White Papers & Case Studies

  1. The Seven Types Of Power Problems
    3/2/2012
    Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. By APC by Schneider Electric
  2. Ten Cooling Solutions To Support High-Density Server Deployment
    3/2/2012
    High-density servers offer a significant performance per watt benefit. However, depending on the deployment, they can present a significant cooling challenge. By APC by Schneider Electric
  3. The Different Technologies For Cooling Data Centers
    3/2/2012
    There are 13 basic heat removal methods to cool IT equipment and to transport unwanted heat to the outdoor environment. This paper describes these fundamental cooling technologies using basic terms and diagrams. By APC by Schneider Electric
  4. The Different Types Of UPS Systems
    3/2/2012

    There is much confusion in the marketplace about the different types of UPS systems and their characteristics. Each of these UPS types is defined, practical applications of each are discussed, and advantages and disadvantages are listed. With this information, an educated decision can be made as to the appropriate UPS topology for a given need.

  5. A Quantitative Comparison Of High Efficiency AC Vs. DC Power Distribution For Data Centers
    3/1/2012
    This paper presents a detailed quantitative efficiency comparison between the most efficient DC and AC power distribution methods, including an analysis of the effects of power distribution efficiency on the cooling power requirement and on total electrical consumption. By APC by Schneider Electric
  6. How An IT Firm Cut Travel Costs By $36,000 With Telepresence
    2/29/2012
    IT firm Intelligent Technologies Labs (ITL) had several offices in the United States and in Saudi Arabia. The necessity to communicate clearly and routinely grew as the company expanded into various territories. Rather than continuing to increase its travel, which was far exceeding 180 hours a year, the company invested in a telepresence solution, which provided an immediate increase in productivity and simultaneously provided a significant cost savings. By Zenith Infotech
  7. Prevent SMB Data Breaches
    2/29/2012
    Today’s business environment can hardly be imagined as fully functional without a connection to the Web and indispensable applications such as email, instant messaging, voice over IP, Web sites, and file servers. Securing this type of communication must be a key concern for all companies, regardless of their size or main activity. By Loredana Botezatu and Ioana Jelea, e-threats analysis and communications specialists, BitDefender
  8. Virus Naming. The “Who’s Who?” Dilemma
    2/29/2012
    Anyone who has ever created something new is granted the right to baptize it. However, given that they are born under the sign of destruction and disruption, viruses are an exception to this rule. By BitDefender
  9. Protect Your Customers From Facebook Threats
    2/28/2012
    As the most popular social network of the moment, with an impressive growth in the last year, Facebook has become lately the scene of complex social engineering attacks, aggressive spam, and massive malware distribution. This paper presents an overview of phishing, spam, and other social engineering attacks against Facebook identified over the last year. By BitDefender
  10. Accelerating Backup & Continuity For Small And Midsize Businesses
    2/23/2012
    Integrated Enterprise Solutions, Inc., (IES) is a full-service IT provider in the mid-Hudson River valley region of New York State. As a specialist in providing total IT support and service to customers that have no internal IT staff, as well as a consultant to larger companies on specific projects and technologies, IES understands that clients of all sizes need enterprise-class solutions to protect their mission-critical data, prevent business outages, and satisfy data retention requirements. By Axcient