IMPORTANT: HOW to USE THIS LIST Asset Code Belongs to Type, and Type Belongs to Group to Create a Hierarchy

Total Page:16

File Type:pdf, Size:1020Kb

IMPORTANT: HOW to USE THIS LIST Asset Code Belongs to Type, and Type Belongs to Group to Create a Hierarchy VERSION 2013-11-27 Group, Type and Asset Code List IMPORTANT: HOW TO USE THIS LIST Asset code belongs to Type, and Type belongs to Group to create a hierarchy. Do not mix codes from different rows. They will fail to load and will be returned to you for corrections. Although we historically called it a "Code" it's actually an asset class or category. The value from column F below is the only value you should put in the "Asset Code" column in your report. Always be sure to work with the most recent version of the code list. The codes can be downloaded from http://aset.azdoa.gov/planning-and-strategy-applications. If you are using a PDF version of this list we strongly recommend that you download the Excel file from the above web page and work from that instead. Use the filters to help find the codes you need. You can filter the list by clicking on the list box control at the top of each column and check the items you want to see. Telecommunications items in Gray are being replaced. You can still use them if necessary however it is preferable to use the appropriate Type and Code under Network Hardware for network equipment or Storage for SAN switches. If the product is not on the list check the newest codes first for one of the new generic categories that best describes the product. All codes added in 2013 are highlighted and can be easily filtered using the filter controls. If you still need a code added contact Raj Kollengode ([email protected]) for assistance. Please do not make up your own codes. Spelling mistakes and typos will fail to match and will be returned to you for corrections. Please be accurate. Excessive use of "Other" will be returned for corrections. Please take the time to find the best match for your assets without Group Type Code Description Date Added End User Device Camera Camera 11/19/2013 End User Device Copier A551 End User Device Copier Copier 11/18/2013 End User Device Copier IC430 End User Device Copier Mf7470 End User Device Copier MPC7501sp End User Device Copier V9955DP End User Device FAX MACHINE 710 End User Device FAX MACHINE 720 End User Device FAX MACHINE 3651 End User Device FAX MACHINE 3699 End User Device FAX MACHINE 4100e End User Device FAX MACHINE 5510NF End User Device FAX MACHINE Fax 11/19/2013 End User Device FAX MACHINE MP161SPF End User Device FAX MACHINE UF-770 End User Device FAX MACHINE UF-885 End User Device FAX MACHINE UF-890 End User Device Handheld Field PC Field PC Group Type Code Description Date Added End User Device Laptop 1014 End User Device Laptop 1041 End User Device Laptop 1545 End User Device Laptop 7400 End User Device Laptop 486 or Older End User Device Laptop AlphaSmart End User Device Laptop AMD End User Device Laptop Atom End User Device Laptop C840 End User Device Laptop Celeron End User Device Laptop Centrino End User Device Laptop Core 2 Duo 10/9/2013 End User Device Laptop Core i3 9/27/2013 End User Device Laptop Core i5 9/27/2013 End User Device Laptop Core i7 9/27/2013 End User Device Laptop Core vPro End User Device Laptop Cyrix End User Device Laptop D410 End User Device Laptop D420 End User Device Laptop D800 End User Device Laptop D810 End User Device Laptop D820 End User Device Laptop D830 End User Device Laptop Docking Station End User Device Laptop Dual core End User Device Laptop E500 End User Device Laptop Elitebook End User Device Laptop HP 8440p End User Device Laptop HP 8460w End User Device Laptop Itanium End User Device Laptop M90 End User Device Laptop NB3015 End User Device Laptop NB4015 End User Device Laptop PCD-V505BXP End User Device Laptop PCG-V505BXP End User Device Laptop Pentium End User Device Laptop Pentium 4 End User Device Laptop Pentium 7 End User Device Laptop Pentium D End User Device Laptop Pentium II End User Device Laptop Pentium III End User Device Laptop Pentium M End User Device Laptop Port Replicator End User Device Laptop Quad core End User Device Laptop Tablet End User Device Laptop Toughbook End User Device MAC Desktop End User Device MAC Laptop End User Device Mobile Charging station 11/6/2013 End User Device Mobile GPS 11/6/2013 End User Device Mobile Mobile broadband 11/18/2013 End User Device Mobile Tablet 10/4/2013 End User Device Monitor 1905FP 19IN End