Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
Citrix and Google work together to help organizations simplify access to business-critical Windows applications on Chromebooks along side Google Apps, SaaS and other cloud-based services. Read this paper to learn more.
As the price of storage and bandwidth continues to drop fast, Cloud-based services are becoming more and more attractive to small and medium-sized businesses (SMBs) which are seeking to reduce licensing costs, avoid recruiting IT staff and focus fully on their core responsibility - growing the business.
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your OrganizationJesse Wilkins
This workshop delivered at KMWorld 2011 outlined the essential steps in the AIIM social business roadmap, presented a high-level assessment to conduct in order to develop an organization-specific roadmap, and outlined key strategies for the governance portion of the roadmap.
This IDC white paper highlights how IBM eX5 systems with MAX5 memory technology play a significant role in increasing the value of memory dense servers.
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
Citrix and Google work together to help organizations simplify access to business-critical Windows applications on Chromebooks along side Google Apps, SaaS and other cloud-based services. Read this paper to learn more.
As the price of storage and bandwidth continues to drop fast, Cloud-based services are becoming more and more attractive to small and medium-sized businesses (SMBs) which are seeking to reduce licensing costs, avoid recruiting IT staff and focus fully on their core responsibility - growing the business.
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your OrganizationJesse Wilkins
This workshop delivered at KMWorld 2011 outlined the essential steps in the AIIM social business roadmap, presented a high-level assessment to conduct in order to develop an organization-specific roadmap, and outlined key strategies for the governance portion of the roadmap.
This IDC white paper highlights how IBM eX5 systems with MAX5 memory technology play a significant role in increasing the value of memory dense servers.
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
In their “Sector Insight” research study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this research paper to learn why Aberdeen recommends small businesses be open to endpoint security solutions from vendors other than McAfee and Symantec.
Welcome to the sixteenth edition of GS-insight, the quarterly newsletter from international executive search firm, Gillamor Stephens. In this issue we consider a variety of topics relevant to technology companies and the investment community. Key figures from the industry provide insight and perspective on contemporary issues such as: reinventing corporate IT, in-sourcing, building effective channel alliances, leadership, driving change and “bootstrapped businesses”. In addition we explore the reasons behind the success of the Nordic region in producing exciting and successful “start-up” technology companies.
Gillamor Stephens is the leading executive search and selection company serving the international technology, media and communications sectors. GS-insight is published in both print and electronic formats, and can be viewed and downloaded from www.gillamorstephens.com.
We welcome your feedback at gs-insight@gillamorstephens.com
VIPRE Business Takes a Bite out of BloatwareGFI Software
The remedy to bloatware is a better, more efficient product that is specifically engineered to scan, detect and remove myriad security threats without impacting performance and taking a big bite out of the IT capital expenditure budgets. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats.
NEC Backup as a Service reduces administrative tasks, helping it departments...InteractiveNEC
Cloud solutions continue to grow not only in adoption but also in importance in customer IT strategies. In typical risk-averse practices, cloud solutions were initially used near the fringes of IT environments, delivering test and development functions far outside most of the core mission-critical workloads sustaining internal and external business operations. Likewise, customers in regulated industries such as healthcare or government were initially wary of the security and performance of services delivered from third-party data centers. These dynamics are changing rapidly, however, as both the customer and vendor behavior around cloud have matured considerably. Cloud providers have expanded their data center locations, added almost every flavor of regulatory compliance, and enhanced security capabilities. These developments have dramatically lowered the traditional barriers to cloud adoption, allowing customers in almost any industry to have at least the possibility of deploying most of their workloads through cloud delivery methods.
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department undertakes on a daily basis. This white paper examines the important role played by patch management to help organizations keep their PC real estate fully up-to-date with the latest security patches, without unduly compromising reliability, productivity, security and data integrity.
VMware Cloud Infrastructure and Management on NetAppNetApp
This ESG Lab Validation describes the hands-on testing of a VMware cloud infrastructure and management on NetApp solution with a focus on the value of integrated manageability, policy-based provisioning and automation, and data management for business continuity.
