 4G/LTE provide you with best-in-class user experience.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"FUJITSU Notebook LIFEBOOK U937","keywords":"Windows, with, robust, design, Embedded, when, business, move","description":"Features and Benefits\r\nWindows\r\nWindows 10 Pro. Fujitsu recommends Windows 10 Pro.\r\n\r\nEasy integration into customers’ existing infrastructure\r\nOutstanding ultra-slim and robust design \r\nA remarkably slim 15.5mm notebook weighing only 920g with a robust m","og:title":"FUJITSU Notebook LIFEBOOK U937","og:description":"Features and Benefits\r\nWindows\r\nWindows 10 Pro. Fujitsu recommends Windows 10 Pro.\r\n\r\nEasy integration into customers’ existing infrastructure\r\nOutstanding ultra-slim and robust design \r\nA remarkably slim 15.5mm notebook weighing only 920g with a robust m","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Noutbuki_Fujitsu_LIFEBOOK_U937.jpg"},"eventUrl":"","translationId":711,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":204,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Servery_Fujitsu_PRIMEQUEST.png","logo":true,"scheme":false,"title":"Fujitsu Server PRIMEQUEST","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-server-primequest","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Combining the power of Intel® Xeon® E7 family processors, the standard specifications of Microsoft Windows and Linux operating systems and the wealth of market solutions with innovative fault immune system architecture for highest availability and business continuity, Fujitsu Server PRIMEQUEST systems provide a new operational efficiency for business critical computing with truly open standards. \r\n\r\nThe Fujitsu Server PRIMEQUEST 2800B is the successor of the PRIMERGY RX900 S2, offering an unprecedented performance and memory capacity combined with high reliability thanks to built-in advanced RAS features for advanced error circumvention. This makes it ideal for big data applications and in-memory solutions like SAP HANA. \r\nIn addition, the Fujitsu Server PRIMEQUEST 2400E and 2800E feature self-healing capabilities and unique features such as Dynamic Reconfiguration which result in outstanding platform reliability, best availability and serviceability. The Dynamic Reconfiguration feature allows the changes of resources while systems are still up and running. Isolated physical partitions enable high availability, where any hardware failures do not have an impact on other partitions. In the unlikely event of a failure, the affected system board can be automatically replaced by a reserved system board and thus instantly recover applications and services.","shortDescription":"Fujitsu Server PRIMEQUEST systems provide a new operational efficiency for business critical computing with truly open standards.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Server PRIMEQUEST","keywords":"Fujitsu, PRIMEQUEST, Server, availability, systems, with, system, advanced","description":"Combining the power of Intel® Xeon® E7 family processors, the standard specifications of Microsoft Windows and Linux operating systems and the wealth of market solutions with innovative fault immune system architecture for highest availability and business con","og:title":"Fujitsu Server PRIMEQUEST","og:description":"Combining the power of Intel® Xeon® E7 family processors, the standard specifications of Microsoft Windows and Linux operating systems and the wealth of market solutions with innovative fault immune system architecture for highest availability and business con","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Servery_Fujitsu_PRIMEQUEST.png"},"eventUrl":"","translationId":204,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":976,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_PalmSecure_ID_Login.jpg","logo":true,"scheme":false,"title":"Fujitsu PalmSecure ID Login","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-palmsecure-id-login","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Do you want to experience the power of biometric enhanced Active Directory? If you are already working with Fujitsu devices with built-in palm vein sensors, this is easy. Download evaluation package \r\nDownload the software, install and configure and experience the power of biometric authentication. The evaluation package comes with three user licenses. Installation and connection to Active Directory require administration rights and should be taken care of by the IT department. Find links to software and detailed instructions in the download section below.\r\n<span style=\"font-weight: bold;\">Benefits of PalmSecure ID Login</span>\r\nImproved security by biometric technology with highest accuracy\r\nFast enrollment and verification process\r\nEasy-to-use, touchless and hygienic – ensures highest user acceptance","shortDescription":"FUJITSU PalmSecure ID Login enhances password-based Active Directory login network wide with biometric technology. PalmSecure, Fujitsu’s contactless palm vein pattern recognition technology accurately identifies individuals by scanning the complex vein pattern in the palm of the hand. Instead of common credentials like user names and passwords Fujitsu PalmSecure ID Login offers centralized biometric user authentication with Active Directory support. All biometric palm vein data is managed and stored centrally in the Active Directory service. Once users are enrolled they log in to the system by providing user name and scanning the palm vein pattern of their hand at any device within the Active Directory environment.