Cloud Computing Data Center Services
2 min read
24

Terms Related To Cloud Computing

September 5, 2012
0

Cloud = Internet: Metaphor used to represent a global network, initially used to refer to phone networks and now used to represent the Internet. Elastic Computing : Ability to add and remove computing resources such as processing, memory and storage, without affecting the level of service. Private Cloud Computing: Services

Continue Reading
Cloud Computing eNlight 360
4 min read
33

ESDS – Private Cloud Setup Architecture

August 28, 2012
0

The Private Cloud offers a more secure and expandable alternative to public solutions for businesses looking to migrate their existing server infrastructure over to an environment that is more practical and manageable. Although shared cloud solutions can offer up to 100% up time and instant expandability, for large enterprises that

Continue Reading
Document Management SYstem
2 min read
27

Advantages Of A Document Management Solution

August 16, 2012
0

What are the advantages of a document management solution? Document distribution (external and internal) as well as the treatment of information or content, activities are time consuming and are subject to error handling, which sometimes result in dispersion and loss of documents, resulting in loss of time and may even

Continue Reading
Cloud Computing Dedicated Hosting
2 min read
25

10 Reasons To Deploy In The Cloud

August 10, 2012
0

Here are some great features that describes how “cool” is cloud computing: 1. Pay only for the resources you use This is the basic idea of cloud computing, the ability to use resources (and pay for them) as needed, avoiding the waste and treating dynamically overload situations; 2. Snapshots of

Continue Reading
Cluster Dedicated Hosting Technology
3 min read
30

vSphere Admission Control

July 27, 2012
0

When we talk about access control or admission control, we usually have in mind the policy of HA, although this is not the only function that uses access control. DRS, Storage DRS, and ESXi hosts have their own access control mechanism. I propose a detailed look at what is the

Continue Reading