Results for the tag,



SLA: A service-level agreement is a part of a service contract where the level of service is formally defined. In practice, the term SLA is sometimes used to refer to the contracted delivery time (of the service) or performance. As an example, internet service providers will commonly include service level agreements within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms. In this case the SLA will typically have a technical definition in terms of mean time between failures (MTBF), mean time to repair or mean time to recovery (MTTR); various data rates; throughput; jitter; or similar measurable details. (Source: Wikipedia)

Managing Information Risk

Section: Research
With organisations being so dependent on the electronic capture, storage and retrieval of increasing amounts of information, how well are they coping with modern-day requirements? KEY FINDINGS Loss of critical information is the most prominent risk in today's business environment When asked to what degree different categories of risk are considered during the business planning process, 715 senior IT ...   read more

Life After Cloud Computing

Section: Research
This research looks ahead of the latest IT industry developments of cloud computing and how a variety of cloud deployment models can be considered when looking at how best to fulfil a particular requirement.   The research also considers if cloud computing could be a more service-centric approach, brought about by the challenging of IT’s historical obsession with technology, and enabled by more choice and flexibility. ...   read more

A Buyers Guide to Cloud Services

Section: Research
In the UK today over 50 per cent of organisations have formally utilised at least one Cloud service and satisfaction levels relating to that experience grew to an astonishing 96 per cent by the end of 2011. Furthermore, 85 per cent of IT Executives stated that they now formally considered Cloud as a viable option for delivering new IT projects within their wider IT strategy, signalling that the technical model has established a mainstream status among the profession. What ...   read more

Don't forget the network

Section: Research
The overall IT networking requirements of a given organisation are not provided as a single utility. Instead they comprise a constantly evolving patchwork of technology and services, some maintained in-house and some provided by third parties, the availability and performance of which are often taken for granted until something goes wrong. Over time this ‘network’ has become embedded in nearly every business process; when the network fails the processes fail too. To prevent this ...   read more

5 Ways Your Business Can Leverage Infrastructure-as-a-Service

Section: Articles
Infrastructure-as-a-Service (IaaS) is at the core of the cloud, making up its most powerful and complex layer. It’s no wonder then that most cloud spending today is being distributed in the IaaS arena, where Virtual Dedicated Servers (VDS) are offering IT managers access to services that look and act like real physical servers. Rather than spend on the costly maintenance of legacy servers, IT managers can now repurpose development time towards revenue-generating applications through the c ...   read more

Alternatives to BT leased lines

Section: Articles
A leased line is defined as a dedicated high-performance circuit leased by a common carrier between a customer and a service provider’s network. It is rented on an annual basis and usually carries voice and data or both. It can be used for internet access or for a private connection between two customer sites. Compared to other internet connectivity options such as DSL products, leased lines are relatively expensive but are supported by a ...   read more

Cloud computing risk factors, and the real and imaginary bogeymen that lurk in data centres

Section: Articles
Nearly every company, from one-person startups to FTSE 100 enterprises, either has an active cloud strategy or is at least considering one. The maturity of the technology and robustness of cloud data centre offerings has overcome most irrational fears of the cloud and the technology has earned its place in the canon of acceptable business practices. Excitement abounds over the prospect of lowered or nonexistent capital expenditure, the ability to roll out a p ...   read more

Cloud security 'not an issue as DHS adopts IaaS'

Section: News
Cloud security is not a concern for the US's Department of Homeland Security (DHS), as it adopts the infrastructure as a service (IaaS) model for its public-facing websites. The DHS has become the first federal organisation in the US to sign up to a General Services Administration's (GSA) IaaS blanket purchase agreement. A deal that is believed to be worth $5 million (£3 million). Placeholder0The DHS believes that in the long term, the department will be able to l ...   read more

Developing a Virtualisation Strategy

Section: Articles
In all the enthusiasm generated by quick savings and speedy results, many organisations have faltered in developing a strong virtualisation strategy. By not adopting a sustainable, long-term outlook of their virtualisation technologies, these organisations are short-changing themselves in terms of long-term ROI and stability of virtualisation systems. Adopting a virtualisation maturity model can help organisations develop a strong virtualisation strategy, thus helping ensure sustainabilit ...   read more

Ensuring SLA compliance and disaster recovery in the cloud

Section: Articles
A strategic move to the cloud is often driven by two or three key considerations, most often, these include the ability to reduce capital expense and establish more predictable operating expense, and establishing a more scalable and more easily manageable infrastructure.    Whilst a company’s first foray into the cloud is likely to be proof-of-concept applications that are less mission-critical, more companies are finding it advantageous to strategically ...   read more

How Ethernet First Mile can reduce leased line costs

Section: Articles
Ethernet in the First Mile (EFM), also known as IEEE 802.3ah, is defined as a collection of protocols specified in IEEE 802.3, defining the Ethernet in the access networks, i.e. first or last mile.   The first mile (also called the last mile, the subscriber access network, or the local loop), is the link between the end user and the public network. On a typical LAN setting DSL and cable modems operate at a modest 5-10% of the LAN setup’s total capacity which c ...   read more

Protecting Sensitive Data is Number One Security Priority

Section: Articles
With an explosion of data breaches in recent years, the protection of sensitive information has become a top priority for security organisations worldwide. According to the Privacy Rights Clearinghouse, more than 535 million records have been breached in 2,651 incidents made public since 2005.1 Attackers have targeted virtually the entire gamut of sensitive content, from personal financial account data to intellectual property and high-value information of concern to the most senior lev ...   read more