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu PalmSecure ID Login","keywords":"with, biometric, Fujitsu, Directory, user, Download, PalmSecure, evaluation","description":"Do you want to experience the power of biometric enhanced Active Directory? If you are already working with Fujitsu devices with built-in palm vein sensors, this is easy. Download evaluation package \r\nDownload the software, install and configure and exper","og:title":"Fujitsu PalmSecure ID Login","og:description":"Do you want to experience the power of biometric enhanced Active Directory? If you are already working with Fujitsu devices with built-in palm vein sensors, this is easy. Download evaluation package \r\nDownload the software, install and configure and exper","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_PalmSecure_ID_Login.jpg"},"eventUrl":"","translationId":977,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":725,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_Identity_as_a_Service__IDaaS_.gif","logo":true,"scheme":false,"title":"Fujitsu Identity as a Service (IDaaS)","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-identity-as-a-service-idaas","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Users have dozens if not hundreds of usernames and passwords for on-premise systems and cloud services and in many cases utilize various identity management systems. \r\nFujitsu Identity as a Service provides users with access to systems, applications, data and resources. It ensures convenient access to resources in heterogeneous IT environments and ensures that all compliance requirements are fulfilled. With Fujitsu Identity as a Service, your organization’s passwords and identities are safe and under control. \r\nFujitsu Identity as a Service provides end-to-end identity management and comprises\r\nSelf-service interfaces allow users to manage, create, adjust and remove permissions, procedures for approval of permissions are included in the service\r\nAuthentication with multiple methods, including strong authentication methods like biometric identity and access management\r\nSingle sign-on capabilities which will facilitate users’ daily work and reduce the efforts for the administration of user accounts\r\nFujitsu Identity as a Service supports open interfaces and standards, e.g. single sign-on utilizes federation standards like Security Assertion Markup Language (SAML) and Web Services Federation (WS-Federation) and highest scalability which e.g. allows the inclusion of different user groups, such as partners and customers and thus supports entire ecosystems across organizational borders. Benefits\r\nIncreased user satisfaction – with single sign-on, fast and easy login to different systems\r\nCost savings – as automation and self-service capabilities reduce manual and time consuming support efforts\r\nIncreased level of security as Identity as a Service allows the execution of strict information security policies and provides real-time monitoring and reporting of permissions and usage","shortDescription":"Fujitsu Identity as a Service (IDaaS) provides users with access to systems, applications, data and resources. It ensures convenient access to resources in heterogeneous IT environments and ensures that all compliance requirements are fulfilled. With Fujitsu Identity as a Service, your organization’s passwords and identities are safe and under control. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Identity as a Service (IDaaS)","keywords":"Service, Identity, Fujitsu, systems, sign-on, provides, identity, user","description":"Users have dozens if not hundreds of usernames and passwords for on-premise systems and cloud services and in many cases utilize various identity management systems. \r\nFujitsu Identity as a Service provides users with access to systems, applications, data","og:title":"Fujitsu Identity as a Service (IDaaS)","og:description":"Users have dozens if not hundreds of usernames and passwords for on-premise systems and cloud services and in many cases utilize various identity management systems. \r\nFujitsu Identity as a Service provides users with access to systems, applications, data","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Fujitsu_Identity_as_a_Service__IDaaS_.gif"},"eventUrl":"","translationId":726,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2039,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg","logo":true,"scheme":false,"title":"Fujitsu Server Primergy RX","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":13,"alias":"fujitsu-server-primergy-rx","companyTitle":"Fujitsu","companyTypes":["vendor"],"companyId":2750,"companyAlias":"fujitsu","description":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.\r\nPrimergy RX servers deliver approximately 20 years of development and production know-how resulting in extremely low failure rates below market average, and leading to continuous operations and outstanding hardware availability.\r\nThe proven data centre technology of Primergy RX rack servers ensures carefree and continuous operation. Top performance and a long operating life are certain thanks to the latest processor technology and innovative "cool-safe" air flow cooling concept.\r\n<span style=\"font-weight: bold;\"> The product line of Primergy RX includes:</span>\r\n<span style=\"font-weight: bold;\">Primergy RX2510 M2.</span> The server is a dual-socket rack server optimized to meet demanding requirements of service providers and hosters. Balanced dual-socket Intel Xeon E5-2600 v4 family processor performance, easy manageability and top energy efficiency ensure cost-efficient operation. The 1U small-size housing delivers optimal density for large scale-out installations including up to 384 GB DDR4 memory meet demands emerging in the field of web hosting, managed CRM services, shared, managed or private cloud environments, or other XaaS solutions.\r\n<span style=\"font-weight: bold;\">Primergy RX2520 M1.