Oracle Magazine May/June 2008 3
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cisco Unified Computing System Pricing
Data Center In A Box Event Management Size Matters Liquid delivers a total Prism provides high-end But there’s more package p.34 features on a budget p.39 to choosing hardware p.42 A SPECIAL ALL-DIGITAL ISSUE November 2009 Unified systems combine servers, networking, storage, and management and put IT back in control. p.12 Green Dreams High efficiency is good Sponsored by for business, provides stellar PR —and is within reach p.26 << Previous C Network For IT, By IT C Network CONTENTS For IT, By IT >> Network Computing’s second all-digital issue Cover Story NEXT-GEN DATA CENTER, DELIVERED The unified computing platforms of today promise to consolidate everything and anything into a single chassis. And the vendors with the biggest R&D budgets are succeeding at this task.p.12 ENERGY-EFFICIENT INSIGHTS DATA CENTERS News Bits And Bytes Was your data center designed HP trades punches with Cisco; Juniper in the last five years? If not, has a new software platform, hardware, it’s not as efficient as it could and partners; businesses stumble on be. Brush up on the basics encryption; Q&A with HP’s Paul Congdon.p.8 of effective designs.p.26 REVIEWS A True Data Center In A Box Early adopters of the LiquidIQ virtual server say it’s reduced setup and reconfigure time, and let them cut back on high-priced staff.p.34 EventTracker Adds Much-Needed Monitoring The latest version of Prism’s security incident and event management offering makes up for old shortcomings.p.39 2 November 2009 networkcomputing.com << Previous Next >> ENTS NetworkComputing.com AROUND THE WEB Open Source You Can Use Two ways to browse the Web, and one great way to find everything scattered across all your storage media. -
Magic Quadrant for Blade Servers
Magic Quadrant for Blade Servers Gartner RAS Core Research Note G00207244, Andrew Butler, George J. Weiss, 17 January 2011, V3RA4 01202012 This Magic Quadrant for Blade Servers focuses on a market that is growing in complexity and sophistication, due to the emergence of related form factors, such as skinless servers, and the fast-growing interest in cloud computing, virtual input/output and fabrics. WHAT YOU NEED TO KNOW Blades represent an important stage in the evolution of servers as separate, discrete platforms give way to modular designs, and the boundaries between servers, storage and networking become increasingly blurred. This creates an increasing overlap of functionality between product categories that were previously more clearly delineated. These boundaries will be further tested as fabric-based computing becomes more prevalent, and all blade servers are examples of a fabric-enabled architecture, due to the switch-based backplane or midplane that they exploit. Blades represent a more proprietary investment, due to the lack of hardware form factor interoperability standards and the growing dependence on proprietary management tools and virtual input/output (I/O) solutions. Due to their modular nature, blades offer compelling operational benefits, such as improved cabling, rapid hardware provisioning, high compute density, energy-efficient design and increasing management automation. However, blades deliver few, if any, incremental application benefits, compared with their rack- and tower-based peers. Blades are not the only choice for modular deployment; rack-optimized servers deliver some modularity benefits, and skinless servers now represent an even more extreme class of high-density deployment. Because many vendors position their blade and skinless servers as part of a standard “modular server” portfolio, the nascent market status of skinless servers is reflected in this year’s blade server Magic Quadrant. -
FOR IMMEDIATE RELEASE Liquid Computing Announces Liquidiq 3.0 Unified Computing System Powered by Intel® Xeon® 5500 Series
