Category: IT Infrastructure

Dell builds PCs reusing plastics from recycled electronics helping drive a circular economy for the IT industry

We build solutions that empower our customers to solve complex business problems without having to worry about environmental impact. By designing products with a precautionary approach to materials and a focus on energy efficiency, we make it easier for our customers to be green. When a customer does business with Dell they know that the product will be responsibly recycled through our industry leading recycling programs.

Read the source article at Home – Dell Community

Do Networks Mimic Mother Nature?

Cycles are a natural phenomenon and, as humans, we are part of the natural world so it’s unsurprising that so much of what we do is cyclic. Nothing demonstrates this more vividly in our working lives that our desire to do things better.  

Read the source article at J-Net Community – J-Net Community

New Veeam Availability Suite Combines Backup, Monitoring

The introduction of the Veeam Availability Suite, which integrates Veeam’s backup and recovery software with its monitoring and reporting software, is part of a move by Veeam to play a bigger role in the modern data center, said CEO Ratmir Timashev.

Read the source article at

Networking for Converged Infrastructure – EnterpriseNetworkingPlanet (blog)

Converged infrastructure (CI) sounds like a data center manager’s dream. Rather than provisioning, configuring and integrating individual components into a working environment, CI allows you to simply plug boxes into one another Lego®-style. At least, that’s the dream.

Read the source article at Enterprise Networking Planet

Data Center Security Lessons from Heartbleed and Target

Winston Saunders has worked at Intel for nearly two decades and currently works on making the data center more secure and efficient. Winston is a graduate of UC Berkeley and the University of Washington. You can find him online at “Winston on Energy” on Twitter

Read the source article at Data Center Knowledge

Virtualization—Good Practices for SMBs by Matt Smith

Looking for a way to save money and make your business more efficient? Virtualization can help you with both of those goals. Here’s a look at some of the benefits and best practices:

Take Advantage of the IT You Already Own

Virtualization can help you get more out of the IT infrastructure you have right now. Instead of the standard one-to-one relationship between servers and applications, virtualization allows you to consolidate multiple server tasks onto one machine.

Read the source article at Green Data Center News

DCIM News from Data Center World

Data Center Infrastructure Management vendors continued the race to add features and functionality to their software with a number of announcements at last week’s Data Center World conference in Las Vegas. Companies added to what their solutions can do by both building new features themselves and integrating with partners.

Read the source article at Data Center Knowledge

Securing a Hybrid Infrastructure

Cloud services have provided a solid alternative for enterprises to consume IT services, but most organisations use a hybrid cloud that combines private infrastructure with specific external cloud services.

Read the source article at J-Net Community – J-Net Community

Guest Users : Friend or Foe to your network?

The question asked then and now is still:  When is a visitor or contractor a threat, and what can be done to mitigate that threat?

It has become expected that organizations provide wireless networks for visitors and staff but increasingly questions are being asked about the threats posed by outsiders given access to wireless services and allowed beyond into an organization’s network. Aside from combating the obvious rogue element it is also important to remember that such users can have malicious effects without intending it, due to malware existing, unknown to them, on their machines.

Read the source article at J-Net Community – J-Net Community

How to measure security?

No one would pretend that an organization’s threats and the effectiveness of its security policy should not be measured and quantified. But what does that mean in reality?

Read the source article at J-Net Community – J-Net Community