User Device Monitor 1907FP 19IN Group Type Code Description Date Added End User Device Monitor 1908FP 19IN End User Device Monitor 2001FP 20IN End User Device Monitor 2007FP 20IN End User Device Monitor 2405FP 24IN End User Device Monitor 2407FP 24IN End User Device Monitor 7V71 MGC-A710 17IN End User Device Monitor 900W 19IN End User Device Monitor A170E1-08 17IN End User Device Monitor A905 19IN End User Device Monitor C1025 21IN End User Device Monitor C1030 21IN End User Device Monitor E196FP 19IN End User Device Monitor E220 21IN End User Device Monitor E248WFP 24IN End User Device Monitor Flat Panel Monitor 10/7/2013 End User Device Monitor FPD1965 19IN End User Device Monitor FPD1975 19IN End User Device Monitor FPD1975W End User Device Monitor G810 21IN End User Device Monitor GS815 21IN End User Device Monitor lcd71v 17in End User Device Monitor Q71 17IN End User Device Monitor VD155E 17IN End User Device Monitor VD697E 17IN End User Device Monitor VE155 15IN End User Device Monitor VG900B 19IN End User Device Monitor VT-988D 19IN End User Device Multi-Function Device 1055 End User Device Multi-Function Device 9055 End User Device Multi-Function Device 9065 End User Device Multi-Function Device 3260C End User Device Multi-Function Device DOCSEND End User Device Multi-Function Device MP2851SP End User Device Multi-Function Device MP5500 End User Device Multi-Function Device MP6001 End User Device Multi-Function Device MP6100 End User Device Multi-Function Device MP7500 End User Device Multi-Function Device MPC2500 End User Device Multi-Function Device MPC3500 End User Device Multi-Function Device Multi-Function Device 10/8/2013 End User Device Net PC 486 or Older End User Device Net PC AMD End User Device Net PC Celeron End User Device Net PC Cyrix End User Device Net PC Itanium End User Device Net PC Pentium End User Device Net PC Pentium 4 End User Device Net PC Pentium 7 End User Device Net PC Pentium D End User Device Net PC Pentium II End User Device Net PC Pentium III End User Device Net PC Pentium Pro End User Device Net PC Thin Client End User Device Network Computer 486 or Older Group Type Code Description Date Added End User Device Network Computer AMD End User Device Network Computer Celeron End User Device Network Computer Cyrix End User Device Network Computer Dual Core End User Device Network Computer Itanium End User Device Network Computer Pentium End User Device Network Computer Pentium 4 End User Device Network Computer Pentium 7 End User Device Network Computer Pentium D End User Device Network Computer Pentium II End User Device Network Computer Pentium III End User Device Network Computer Pentium Pro End User Device Network Computer Quad Core End User Device Network Computer Thin Client End User Device PC 486 or Older End User Device PC AMD End User Device PC Celeron End User Device PC Core 2 Duo 10/9/2013 End User Device PC Core 2 Quad 11/15/2013 End User Device PC Core i3 11/6/2013 End User Device PC Core i5 End User Device PC Core i7 End User Device PC Cyrix End User Device PC Dual Core End User Device PC Itanium End User Device PC Pentium End User Device PC Pentium 4 End User Device PC Pentium 7 End User Device PC Pentium D End User Device PC Pentium II End User Device PC Pentium III End User Device PC Pentium M End User Device PC Pentium Pro End User Device PC Pentium V End User Device PC Pro V 11/15/2013 End User Device PC Quad Core End User Device PC Xeon End User Device PDA Blackberry End User Device PDA Imagio End User Device PDA iPAQ End User Device PDA Palm Pilot End User Device PDA Pocket PC End User Device PDA Treo End User Device PDA Trophy End User Device PDA Visor End User Device Plotter Plotter End User Device Printer 500 End User Device Printer 3130 End User Device Printer 3150 End User Device Printer 3450 End User Device Printer 2200D End User Device Printer 4050TN End User Device Printer 4100DTN End User Device Printer 4350N Group Type Code Description Date Added End User Device Printer 4500N End User Device Printer AP410N End User Device Printer Badge printer 11/27/2013 End User Device Printer C410DN End User Device Printer CL4000DN End User Device Printer Color Dot Matrix End User Device Printer Color Ink Jet End User Device Printer Color Laser End User Device Printer CP-X250 End User Device Printer Digital Color End User Device Printer Dot Matrix End User Device Printer i70 End User Device Printer Ink Jet End User Device Printer IR-110 End User Device Printer Label Maker End