FOR IMMEDIATE RELEASE Liquid Computing Announces LiquidIQ 3.0 Unified Computing System Powered By Intel® Xeon® 5500 Series Processors Enables Customers to Rapidly Scale New Services, Efficiently Manage Quality of Service and Dramatically Lower Operating Costs Ottawa, Canada – March 30, 2009 – Liquid Computing, a leader in unified computing infrastructure for the dynamic data center, today announced the LiquidIQ 3.0 unified computing system powered by Intel Xeon 5500 Series Processors. The Intel Xeon 5500 Series Processor, also known by the code name “Nehalem”, takes the powerful performance, agility, and operational cost saving benefits of LiquidIQ to a new level, providing customers with even more horsepower and bandwidth to run either multi-tier, data intensive applications or virtualized applications while significantly decreasing power utilization and reducing space consumption by 50 percent. “Intel and Liquid Computing share a common goal of driving innovation to help data centers more effectively support business demands while reducing operating costs,” said Doug Cooper, country manager, Intel Canada. “Powered by the Intel Xeon Processor 5500 Series, LiquidIQ 3.0 achieves this goal in unified computing for data centers that support both virtualized and bare metal operations with significant leaps in performance, space utilization, and power efficiency.” The LiquidIQ unified computing platform is already in use in customer data centers today and provides total control over the delivery and quality of the on-demand business applications they manage, while at the same time significantly reducing data center operating costs. LiquidIQ is standards-based, certified to support major operating systems, and is the only unified computing system designed from the ground up to support applications running on bare-metal and those running within virtualized environments. -
Xerox Corporation 00-00-02
00-00-00 (hex) XEROX CORPORATION 00-00-01 (hex) XEROX CORPORATION 00-00-02 (hex) XEROX CORPORATION 00-00-03 (hex) XEROX CORPORATION 00-00-04 (hex) XEROX CORPORATION 00-00-05 (hex) XEROX CORPORATION 00-00-06 (hex) XEROX CORPORATION 00-00-07 (hex) XEROX CORPORATION 00-00-08 (hex) XEROX CORPORATION 00-00-09 (hex) XEROX CORPORATION 00-00-0A (hex) OMRON TATEISI ELECTRONICS CO. 00-00-0B (hex) MATRIX CORPORATION 00-00-0C (hex) CISCO SYSTEMS, INC. 00-00-0D (hex) FIBRONICS LTD. 00-00-0E (hex) FUJITSU LIMITED 00-00-0F (hex) NEXT, INC. 00-00-10 (hex) SYTEK INC. 00-00-11 (hex) NORMEREL SYSTEMES 00-00-12 (hex) INFORMATION TECHNOLOGY LIMITED 00-00-13 (hex) CAMEX 00-00-14 (hex) NETRONIX 00-00-15 (hex) DATAPOINT CORPORATION 00-00-16 (hex) DU PONT PIXEL SYSTEMS . 00-00-17 (hex) TEKELEC 00-00-18 (hex) WEBSTER COMPUTER CORPORATION 00-00-19 (hex) APPLIED DYNAMICS INTERNATIONAL 00-00-1A (hex) ADVANCED MICRO DEVICES 00-00-1B (hex) NOVELL INC. 00-00-1C (hex) BELL TECHNOLOGIES 00-00-1D (hex) CABLETRON SYSTEMS, INC. 00-00-1E (hex) TELSIST INDUSTRIA ELECTRONICA 00-00-1F (hex) Telco Systems, Inc. 00-00-20 (hex) DATAINDUSTRIER DIAB AB 00-00-21 (hex) SUREMAN COMP. & COMMUN. CORP. 00-00-22 (hex) VISUAL TECHNOLOGY INC. 00-00-23 (hex) ABB INDUSTRIAL SYSTEMS AB 00-00-24 (hex) CONNECT AS 00-00-25 (hex) RAMTEK CORP. 00-00-26 (hex) SHA-KEN CO., LTD. 00-00-27 (hex) JAPAN RADIO COMPANY 00-00-28 (hex) PRODIGY SYSTEMS CORPORATION 00-00-29 (hex) IMC NETWORKS CORP. -
SURVEY in Pursuit of Petascale Computing
SURVEY In Pursuit of Petascale Computing: Initiatives Around the World Steve Conway Earl Joseph, Ph.D. Jie Wu Daniel Lee Richard Walsh Lloyd Cohen Charlie Hayes IDC OPINION The high-end high-performance computing (HPC) community has a penchant for marching toward milestones — the first sustained gigaflop (circa 1989), the first sustained teraflop (circa 1998), and now the first sustained petaflop. The pursuit of each milestone has led to important breakthroughs in science and engineering. Today, leading HPC sites have begun to identify applications that will benefit from petascale performance. Governments around the world, in partnership with HPC vendors, have launched initiatives to support the development and deployment of petascale systems. Much has already been written and spoken about the challenges and benefits of petascale computing; meanwhile, the