This paper discusses the adoption of cloud computing by many businesses and organizations. Cloud
adoption has many benefits such as reduced IT costs, and accelerated adoption of new services. However, this
accelerated adoption present challenges to effective Identity Management. Many existing Identity Management
problems exist in cloud computing, but are further complicated. Now IT professionals must think outside the
realm of the internal IT infrastructure to integrate cloud services into the organization. User
provisioning/deprovisioning, credential management, auditing/access monitoring, and federal regulation
compliance must be considered across the boundaries of the internal organization’s network. Traditional
Identity Management systems can be leveraged to solve these issues. Most cloud service providers have means
to integrate on-premise Identity Management systems and identity records into their services. This requires
bridiging and/or proxy systems for on-premise resources to interact with cloud services. Vendors such as
Microsoft andCelestix provide such systems that bridge between on-premise and the cloud. New solutions are
also being developed and adopted with a “cloud first” approach in the form of Identity as a Service (IDaaS).
This is an evolving new approach that has potential to also revolutionize how Identity Management is conducted
in organizations. Any solutions adopted to meet cloud Identity Management challenges must still comply with
organizational and federal regulation requirements.
3 key considerations for IT teams at small to midsized firms.How data, security & support should influence platform decisions for tech decision makers.
Visit ReadyTalk at: http://www.readytalk.com/
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
In their “Sector Insight” research study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this research paper to learn why Aberdeen recommends small businesses be open to endpoint security solutions from vendors other than McAfee and Symantec.
Welcome to the sixteenth edition of GS-insight, the quarterly newsletter from international executive search firm, Gillamor Stephens. In this issue we consider a variety of topics relevant to technology companies and the investment community. Key figures from the industry provide insight and perspective on contemporary issues such as: reinventing corporate IT, in-sourcing, building effective channel alliances, leadership, driving change and “bootstrapped businesses”. In addition we explore the reasons behind the success of the Nordic region in producing exciting and successful “start-up” technology companies.
Gillamor Stephens is the leading executive search and selection company serving the international technology, media and communications sectors. GS-insight is published in both print and electronic formats, and can be viewed and downloaded from www.gillamorstephens.com.
We welcome your feedback at gs-insight@gillamorstephens.com
VIPRE Business Takes a Bite out of BloatwareGFI Software
The remedy to bloatware is a better, more efficient product that is specifically engineered to scan, detect and remove myriad security threats without impacting performance and taking a big bite out of the IT capital expenditure budgets. Learn about the scope of the malware problem and strategies that can help you defend against evolving malware threats.
NEC Backup as a Service reduces administrative tasks, helping it departments...InteractiveNEC
Cloud solutions continue to grow not only in adoption but also in importance in customer IT strategies. In typical risk-averse practices, cloud solutions were initially used near the fringes of IT environments, delivering test and development functions far outside most of the core mission-critical workloads sustaining internal and external business operations. Likewise, customers in regulated industries such as healthcare or government were initially wary of the security and performance of services delivered from third-party data centers. These dynamics are changing rapidly, however, as both the customer and vendor behavior around cloud have matured considerably. Cloud providers have expanded their data center locations, added almost every flavor of regulatory compliance, and enhanced security capabilities. These developments have dramatically lowered the traditional barriers to cloud adoption, allowing customers in almost any industry to have at least the possibility of deploying most of their workloads through cloud delivery methods.
Virtualization: A Sustainable Resource Management Strategy in Computing Pract...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department undertakes on a daily basis. This white paper examines the important role played by patch management to help organizations keep their PC real estate fully up-to-date with the latest security patches, without unduly compromising reliability, productivity, security and data integrity.
VMware Cloud Infrastructure and Management on NetAppNetApp
This ESG Lab Validation describes the hands-on testing of a VMware cloud infrastructure and management on NetApp solution with a focus on the value of integrated manageability, policy-based provisioning and automation, and data management for business continuity.
This paper discusses the adoption of cloud computing by many businesses and organizations. Cloud
adoption has many benefits such as reduced IT costs, and accelerated adoption of new services. However, this
accelerated adoption present challenges to effective Identity Management. Many existing Identity Management
problems exist in cloud computing, but are further complicated. Now IT professionals must think outside the
realm of the internal IT infrastructure to integrate cloud services into the organization. User
provisioning/deprovisioning, credential management, auditing/access monitoring, and federal regulation
compliance must be considered across the boundaries of the internal organization’s network. Traditional
Identity Management systems can be leveraged to solve these issues. Most cloud service providers have means
to integrate on-premise Identity Management systems and identity records into their services. This requires
bridiging and/or proxy systems for on-premise resources to interact with cloud services. Vendors such as
Microsoft andCelestix provide such systems that bridge between on-premise and the cloud. New solutions are
also being developed and adopted with a “cloud first” approach in the form of Identity as a Service (IDaaS).