User Device Printer Laser End User Device Printer Multifunction End User Device Printer Photo 9/27/2013 End User Device Printer PT640DN End User Device Printer RIO 2E End User Device Printer Roll-fed wide-format photo 9/27/2013 End User Device Printer SP8100DN End User Device Printer SPC420DN End User Device Printer Wide-format photo 9/27/2013 End User Device Projector 821P End User Device Projector BoxLight End User Device Projector Casio End User Device Projector CP-X End User Device Projector CP-X250 End User Device Projector H-P End User Device Projector InFocus End User Device Projector LVP End User Device Projector Multimedia End User Device Projector NEC WXGA End User Device Projector PowerLite End User Device Projector Projector 11/19/2013 End User Device Projector Proxima End User Device Projector Sharp End User
Recommended publications
  • September 1, 2010, V. 2.0 Rm+Dw Page 1 of 45 Software Licensing
    For use by the OE IT Design Team only Software licensing Main questions Now ­ What licenses are held at which level? How much do they cost? ­ How do these costs compare with those that might be obtained by aggressive contract negotiation, perhaps for a larger number of seats? Going forward ­ What are the Best Practices re: software acquisition, software distribution, and contract management? ­ Where are there economies of scale? ­ What are the barriers to purchasing through negotiated agreements? Are there incentives? ­ What are the options – on campus, at other UCs, in the “cloud”? Our current campus services ­ what we do now Customer value/software license products ­ Standard desktop software, e.g., Microsoft Office Suite, Adobe Creative Suite ­ Operating systems for individual machines and servers ­ Utilities ­ Security ­ Specialized software o Cross­discipline, e.g., statistical packages o Discipline/activity­specific, e.g., CAD­CAM, fundraising Cost/price factors included in the negotiation/calculation ­ Type of licenses o New (purchase) o Renewal (maintenance) ­ License term o Annual renewal September 1, 2010, v. 2.0 rm+dw Page 1 of 45 o “License term” then renewal o “Perpetual” so no renewal ­ Media o Delivered through the Internet (most; saves 9.75% sales tax) o If hosted on campus, server and associated costs o Some require receiving a CD, DVD, or flashdrive because of the file size or problems with different operating systems ­ The target user o Server o Single­seat = one machine o Person = one person w/five machines needs only one license o “Knowledge worker” FTE ­ Operating system ­ Version of software ­ Demand/volume ­ Transaction/key management/convenience/forecasting demand/pre­sales consulting add­on o In­house, perhaps 30% (IST draft, August 2010) o Outsourced .
    [Show full text]
  • Identifying Common Reliability/Stability Problems Caused by File Fragmentation
    WHITE PAPER Identifying Common Reliability/Stability Problems Caused by File Fragmentation Think Faster.™ Visit us at Condusiv.com CT Reliability-Stability WP 12-03-01.indd 1 3/2/12 5:19 PM IDENTIFYING COMMON RELIABILITY/STABILITY PROBLEMS CAUSED BY FILE FRAGMENTATION II Table of Contents INTRODUCTION 1 AN OVERVIEW OF THE PROBLEM 1 RELIABILITY AND STABILITY ISSUES TRACEABLE TO FILE FRAGMENTATION 2 1. Crashes and system hangs 3 2. Slow backup time and aborted backup 5 3. File corruption and data loss 6 4. Boot-up issues 7 5. Errors in programs 7 6. RAM use and cache problems 8 7. Hard drive failures 9 CONTIGUOUS FILES = GREATER UP TIME 10 BIBLIOGRAPHY 11 CT Reliability-Stability WP 12-03-01.indd 2 3/2/12 5:19 PM IDENTIFYING COMMON RELIABILITY/STABILITY PROBLEMS CAUSED BY FILE FRAGMENTATION 1 Introduction Over the years, numerous manufacturers, third party analysts and labs have reported on the effects of disk/file fragmentation on system speed and performance. Defragmentation has also gained recognition for its critical role in addressing issues of system reliability and improved uptime, particularly since Microsoft’s decision to include a defragmentation utility in the Windows 2000 and newer operating systems. Disk fragmentation is In this white paper, we explain some of the most common reliability and downtime phenomena often the “straw that broke associated with fragmentation, and the technical reasons behind them. This includes a discussion the camel’s back” when of each of the most common occurrences documented by our R&D labs, customers (empirical noting issues of stability results presented), as well as others, in recent years.