</span> It is an efficient and scalable platform featuring the latest Intel Xeon processor E5-2400 v2 product family and up to 192 GB RAM. Its compact Primergy 2U modular chassis provides up to twelve 3.5-inch or sixteen 2.5-inch storage drives. Lower costs are ensured thanks to modular upgrade options, 96 % efficient power supply and the enhanced iRMC S4 management.\r\n<span style=\"font-weight: bold;\">Primergy RX2530 M1.</span> The server is a dual-socket rack server that provides high performance of the new Intel Xeon processor E5-2600 v3 product family, expandability of up to 1536 GB of DDR4 memory and up to 10x 2.5-inch storage devices - all in a 1U space saving housing. Accordingly, the Primergy RX2530 M1 is the optimal system for virtualization and scale-out scenarios, small databases and also for high performance computing.\r\n<span style=\"font-weight: bold;\">Primergy RX2530 M2.</span> The server is a dual-socket rack server that provides high performance of the new Intel Xeon processor E5-2600 v4 product family, expandability of up to 1536 GB (3TB release planned for end 2016) of DDR4 memory and up to 10x 2.5-inch storage devices - all in a 1U space saving housing. Accordingly, the Primergy RX2530 M2 is the optimal system for virtualization and scale-out scenarios, small databases and also for high performance computing.\r\n<span style=\"font-weight: bold;\">Primergy RX2540 M1.</span> The server is a dual-socket rack server that provides high performance of the new Intel Xeon processor E5-2600 v4 product family, expandability of up to 1536 GB (3TB release planned for end 2016) of DDR4 memory and up to 10x 2.5-inch storage devices - all in a 1U space saving housing. Accordingly, the Primergy RX2530 M2 is the optimal system for virtualization and scale-out scenarios, small databases and also for high performance computing.\r\n<span style=\"font-weight: bold;\">Primergy RX2540 M2.</span> The server is the new 2U dual socket rack server for high usability, scalability and cost-efficiency. Its Intel Xeon E5-2600 v4 processors in conjunction with DDR4 memory technology with up to 1.5 TB (3TB release planned for end 2016) increases performance to meet the requirements for data center processing, enterprise applications as well as collaboration. The modular design offers excellent expandability of up to 24 disk drives, up to 8 PCIe Gen3 expansion cards, and best-in-class energy efficiency thanks to two hot-plug power supplies with up to 96% efficiency meet the future demands of data growth. To complete the picture, DynamicLoM makes network connections more flexible and ready for future modifications. Operation in higher ambient temperatures is ensured by the Cool-safe® Advanced Thermal Design resulting in lower OPEX.\r\n<span style=\"font-weight: bold;\">Primergy RX2560 M2.</span> The server offers maximum performance, best expandability and highest availability without any compromises. Branches, data centers and SMEs value the performance of the two Intel Xeon E5 v4 processors and 1536 GB (3TB release planned for end 2016) DDR4 memory support. Up to 10 extension slots and the redundant power supply enable top availability levels and excellent expandability options. The server is thus ideal for computing-intensive applications, virtualization solutions and databases.\r\n<span style=\"font-weight: bold;\">Primergy RX4770 M2.</span> The server defines four-socket rack server technology without compromising performance, scalability, and expandability. Featuring the latest Intel Xeon processor E7-4800/8800 v3 product family with up to 72 cores as well as superfast DDR4 main memory, the Primergy RX4770 M2 fulfills the requirements of solutions operating ‘in-memory’ such as SAP HANA. It is ideal for virtualization, server consolidation, databases, business processing, and general 4-socket data-intensive applications where price/performance and highest realibility is paramount.\r\n<span style=\"font-weight: bold;\">Primergy RX4770 M3.</span> The server defines four-socket rack server technology without compromising performance, scalability, and expandability. Featuring the latest Intel Xeon processor E7-4800/8800 v4 product family with up to 24 cores as well as superfast DDR4 main memory, the Primergy RX4770 M3 fulfills the requirements of solutions operating ‘in-memory’ such as SAP HANA. It is ideal for virtualization, server consolidation, databases, business processing, and general 4-socket data-intensive applications where price/performance and highest realibility is paramount.","shortDescription":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fujitsu Server Primergy RX","keywords":"","description":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.\r\nPrimergy RX servers deliver approximately 20 years of development and prod","og:title":"Fujitsu Server Primergy RX","og:description":"Fujitsu server Primergy RX rack systems are versatile rack-optimized servers providing best-in-class performance and energy efficiency, and thus form the “standard” in each datacenter.\r\nPrimergy RX servers deliver approximately 20 years of development and prod","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FUJITSU_Server_PRIMERGY.jpg"},"eventUrl":"","translationId":2040,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":62,"title":"Rack server"}],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":{"levels":[{"id":265,"level":"SELECT Registered"},{"id":266,"level":"SELECT Expert"},{"id":267,"level":"Distributor"}],"partnerDiscounts":{"SELECT Registered":"","SELECT Expert":"","Distributor":""},"registeredDiscounts":{"SELECT Registered":"","SELECT Expert":"","Distributor":""},"additionalBenefits":[],"salesPlan":{"SELECT Registered":"","SELECT Expert":"","Distributor":""},"additionalRequirements":[]}}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}