DCIM 101: What is Data Center Infrastructure Management?

Credit to Author: Jonathan Healey| Date: Thu, 06 Feb 2020 16:45:00 +0000

What is DCIM? DCIM stands for Data Center Infrastructure Management. DCIM software is used to monitor, measure, and manage data centers, covering both IT equipment and supporting infrastructure such as power… Read more »

The post DCIM 101: What is Data Center Infrastructure Management? appeared first on Schneider Electric Blog.

Read more

Gartner Tech Trends Revisited – On Track with Rapid Rise in Demand for Industrial Edge Data Centers

Credit to Author: Vincenzo Salmeri| Date: Mon, 30 Sep 2019 15:30:00 +0000

Earlier this year, Gartner outlined its top 10 strategic technology trends and many of them center on growing industrial edge data centers investments. This should not come as a surprise… Read more »

The post Gartner Tech Trends Revisited – On Track with Rapid Rise in Demand for Industrial Edge Data Centers appeared first on Schneider Electric Blog.

Read more

Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant

Credit to Author: Eric Avena| Date: Fri, 23 Aug 2019 16:00:40 +0000

Gartner named Microsoft a Leader in the 2019 Gartner Magic Quadrant for Endpoint Protection Platforms positioned highest in execution

The post Gartner names Microsoft a Leader in 2019 Endpoint Protection Platforms Magic Quadrant appeared first on Microsoft Security.

Read more

The Roadmap: The Evolving Data Center Infrastructure and Operations for the Future

Credit to Author: Abby Gabriel| Date: Thu, 09 May 2019 17:18:28 +0000

Today’s resilient operations are demanding actionable information close to the point of use. They require agile computing solutions with low latency and high reliability. This trend means that more data… Read more »

The post The Roadmap: The Evolving Data Center Infrastructure and Operations for the Future appeared first on Schneider Electric Blog.

Read more

Sophos named among vendors with most comprehensive solutions in Gartner market guide

Credit to Author: Matthew Phillion| Date: Mon, 29 Oct 2018 17:20:38 +0000

We’ve got solutions in all eight methods of information-centric endpoint protection.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/BRsf0PjLAcI” height=”1″ width=”1″ alt=””/>

Read more