U.S. Department of Energy, its labs, and DARPA are actively exploring requirements for the next milestone — exascale computing. Highlights of our analysis are as follows: The petascale era will arrive in stages — peak petaflop systems (late 2007– 2010), Linpack petaflops, sustained petaflops on "embarrassingly parallel" applications and, finally, sustained petaflops on challenging applications. Gone is the era when only the United States and Japan had the wherewithal to develop and deploy the highest-performing class of HPC systems. Petascale initiatives also exist in Europe and China — although the U.S. and Japanese initiatives are the most fully conceived and may still be the highest performers. Petascale architectures will range from ultralarge clusters to "hybrid" designs that aim to deliver more performance by coupling together (loosely or tightly) multiple processor types via high-bandwidth interconnects. -
Forecast: Cloud Computing Looms Big on the Horizon
CIO Focus Executive guides for strategic decision making Forecast: Cloud Computing Looms Big on the Horizon TABLE OF CONTENTS INTRODUctiON OVERVIEW 3 | QuickStudy: Cloud Computing 4 | What Cloud Computing Really Means PUTTING IT TO WORK 6 | Cloud Computing: Tales from the Front 8 | Capex vs. Opex 9 | Cloud Computing: Don’t Get Caught Without An Exit Strategy 12 | Early Experiments in Cloud Computing 14 | Cloud Computing: What UC Berkeley Can Teach You RISK/REWARD 17 | The Dangers of Cloud Computing 18 | Cloud Computing Survey SPONSORED BY http://vmware.com INTRODUCTION Forecast: Cloud Computing Looms Big on the Horizon “Cloud computing” is basically the latest incarnation of grid computing, util- ity computing, virtualization and clustering. It differs in that it provides the ability to connect to software and data living on the Internet (the cloud) instead of on a hard drive or local network. Since IT is always on the lookout for new and better ways to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software, cloud computing holds much promise. It is, however, still in a nascent stage, and it behooves IT management to look closely and carefully at what’s involved and whether or not the concept is a workable one for the company. What follows is a compendium of articles about cloud computing in which we explore the current state of the art, early adopters, the economics, the potential pitfalls and what you can do to avoid them, and what IT leaders are saying about the concept. -
Managing Virtual Server Environments Analytics Report
April 2008 The New Sprawl: Managing Virtual Server Environments Analytics Report Even as virtualization succeeds in limiting the number of physical servers in the data center, rampant VM growth is threatening to turn back our hard-won gains. The answer is strong management, but where to find it? By Joe Hernick InformationWeek Analytics Reports InformationWeek Analytics | Managing Virtualization 2 TABLE OF CONTENTS 4 Author’s Bio 5 Executive Summary 6 Research Synopsis 7 The New Sprawl: Managing Virtual Server Environments 8 Too Much Too Fast: State Of VM Deployments 9 Open Field: Heterogeneity In The Virtual Data Center 11 “VMotion Sickness:” A New Malady 12 Managing Your VMs 13 Inhibitors: Some Are Still Wary 14 Economics Of Virtualization 16 No Way To Treat An Infrastructure 19 What You Can Do Now: Constructive Steps 20 What’s Here Now: The Outlook For Tools Month 2008 © 2008 InformationWeek, Reproduction Prohibited InformationWeek Analytics | Managing Virtualization 3 TABLE OF FIGURES 7 Figure 1: Virtualization Hosts In Production 7 Figure 2: Virtualized Servers In Production 8 Figure 3: Primary Server Virtualization Platform 9 Figure 4: Server Virtualization Platforms by 2009 10 Figure 5: Usage Of VM Mobility Tools 11 Figure 6: Percentage Of Servers Virtualized By 2010 13 Figure 7: Usage Of A Structured Migration Plan 14 Figure 8: Most Important Virtualization Management Funtionality 16 Figure 9: Current Virtualization Management Method 17 Figure 10: Projected Budget For Virtualization Management Tools, 2009 18 Figure 11: Top Virtualization Drivers Month 2008 © 2008 InformationWeek, Reproduction Prohibited InformationWeek Analytics | Managing Virtualization 4 Joe Hernick has covered virtualization, storage, operating sys- tems, voice, and other topics for InformationWeek, Network Computing, and other publications for seven years. -