This is an evolving new approach that has potential to also revolutionize how Identity Management is conducted
in organizations. Any solutions adopted to meet cloud Identity Management challenges must still comply with
organizational and federal regulation requirements.
3 key considerations for IT teams at small to midsized firms.How data, security & support should influence platform decisions for tech decision makers.
Visit ReadyTalk at: http://www.readytalk.com/
Navigating Social Media in the Automotive IndustryDMEautomotive
A helpful whitepaper by DMEautomotive, aimed at providing a brief description of social media, its importance and insights on how dealerships can integrate social media into their marketing strategies.
IBM Smarter Business 2012 - PureSystems - PureDataIBM Sverige
År 2013 kommer nästan 70 % av företagens driftkostnader att läggas på existerande IT. Endaste en av fem organisationer lägger idag mer än 50 % av IT-budgeten på nya projekt. Med vetskap om den digitala tillväxt vi har framför oss, handlar ödesfrågan enligt Don Boulia, Vice President Strategy, IBM Software Group, därför om hur väl ett företags infrastruktur klarar förändringarna. Nya lanseringen i familjen IBM PureSystems, PureData, adresserar utmaningarna med stora datamängder.
Talare: Don Boulia, Vice President IBM WebSphere Cloud, Per Fredriksson, IBM PureSystems Executive Architect
Besök http://smarterbusiness.se för mer information.
IT and Business solutions through Cloud and Big Data transformation for stron...Rolta
Rising tide of data velocity and multiplication of IT environment has caused problems to the organizations in holding their market presence. In a bid to outperform competition, and problem organizations need heavy research to get to a feasible solution. To conquer these difficulties, Rolta delivers a range of services which help organizations in building strong IT infrastructure with minimal support costs.
Enterprises that are embracing cloud computing are interested in driving fundamental changes in their business so they can compete in the future. IT transformation, enabled by cloud adoption, is a key component of this future success—from tighter alignment with business unit stakeholders to increased agility and pace of innovation. In this session, we explore the potential for transformation that comes with cloud adoption, and we discuss how some of the world’s leading enterprises were able to transform. We also explore organizational and technology best practices that you can implement to support transformation in your organization.
Réinventez le Data Management avec la Data Virtualization de DenodoDenodo
Regardez la version complète du webinar à la demande ici: https://goo.gl/ZxRqmX
"D'ici à 2020, 50% des entreprises mettront en œuvre une forme de virtualisation des données comme une option pour l'intégration de données", selon le cabinet d’analystes Gartner. La virtualisation des données ou data virtualization est devenue une force motrice pour les entreprises pour la mise en œuvre d’une architecture de données d'entreprise agile, temps réel et flexible.
Au sommaire de ce webinar:
Denodo et son positionnement sur le marché de la Data Virtualization
Les principales fonctionnalités
Démo/vidéo
Les principaux cas d’usage. Présentation d'un cas client : comment Intel a repensé l’architecture de ses données avec la Data Virtualization
Les ressources
Questions/Réponses
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the June Edition:
• Microsoft, Dell Technologies collaborate to simplify IoT solutions delivery.
• Oracle delivers next set of autonomous cloud platform services.
• Partner profitability - Ramkumar Balakrishnan, President, Redington Value.
• Fortinet report reveals an evolution of malware to exploit cryptocurrencies.
• Dell Technologies Customer Solution Centre opens in Dubai.
• Redington Value partners with Nutanix to deliver enterprise cloud solutions.
• Huawei’s roadshow focuses on driving digital transformation.
• Veeam announces vision for the Hyper-Available Enterprise.
• Micro Focus announces agreement with Utimaco to divest Atalla portfolio.
• Red Hat launches latest version of Red Hat virtualization.
• Palo Alto Networks Announces Intent to Acquire Secdo.
• Nexthink announces integration with Splunk.
