In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.
This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.
With the exhaustion of IPv4, organizations will soon have to migrate to IPv6. While there isn't a hard deadline like with Y2K, the longer IT puts off IPv6 migration, the more difficult connecting to Internet and partner resources will become. IPv6 isn't rocket science, but there are a number of decisions that IT will have to make before and during the migration. In this tech center, we will dig into the architectural issues that IT will need to address from designing the IP layout through to migrating to supporting services like DHCP and DNS.
Blogs
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:
IPv4 address space is being gobbled up by the vast number of devices connecting to the Internet, and it's expected to be depleted in the next year. So the question is not whether to make the move to IPv6 but when. InformationWeek Analytics offers recommendations for ensuring that your data center is fully ready.
IPv6 advocates have long touted the elimination of NAT and the return to a true peer-to-peer Internet. But IT pros who've come to see NAT as an essential network security element are worried, and they have some questions: What are the security implications of a wide-open, any-to-any connection model? Do some features and characteristics of IPv6 make it more secure? For that matter, are the security models we've used for most of our careers still valid for IPv6? We investigate.