The Cisco UCS Is the Shape of Servers to Come. Something Like the Cisco UCS Is Simply a Logical Outcome When You Start Designing Servers with a Clean Sheet of Paper
Innovate Cisco UCS Acceleration Initiative We're not just making servers, we're making server history. UCS Wins, Success Stories and Analyst Reports 2H FY 2011 Table of Contents What Customers Say Construction Tutor Perini Education Seattle University Enterprise Cisco Media Solutions Group Financial Services Winterood Securities Healthcare Moses Cone Health System NightHawk Radiology Services IT Services Alphawest Services Pty Ltd Dimension Data ECKD GmbH LaSalle Solutions Westcon Group, Inc Public Sector Taser Virtual Systems Service Provider Parentix PiNS What Analysts Say Gartner IDC EMA Current Analysis Yankee Group Forrester For more information and the latest updates, visit: http://www.cisco.com/go/ucs Customer Case Study Construction Company Changes Data Center Economics Tutor Perini Corporation built its new data center with Unified Computing System, reducing device count by 60 percent. EXECUTIVE SUMMARY TUTOR PERINI CORPORATION ● Construction ● Sylmar, California USA ● 7000 Employees CHALLENGE ● Reduce data center operating costs ● Simplify management ● Ensure application availability SOLUTION ● Consolidated servers, switches, and storage access from multiple data centers onto a single Cisco Unified Computing System ● Engaged Cisco Advanced Services for planning and deployment RESULTS ● Reduced device count by 60 percent ● Reduced power consumption by 38 percent ● Minimized thin client costs by supporting up to 30 users per server Challenge Tutor Perini Corporation is a leading civil and building construction company offering diversified general contracting and design/build services to private clients and public agencies throughout the world. Its services include general contracting, pre-construction planning, and comprehensive project management. Tutor Perini also offers self-performed construction services, including excavation, concrete forming and placement, steel erection, electrical and mechanical services, plumbing, and HVAC. -
Magdeburger Journal Zur Sicherheitsforschung
Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: 2192-4260 Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences“. Edited by Stefan Schumacher and René Pfeiffer The Compromised Devices of the Carna Botnet As used for the Internet Census 2012 Parth Shukla This article will showcase the latest analysis and the progress of industry collaboration on the problem of Internet facing devices that have default credential logins through telnet. The Carna Botnet, which was used to perform the first-ever map of the Internet – Internet Census 2012 – highlighted a major information security concern with devices that allow default credential login from the Internet by default. For more information on the Internet Census 2012, please refer to the anonymous researcher’s paper. A complete list of compromised devices that formed part of the Carna Botnet was obtained exclusively by Parth Shukla. This list is NOT publicly available from any source. This data was acquired directly from the anonymous researcher who performed the Internet Census. As confirmed by the researcher, AusCERT to date remains the only organization and researcher in the world that has the complete dataset. Relevant snippets of this data, however, have been provided to CERTs around the world in order to reduce the threat made explicit by the Carna Botnet. This article will provide a detailed analysis of all the different identifying information for each of the com- promised devices that formed part of the Botnet. This detailed analysis will showcase the prevalence of easily- exploitable devices in different countries, regions and in different manufacturers.