    [Show full text]
  • Diskeeper 9 User's Manual
    User’s Manual Diskeeper® for Windows® October 2004 This document describes the installation and operation of Executive Software International’s Diskeeper, The Standard in Entire Network Defragmentation™ for Microsoft® Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a new manual Software Versions: Diskeeper 9.0 Professional Edition Diskeeper 9.0 Server Standard Edition Diskeeper 9.0 Server Web Edition Diskeeper 9.0 Server Enterprise Edition Operating Systems: Windows Server™ 2003 Windows XP Professional Windows XP Home Edition Windows 2000 Server Windows 2000 Professional Windows NT 4.0 Server (SP 6 or higher) Windows NT 4.0 Workstation (SP 6 or higher) Windows Millennium Edition (Me) Windows 98 Windows 95 (OSR 2 or higher) Executive Software International, Inc., Burbank, California, USA ________________________ September 2004 __________ © 2002 – 2004 by Executive Software International, Inc. The Software described in this document is owned by Executive Software International, Inc. and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Diskeeper and Disk Encryption
    Diskeeper ® and Disk Encryption OVERVIEW In the early 1990s, Diskeeper Corporation (a Microsoft ® Gold Partner) and Microsoft co-wrote Windows ® kernel-level code, and exposed an API (Application Programming Interfaces), prior to release of NT4 for third party software providers. This “MoveFile” API as it is called, has allowed defragmentation programs to operate as user-mode applications ever since, through Windows Server ™ 2008, Windows 7, etc… The benefit of having integrated defrag-based file movement in Windows is that all file movement in an online defragmentation operation by a product, such as Diskeeper, is entirely handled by the operating system. A defragmenter, such as Diskeeper, is from this viewpoint, logic that instructs the file system, via that API, to put file fragments that it discovers back together again into an available and contiguous free space on a given Windows volume. The process has been 100% safe for data since introduction in NT4. More recently, the NTFS file system added and fully supports disk/file encryption as evidenced by EFS (Encrypting File System), and Microsoft products such as Windows Bit Locker. It is fairly well known that Windows also ships with a native defragmenter (a product initially provided by Diskeeper for the Windows 2000 platform). It then stands to reason that Microsoft has a vested interest in maintaining continuing compatibility with defragmentation and, minimally, their own drive/file encryption solutions, and this is certainly the case. Over the years our vast install base (10 million+) has brought to our attention rare and temporary incompatibilities that other products have had with the Microsoft MoveFile API.