Brighttalk converged infrastructure and it operations management - finalAndrew White
How Converged Infrastructure Will Change IT Operations Management
Over the past decade, Enterprises have leveraged a shared service model to make IT more cost effective. The emergence of “Converged Infrastructure” and “Fabric-Based Infrastructure” will allow IT to offer purpose driven solutions rather than the function driven solutions of the past. To do this, IT will need to evolve towards more modular designs, rely more on open standards, and rethink their approach to management frameworks.
In this session you will learn:
How converged infrastructure is used to create purpose driven solutions
Why new operational challenges are faced as this new approach is used broadly
What changes need to occur to succeed with this new paradigm
Our ExchangeCloud service offers a dedicated Exchange 2010 server. This presentation outlines the archiving and retention features in the latest release
This hit the press this week and demonstrates how Shire Pharmaceuticals have leveraged the Quantix Cloud. They have been able to use our technology to convert a client/server app (IDBS E-Workbook) into a flexible SaaS model.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Monitoring Java Application Security with JDK Tools and JFR Events
Quantix virtualisation case study
1. Microsoft Case Studies: Smith Flow Control Page 1 of 5
All Microsoft Sites
Search Microsoft.com
return to search2 page Case Study Bookmark with:
Posted: 3/12/2010
Views: 124
Rate This Evidence: Delicious
Digg
Live
reddit
StumbleUpon
What are these?
Smith Flow Control
Safety Products Firm Replaces Eight Physical Servers with
Five Virtual Machines
Smith Flow Control, part of Halma, the U.K.-based hazard detection and life protection products
group, needed an easy-to-manage IT infrastructure to replace its disparate systems. It chose
Windows Server 2008 R2 with Hyper-V over VMware virtualisation technology. Now, instead of
eight physical servers, the company uses a three-node Hyper-V cluster with five virtual machines.
This has increased productivity, reliability, and disaster recovery options.
Business Needs
Smith Flow Control specialises in electronic, safety, and environmental technologies. The Halma
subsidiary manufactures products that are often deployed in hazardous conditions. With 55
employees, Smith Flow Control needed a more resilient IT infrastructure, but lacked specialist IT
resources in-house to manage the migration. The firm had its own standalone systems and didn’t use
the Halma Group IT resources or a third-party company for advice.
Mark Van Drunick, Finance Director at Smith Flow Control, says: “By 2009, we had a complex web
of disparate hardware and software, with different versions of data management technology. The
servers and clients had reached the end of their life cycles and the whole infrastructure needed to be
reviewed urgently.”
http://www.microsoft.com/caseStudies/Case_Study_Detail.aspx?casestudyid=400000... 27/04/2010
2. Microsoft Case Studies: Smith Flow Control Page 2 of 5
Performance was also suffering. The company was experiencing 30 per cent capacity spikes at the
end of each month, which caused delay to critical business processes, even with eight physical
servers. “We were struggling to support the network given our staffing constraints and shortage of
in-house technical skills,” says Van Drunick.
Smith Flow Control, with 40 users of its business management systems, decided to turn the IT
challenge into an opportunity to conduct an infrastructure optimisation exercise. Van Drunick adds:
“We required an easy-to-manage system that would take up less time for our high performing team.
With the previous system, instead of working on revenue-generating projects, some of our key
people were engaged in fixing issues with our IT system.”
Solution
Smith Flow Control turned to Microsoft Gold Certified Partner Quantix, which specialises in
virtualisation, database solutions, business application support services, high performance
networking, and security and remote managed services.
Andrew Slater, Sales Manager High Performance and Networking at Quantix, says: “Smith Flow
Control initially needed a capacity planning exercise to size the deployment and check the suitability
of its environment for virtualisation. The benefits of virtualisation were compelling—flexibility,
lowered management overheads, and improved resilience.”
Quantix proposed an infrastructure rebuild with the Windows Server 2008 R2 operating system on
Hyper-V virtualisation software instead of VMware, to deliver increased performance, resilience,
and security. The proposal also involved replacing Citrix with Terminal Services RemoteApp.
Quantix deployed this new system, giving Smith Flow Control five virtualised servers instead of
eight physical servers. The company also implemented Microsoft Exchange Server 2007 to replace
Exchange Server 2000, and migrated the previous database management software to Microsoft SQL
Server 2008, as well as some specialist line-of-business applications. “The Resource Adaptive
Programming build we undertook cleared out existing issues with the infrastructure, resulting in a
much more resilient system,” says Slater. “Previously, there were no automatic backup or recovery
options.”
Smith Flow Control experienced a smooth transition to the new infrastructure due to support from
Quantix, with the project taking just three months to complete. Van Drunick says: “It’s been an
almost flawless process, and our users didn’t notice any lapse in service during the transition.”
Benefits
Smith Flow Control has acquired a more reliable infrastructure that better supports the business, with
five virtualised servers instead of eight physical servers. The system is easier to manage, which frees
key employees to focus on strategic work rather than troubleshooting IT issues. Van Drunick says:
“Live recovery of data—which used to take up to eight hours with the previous system—now takes
less than five minutes.”
• Knowledge transfer benefits the business. While total cost of ownership has risen since the
migration, Smith Flow Control considers that this has been balanced by the knowledge transfer from
the partner. “We had no expertise of this kind within the company before,” says Van Drunick.
• Resilient system tackles issues before they become problems. Smith Flow Control is now in
control of its infrastructure. “The most impressive benefit of the solution is that it just works,” says
Van Drunick. “And without taking up hours and hours of technician time.”
• Scalable infrastructure supports future needs. With a highly scalable architecture, Van Drunick
sees no obstacles to increasing storage space on the system.
http://www.microsoft.com/caseStudies/Case_Study_Detail.aspx?casestudyid=400000... 27/04/2010
3. Microsoft Case Studies: Smith Flow Control Page 3 of 5
• Virtualisation helps consolidate workloads. The adoption of virtualisation in the enterprise has
increased flexibility in deployment and life-cycle management of applications. “We’re using
virtualisation to consolidate workloads and reduce server sprawl,” says Van Drunick.
• Partner provides ongoing technical support. By working with Quantix, Smith Flow Control is
ensuring continued technical support and an escalation path to Microsoft in the event of a serious
issue.
This case study is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Solution Overview
Email Link
Download
Organization Size: 55 employees
Organization Profile
Smith Flow Control, part of U.K.-based Halma, manufactures high tech safety products for use in
hazardous operations. It is a specialist in environmental technologies.
Software and Services
Windows Server 2008
Microsoft SQL Server 2008
Microsoft Exchange Server 2007
Microsoft Hyper-V
Vertical Industries
High Tech and Electronics Manufacturing
Country/Region
United Kingdom
Business Need
Business Productivity
Data Protection and Recovery
Data Management
IT Issue
Virtualization
Partner(s)
Quantix
http://www.microsoft.com/caseStudies/Case_Study_Detail.aspx?casestudyid=400000... 27/04/2010
4. Microsoft Case Studies: Smith Flow Control Page 4 of 5
Products
|
Manage Your Profile
|
Contact Us
|
Terms of Use
|
Trademarks
|
Privacy Statement
Industry
Agriculture Retail & Distribution
Chemicals Telecommunications
Construction Transportation and Logistics
Education Utilities
Financial Services
Government
Healthcare
Hospitality
Hosting
Life Sciences
Manufacturing
Media & Entertainment
Nonprofit
Oil & Gas
Professional Services
Business Need
Business Intelligence and... Mobility
Business Productivity SOA and Business Process
Collaboration Support and Services
Corporate Software Licensing Unified Communications
Cost Containment
Customer Relationship...
http://www.microsoft.com/caseStudies/Case_Study_Detail.aspx?casestudyid=400000... 27/04/2010
5. Microsoft Case Studies: Smith Flow Control Page 5 of 5
Data Protection and
Recovery
E-Commerce
Enterprise Project...
Enterprise Web and Search
Environmental Sustainability
Financial Management
Human Resource Management
Identity, Security and Access...
IT Issue
Asset Management Personal Productivity
Cloud Services Product Lifecycle
Data Warehousing Management
Regulatory Compliance and...
Desktop, Device and Server... Risk Analytics and Reporting
Development Supply Chain Planning and...
Digital Content Management Supply Chain Visibility and...
Document and Records... Virtualization
E-Commerce xRM
Enterprise Content
Management
Enterprise Portals
Enterprise Resource
Planning...
High Performance
Computing
Hosted Messaging and...
Interoperability
Manufacturing and Supply...
Customer
Partner
http://www.microsoft.com/caseStudies/Case_Study_Detail.aspx?casestudyid=400000... 27/04/2010