    [Show full text]
  • User's Manual Diskeeper® Software for Windows
    User’s Manual Diskeeper® Software for Windows® Maximizing Performance and Reliability Automatically January 2009 This document describes the installation and operation of Diskeeper Corporation’s Diskeeper for Microsoft® Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a revised manual Software Versions: Diskeeper 2009 Home Edition Diskeeper 2009 Professional Diskeeper 2009 Pro Premier Diskeeper 2009 Server Diskeeper 2009 HomeServer Diskeeper 2009 EnterpriseServer Operating Systems: Windows Vista® (varies by Diskeeper edition) Windows Home Server Windows Server® 2003 Windows Server 2008 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California, USA ________________________ January 2009 __________ © 2009 Diskeeper Corporation. All Rights Reserved. The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Diskeeper® Sitekeeper® Undelete®
    Diskeeper ® “Set It and Forget It”® defragmentation solution for Windows® Undelete® Instant, easy file recovery for Up-to-the-Minute Data Protection® Sitekeeper ® The first and only easy-to-use systems management software Download Trialware Now At: www.executive.com • (800) 829-6468 Executive Software 7590 N. Glenoaks Blvd., Burbank, CA 91504 The “Set It and Forget It” defragmenter for Microsoft® Windows® XP, 2000, Server 2003, NT, Me, 9x Disk fragmentation is the underlying source of many system reliability and performance problems. Left unchecked, disk fragmentation can bring even the most powerful servers and workstations to their knees. NEW Diskeeper 9 is the solution! Diskeeper 9 is packed with new features and new technology. With its high-speed engine and new I/O Smart™ technology, Diskeeper 9 runs undetected in the background, eliminating fragmentation before it can affect speed and stability. FragShield™ boosts reliability by dynamically preventing fragmentation of critical system files. Network-wide installations of Diskeeper 9 are fast and easy with Diskeeper Administrator Edition, which provides fully- functional centralized management. Once installed and scheduled, Diskeeper 9 requires no administrator intervention. All you do is “Set It and Forget It!” Don’t let speed and reliability suffer. Get Diskeeper for all of your systems now! Instant file recovery and data protection for Microsoft Windows NT®, Windows 2000, Windows XP, Windows Server 2003 Undelete 5 with NEW Microsoft Office Version Protection is the only software system that gives you complete up-to-the- minute data protection! There are many deleted files that aren’t protected by the Windows recycle bin, including files deleted by another system over a network and overwritten Microsoft Office (Word, Excel and Powerpoint) files.
    [Show full text]
  • Diskeeper 2008 User's Manual
    User’s Manual ® ® DiskeeperP P for WindowsP P Maximizing System Performance and Reliability Automatically™ October 2007 ® This document describes the installation and operation of Diskeeper Corporation’s Diskeeper for MicrosoftP P Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a new manual Software Versions: Diskeeper 2008 Professional Diskeeper 2008 Pro Premier Diskeeper 2008 Server Diskeeper 2008 HomeServer Diskeeper 2008 EnterpriseServer Operating Systems: Windows Vista (varies by Diskeeper edition) Windows Home Server Windows Server® 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California, USA ________________________ October 2007 __________ © 2002 – 2007 by Diskeeper Corporation. All Rights Reserved. The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Special Holiday Edition the Ten Dumbest Things People Do to Mess
    Volume 5, Number 12 December 2008 Special Holiday Edition Editor’s Note: (Wyman): This year’s Special Holiday Edition presents a comprehensive security strategy that ordinary computer users can follow, from plugging a computer into the outlet and connecting to the Internet, to keeping out the Bad Guys and preparing for disaster. The Ten Dumbest Things People Do to Mess Up Their Computer #1: Plug into the Wall without Surge Protection All it takes to destroy your computer is an ordinary power surge coursing through it. There is no need for a raging electrical storm. Anything that interrupts the power flow to your computer and then starts it again abruptly can fry your system. Something as simple as turning on an appliance that's plugged into the same circuit (e.g., a hair dryer, electric heater, or air conditioner) can cause a power surge. Digital devices, like computers, printers and scanners, are especially vulnerable to surges. Even if your lights go out for just a minute and then come right back on, that could create a surge big enough to bring your system to its knees. And if you haven't backed up your files (see #10 below), your email and files could be gone forever. You can protect your computer, printer, scanner, and other components against damaging power surges by using a computer-grade surge protector. Cheap surge protectors may not respond quickly enough to save your computer, and are only good for one surge. Then you'll have to buy another one anyway. An uninterruptible power supply ("UPS" or "battery backup") is even better.
    [Show full text]
  • Diskeeper I/O Smart Performance Tests
    D Diskeeper - The Number One Automatic Defragmenter™ Diskeeper® I/O Smart™ Performance Tests OVERVIEW Keeping a drive automatically defragmented is critical to keeping your systems running at top speed. But the actual process of defragmentation has the potential to cause major slowdowns. Defragmentation involves moving pieces of data from one location on the hard drive to another. When another application needs data to be read or written (an input/output or I/O request), the drive has to split its time between the demands of both programs. Computer performance slows down and defragmentation takes longer. The result is a data traffic jam in which defragmentation can actually create the same condition it is intended to cure. In the 1990’s Diskeeper pioneered CPU and memory sensitivity through technology leadership and the leveraging of Windows® native process thread scheduler. While this has addressed resource conflicts in those areas, it does not handle the traffic jam (disk I/O queue) created on the disk subsystem. The proliferation of electronic multimedia, large data files and seemingly near daily increases in data storage capacity requirements has exacerbated the need for advanced technology. Diskeeper 9 handles this growing problem with innovative new I/O Smart technology. During background defragmentation passes, Diskeeper 9 actively “listens” for I/O requests. When another application or process needs access to the hard drive, Diskeeper intelligently pauses defragmentation until other program I/O requests are fulfilled. Once that happens, Diskeeper gets the go-ahead to resume defragmentation until another request comes along. Thanks to its high-speed engine, Diskeeper can easily defragment using the “spaces” between I/O requests, even on busy servers.
    [Show full text]
  • Diskeeper 2008 User's Manual
    User’s Manual ® ® DiskeeperP P for WindowsP P Maximizing System Performance and Reliability Automatically™ October 2007 ® This document describes the installation and operation of Diskeeper Corporation’s Diskeeper for MicrosoftP P Windows. It is intended primarily for Windows system administrators and managers. Revision/Update Information: This is a new manual Software Versions: Diskeeper 2008 Professional Diskeeper 2008 Pro Premier Diskeeper 2008 Server Diskeeper 2008 HomeServer Diskeeper 2008 EnterpriseServer Operating Systems: Windows Vista (varies by Diskeeper edition) Windows Home Server Windows Server® 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California, USA ________________________ October 2007 __________ © 2002 – 2007 by Diskeeper Corporation. All Rights Reserved. The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • Diskeeper® Professional
    Diskeeper® Professional Overview Everyone knows the frustration of a Windows® laptop or workstation becoming progressively slower the longer it is used and burdened with more software and data. Condusiv’s Diskeeper® 12 Professional prevents degradation in Windows performance by eliminating nearly all fragmentation from occurring at the Windows level, before files are written in a performance-penalized state. With its patented, proactive IntelliWrite® technology, Diskeeper keeps laptops and workstations running like new, resulting in increased productivity and lower costs by extending the useful life of existing hardware. IT professionals who support a fleet of laptops no longer wrestle with persistent performance HelpDesk calls. Where typical defragmentation utilities consume resources to operate, and deal with the problem after the performance penalty has already been incurred, Diskeeper is the only proactive solution that solves the problem in real-time while running transparently in the background. Without Diskeeper, files are scattered around a volume instead of written in one place. Diskeeper’s IntelliWrite technology optimizes writes and subsequent reads by writing data sequentially, reducing seek time and the number of I/Os required to write a file or access it. Keeps Business PCs and Laptops Running Like New Most notably, Diskeeper’s low overhead and InvisiTasking® resource monitoring ensures all optimization occurs without hampering system resources, so users can continue working while Diskeeper runs in the background. Maintenance tasks, like defrag, are usually scheduled during off-hours to avoid impact on performance. However, if systems are shut down, maintenance activities fail to run, creating a bigger headache over time. And if the utility runs during business hours, the PC is rendered useless until defrag operations are complete.
    [Show full text]
  • Defragmentation Tutorial
    A Tutorial on Disk Defragmentation for Windows NT/2000/XP and Windows Server 2003 What You Don’t Know Can Hurt You May 2003 Table Of Contents Introduction..................................................................................................................................... 2 Fragmentation 101 .......................................................................................................................... 2 Fragmentation and Performance..................................................................................................... 3 The Costs of Fragmentation............................................................................................................ 4 Productivity................................................................................................................................. 4 Backup ........................................................................................................................................ 4 System Administration/Help Desk ............................................................................................. 5 Hardware..................................................................................................................................... 5 Myths or Misperceptions ................................................................................................................ 5 Myth 1-Our systems are new, we don’t need defragmentation software. .................................. 5 Myth 2- We have lots of free space so fragmentation’s
    [Show full text]